Difference between revisions of "Encryption"

From Wikispooks
Jump to navigation Jump to search
(work in progress.)
(revised by Joe Tag; 8 AUG 2016.)
Line 5: Line 5:
 
}}
 
}}
 
'''Encryption'' is the process of changing data from an understandable form into a scrambled form. The inverse process, of restoring the original data from the encrypted forms referred to as [[decryption]] (or deciphering).  
 
'''Encryption'' is the process of changing data from an understandable form into a scrambled form. The inverse process, of restoring the original data from the encrypted forms referred to as [[decryption]] (or deciphering).  
 +
 
==Background==
 
==Background==
The {{ccm}} fairly regularly have stories suggesting that a battle is ongoing between [[intelligence agencies]] and companies around encryption. This may well be mere [[smoke and mirrors]] to obscure the reality that a large proportion of all large companies' encryption products are cracked, whether by design or by faulty programming.
+
Encryption has 3 to 5 parts: "M" a MESSAGE; "K" a Key to encrypt a message, and "C" the result resulting encrypted data. 
 +
Part 4 and part 5 may be 2 additional keys that interact with other keys. </br> Classic systems involved pencil and paper methods.
 +
One group of systems used letter tables and rules to change a text letter into a ciphered letter.  Another method used a
 +
known rule to convert letters to numbers, and then performing an addition function with a key, to produce a ciphered text.
 +
Yet another example of an encryption method was to use a dictionary as a codebook, assigning words to the combination of page number, column, and entry of that column.  See codebook; dictionary code.  An illustrated example is generally known as the [http://www.jproc.ca/crypto/otfp_otlp.html One Time Key] method; versions being the <i><b>[http://users.telenet.be/d.rijmenants/en/onetimepad.htm One-Time Pad]</i></b>, <i><b>One-time tape</i></b> . 
 +
 
 +
==Controversy==
 +
The {{ccm}} fairly regularly have stories suggesting that a battle is ongoing between [[intelligence agencies]] , the [[tech-sector]] companies, privacy activists and other interested parties  <> around <> the use of <> encryption. This may well be mere [[smoke and mirrors]] to obscure the reality that a large proportion of all large companies' encryption products are cracked, whether by design or by faulty programming. As society and the technology change, the law has to catch up. 
  
 
==Keys==
 
==Keys==
Rubber hose method (i.e. [[torture]]) ...
+
Encryption protects <i>data in motion</i> (meaning point to point, over a network), or as you save a file onto a remote server disk, that stored information can be encrypted; and this is known as <i>data at rest</i> .  The use of "strong arm techniques",  like the rubber hose method, were used to persuade the individual to disclose the keys to law enforcement officers or to the military.  (i.e. [[torture]]) ...
 +
 
 
==Legal status==
 
==Legal status==
 
The [[deep state]] appears to be trying to use the "[[war on terror]]" as an excuse to outlaw encryption. This agenda is regularly promoted stepwise after "[[terrorist]]" attacks. It is proceeding at different rates in different countries.  
 
The [[deep state]] appears to be trying to use the "[[war on terror]]" as an excuse to outlaw encryption. This agenda is regularly promoted stepwise after "[[terrorist]]" attacks. It is proceeding at different rates in different countries.  
 +
 
===Australia===
 
===Australia===
 
Under the 2015 Defence Trade Controls Act, which came into force in 2016, it may be illegal to learn about encryption in Australia.<ref>http://www.gizmodo.com.au/2015/12/in-australia-even-learning-about-encryption-will-be-illegal-soon/</ref>
 
Under the 2015 Defence Trade Controls Act, which came into force in 2016, it may be illegal to learn about encryption in Australia.<ref>http://www.gizmodo.com.au/2015/12/in-australia-even-learning-about-encryption-will-be-illegal-soon/</ref>
 
===USA===
 
===USA===
 
In April 2016, a draft of a law called the [[Compliance with Court Orders Act]] were leaked, which suggested broad plans to make encryption illegal. The [[Business Software Alliance]] came out against the Burr-Feinstein bill, saying it "strongly urges" the [[US Congress]] to think again.<ref>http://www.theregister.co.uk/2016/04/14/burr_feinstein_bill_prompts_protests/</ref>  
 
In April 2016, a draft of a law called the [[Compliance with Court Orders Act]] were leaked, which suggested broad plans to make encryption illegal. The [[Business Software Alliance]] came out against the Burr-Feinstein bill, saying it "strongly urges" the [[US Congress]] to think again.<ref>http://www.theregister.co.uk/2016/04/14/burr_feinstein_bill_prompts_protests/</ref>  
==Future==
+
==Current concerns==
The good professionals know, that encryption must be in the hands of end-users; including "operators" and "actors" in the intelligence definition.{{cn}} Many people (including [[Joe Tag]]) believe that no sovereign government, police agency,  criminal or terrorist group needs to know their plans ''immediately''; and that when proper encryption is employed, clear data may be discovered only after 2 weeks to 10 years of continuous cryptanalytic processing.  Some{{who}} suggest key sizes of 48 characters ( 384 bits)  to 64 characters ( 512 bits) for a single message.   
+
The good professionals know, that encryption must be in the hands of end-users; including "operators" and "actors" in the intelligence definition.{{cn}} Many people believe that no sovereign government, police agency,  criminal or terrorist group needs to know their plans ''immediately''; and that when proper encryption is employed, clear data may be discovered only after 2 weeks to 10 years of continuous cryptanalytic processing.  Some{{who}} suggest key sizes of 48 characters ( 384 bits)  to 64 characters ( 512 bits) for a single message.   
  
 
==Language==
 
==Language==
Line 23: Line 33:
 
CODING has several meanings: 1) To program, "to code"; 2) To convert and change data from one form into another.  
 
CODING has several meanings: 1) To program, "to code"; 2) To convert and change data from one form into another.  
 
See also  [https://en.wikipedia.org/wiki/Codebook codebook] . regarding CODE BOOKs.  
 
See also  [https://en.wikipedia.org/wiki/Codebook codebook] . regarding CODE BOOKs.  
e.g.: To convert letters to numbers (a=00, b=01, z=25; or this scheme of a=11, b=12, c=13, z=36, 0=00, 1=01, 9=09 ) ; or analog speech into  
+
In the context of what is known as <i>secure voice</i> analog speech is changed, converted into  
a digital stream or digital buffer ie: "Code Excited Linear Predictive coding, CELP" .  
+
a digital stream or digital buffer ie: "Code Excited Linear Predictive coding, CELP" . This plain voice, is then encrypted by
Encryption has 3 to 5 parts: "M" a MESSAGE; "K" a Key to encrypt a message, and "C" the result resulting encrypted data.
+
boolean operations; see XOR.  Secure voice systems like the STU-III, STE, vIPer and Hannibal are quite complex.  
Part 4 and part 5 may be 2 additional keys that interact with other keys. </br>
+
 
 
Digital Encryption dates to 1919 at AT&T Federal Labs in the financial district of New York City.  A pioneer in this work was  
 
Digital Encryption dates to 1919 at AT&T Federal Labs in the financial district of New York City.  A pioneer in this work was  
 
[[Gilbert Vernam]].
 
[[Gilbert Vernam]].

Revision as of 23:10, 8 August 2016

Concept.png Encryption 
(technology)Rdf-entity.pngRdf-icon.png
Encryption.png
Interest of• Laura Halminen
• Bruce Schneier

'Encryption is the process of changing data from an understandable form into a scrambled form. The inverse process, of restoring the original data from the encrypted forms referred to as decryption (or deciphering).

Background

Encryption has 3 to 5 parts: "M" a MESSAGE; "K" a Key to encrypt a message, and "C" the result resulting encrypted data. Part 4 and part 5 may be 2 additional keys that interact with other keys.
Classic systems involved pencil and paper methods. One group of systems used letter tables and rules to change a text letter into a ciphered letter. Another method used a known rule to convert letters to numbers, and then performing an addition function with a key, to produce a ciphered text. Yet another example of an encryption method was to use a dictionary as a codebook, assigning words to the combination of page number, column, and entry of that column. See codebook; dictionary code. An illustrated example is generally known as the One Time Key method; versions being the One-Time Pad, One-time tape .

Controversy

The commercially-controlled media fairly regularly have stories suggesting that a battle is ongoing between intelligence agencies , the tech-sector companies, privacy activists and other interested parties <> around <> the use of <> encryption. This may well be mere smoke and mirrors to obscure the reality that a large proportion of all large companies' encryption products are cracked, whether by design or by faulty programming. As society and the technology change, the law has to catch up.

Keys

Encryption protects data in motion (meaning point to point, over a network), or as you save a file onto a remote server disk, that stored information can be encrypted; and this is known as data at rest . The use of "strong arm techniques", like the rubber hose method, were used to persuade the individual to disclose the keys to law enforcement officers or to the military. (i.e. torture) ...

Legal status

The deep state appears to be trying to use the "war on terror" as an excuse to outlaw encryption. This agenda is regularly promoted stepwise after "terrorist" attacks. It is proceeding at different rates in different countries.

Australia

Under the 2015 Defence Trade Controls Act, which came into force in 2016, it may be illegal to learn about encryption in Australia.[1]

USA

In April 2016, a draft of a law called the Compliance with Court Orders Act were leaked, which suggested broad plans to make encryption illegal. The Business Software Alliance came out against the Burr-Feinstein bill, saying it "strongly urges" the US Congress to think again.[2]

Current concerns

The good professionals know, that encryption must be in the hands of end-users; including "operators" and "actors" in the intelligence definition.[citation needed] Many people believe that no sovereign government, police agency, criminal or terrorist group needs to know their plans immediately; and that when proper encryption is employed, clear data may be discovered only after 2 weeks to 10 years of continuous cryptanalytic processing. Some[Who?] suggest key sizes of 48 characters ( 384 bits) to 64 characters ( 512 bits) for a single message.

Language

CODING has several meanings: 1) To program, "to code"; 2) To convert and change data from one form into another. See also codebook . regarding CODE BOOKs. In the context of what is known as secure voice analog speech is changed, converted into a digital stream or digital buffer ie: "Code Excited Linear Predictive coding, CELP" . This plain voice, is then encrypted by boolean operations; see XOR. Secure voice systems like the STU-III, STE, vIPer and Hannibal are quite complex.

Digital Encryption dates to 1919 at AT&T Federal Labs in the financial district of New York City. A pioneer in this work was Gilbert Vernam.

 

An example

Page nameDescription
TrueCryptWidely praised disk encryption software, abruptly discontinued in 2015. Version 7.1a (not 7.2) is the latest fully functional version.

 

Related Quotations

PageQuoteAuthorDate
Roger Dingledine“The United States government can’t simply run an anonymity system for everybody and then use it themselves only. Because then every time a connection came from it people would say, “Oh, it’s another CIA agent.” If those are the only people using the network.””Roger Dingledine2004
Rod Rosenstein“Responsible encryption is achievable. Responsible encryption can involve effective, secure encryption that allows access only with judicial authorization. Such encryption already exists.”Rod Rosenstein10 October 2017
Malcolm Turnbull“The laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable but the only law that applies in Australia is the law of Australia.”Malcolm Turnbull14 July 2017
Christopher Wray<nowiki>“To put it mildly, this [[[encryption]]] is a huge, huge problem. It impacts investigations across the board — narcotics, human trafficking, counterterrorism, counterintelligence, gangs, organized crime, child exploitation.”</nowiki>Christopher Wray2017

 

An official example

Name
Signal Messenger
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References


57px-Notepad icon.png This is a page stub. Please add to it.