Date:

Simpson Garfinkel on Spooky Cryptographic Motion at a Distance


Simpson Garfinkel on Spooky Cryptographic Motion at a Distance

Wonderful learn. One instance:

Take into account the case of primary public key cryptography, during which an individual’s private and non-private key are created collectively in a single operation. These two keys are entangled, not with quantum physics, however with math.

After I create a digital machine server within the Amazon cloud, I’m prompted for an RSA public key that will likely be used to regulate entry to the machine. Sometimes, I create the private and non-private keypair on my laptop computer and add the general public key to Amazon, which bakes my public key into the server’s administrator account. My laptop computer and that take away server are thus entangled, in that the one option to log into the server is utilizing the important thing on my laptop computer. And since that administrator account can do something to that server­learn the sensitivity knowledge, hack the online server to put in malware on individuals who go to its internet pages, or anything I would care to do­the non-public key on my laptop computer represents a safety threat for that server.

Right here’s why it’s not possible to guage a server and know whether it is safe: as lengthy that non-public key exists on my laptop computer, that server has a vulnerability. But when I delete that non-public key, the vulnerability goes away. By deleting the info, I’ve eliminated a safety threat from the server and its safety has elevated. That is true entanglement! And it’s spooky: not a single bit has modified on the server, but it’s safer.

Learn all of it.

Posted on October 30, 2024 at 10:48 AM •
0 Feedback

Sidebar photograph of Bruce Schneier by Joe MacInnis.

Latest stories

Read More

LEAVE A REPLY

Please enter your comment!
Please enter your name here