Page 116 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 116

Information  Security and Privacy




                    Notes          Most threshold systems depend on encryption with keys which are distributed in portions. The
                                   most ordinary method for partitioning a key into parts is to form the key as the solution to N
                                   equations in N unknowns. If N independent equations are recognized, the key can be determined
                                   by solving the concurrent equations. If less than N equations are known, the key can be any
                                   value as there is still a sovereign variable in the equations. Any number can be selected for N
                                   and equations can be held by separate individuals. The same general concept can be used to form
                                   arbitrary combinations of key requirements by producing ORs and ANDs of encryptions using
                                   different sets of keys for different combinations of key holders. The major troubles with such a
                                   system lie in the key distribution difficulty and the  large number  of keys  needed to attain
                                   arbitrary key holder combinations.

                                   8.2.10 Systems using Changing Keys

                                   It has been shown us that given sufficient reuse of  a key,  it can  finally be determined. It  is
                                   therefore common practice to frequently change keys to limit the exposure because of successful
                                   attack on any given key. A familiar misconception is that changing a key much more frequently
                                   than the average time needed to break the cryptosystem, offers an increased margin of safety.
                                   If we suppose the key is chosen at chance, and that the attacker can ensure a given percentage of
                                   the keys before a key change is completed, it is only a matter of time before one of the keys
                                   checked by the attacker appears to correspond to one of the casual keys. If the attacker selects
                                   keys to attack at random without replacement over the phase of key usage, and begins again at
                                   the commencement of each period, it is 50% likely that a at present valid key will be found by
                                   the time required to try 50% of the total number of keys, regardless of key changes. So if a PC
                                   could try all the DES keys in 10 years, it would be 50% likely that a victorious attack could be
                                   launched in 5 years of effort. The real advantage of key changes is that the time over which a
                                   broken key is useful is restricted to the time till the next key change. This is known as limiting
                                   the exposure from a stolen key.

                                   8.2.11 Hardware to Support Cryptography

                                   Traditionally, cryptography has been executed through the use of cryptographic devices. The
                                   use of these devices derives from the complexity in performing cryptographic transforms by
                                   hand, the severe nature of errors that effect from the lack of redundancy in many cryptographic
                                   systems, and the want to make the breaking of codes computationally complex.
                                   In WWII, the ENIGMA machine was accessed by the Germans to encode messages, and one of the
                                   first computers ever built was the BOMB, which was intended to break ENIGMA cryptograms.
                                   Modern supercomputers are used mainly by the NSA to attain the computational advantage
                                   essential to break many contemporary cryptosystems. The CRAY could be easily used to break
                                   most password enciphering systems, RSA systems with keys of length under about 80 (circa
                                   1986) are critically threatened by the CRAY, and even the DES can be attacked by using special
                                   purpose computer hardware.  Many devices have occurred in the marketplace for the use of
                                   cryptography to encrypt transmissions, act as cryptographic keys for verification of identification,
                                   protect so called debit cards and smart cards, and executing electronic cash money systems.

                                   Self Assessment


                                   Fill in the blanks:
                                   3.  With the arrival of public-key systems, ........................... can be preserved without a general
                                       master-key or a large number of keys.

                                   4.  ........................... involves systems of locks and keys, guards, and other techniques of a
                                       physical or logical nature.



          110                               LOVELY PROFESSIONAL UNIVERSITY
   111   112   113   114   115   116   117   118   119   120   121