Cryptography: Is Staying with the Herd Really Best?
نویسنده
چکیده
A recent Internet Watch column argues that new cryptography is bad cryptography. Drawing an analogy to the medical profession , it says, " A good doctor won't treat a bacterial infection with a medicine he just invented when proven antibiotics are available. " That certainly sounds reasonable. But, in a very real and practical sense, there is no proven cryptography. And this is not just an issue of mathematical proof: The cryptographic profession simply can't tell whether or not a cipher really is protecting data. It is as though medical doctors were telling us about their cures when in reality they couldn't even tell if their patients were alive or dead. It is not that we want to avoid crypt-analysis; indeed, we want all the analysis we can get. And it is true that a brand new cipher has had scant time for analysis. But the result of even deep analysis is not a proven design; it is just something that we don't positively know to be weak. This slight shift of meaning is the basis for understanding what cryptography can and can't do. For one thing, it means that any cipher—no matter how deeply analyzed—could be weak in practice. And that means that anyone concerned with real security probably should consider using something other than the same cipher as everyone else. One possibility is using new cryptography in new ways, which is the exact opposite of what that previous column suggests. Surely, we all would like to have a fully reviewed library or cipher in the same way that we would like to have a fully debugged program. But not even lengthy review or analysis guarantees either cryptographic strength (the ability to resist attack) or a lack of program bugs. For example, most crypto experts probably would agree that just because 20 years of analysis of the US Data Encryption Standard has not found an easy break doesn't mean that no easy break exists. And if a break does exist, it may have been actively exploited for years without our knowing. We certainly couldn't call that a strong cipher. In practice, even extensive review is not a rational or scientific indication of strength. This is not an issue of perfection versus reality, and it isn't like software where we tolerate various bugs and still get real work done. In software, the bugs are generally peripheral to our goals, and …
منابع مشابه
Staying up-to-date with cryptology
This paper provides an overview of current cryptographic techniques, targeting management and focussing on applicability of cryptographic tools and on the level of their security. The paper shows real-life examples and latest developments in the area. It also brings recommendations that should help managers to understand the necessary basics, what is really important and how to manage cryptology.
متن کاملA Hybrid Data Clustering Algorithm Using Modified Krill Herd Algorithm and K-MEANS
Data clustering is the process of partitioning a set of data objects into meaning clusters or groups. Due to the vast usage of clustering algorithms in many fields, a lot of research is still going on to find the best and efficient clustering algorithm. K-means is simple and easy to implement, but it suffers from initialization of cluster center and hence trapped in local optimum. In this paper...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Computer
دوره 32 شماره
صفحات -
تاریخ انتشار 1999