Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror

30 Years of Public Key Cryptography 83

An anonymous reader writes "Public key crypto turned 30 last night, and the biggest names in crypto turned out to celebrate at an event hosted at the Computer History Museum. Voltage Security teamed with RSA to bring together some of the most famous cryptographers of yesterday (Whitfield Diffie and Martin Hellman) and today (Dan Boneh), along with luminaries Ray Ozzie, Brian Snow, and Jim Bidzos. From the ZDNet article: 'NYT reporter John Markoff, who has covered Silicon Valley for 30 years, was master of ceremonies, and started off by saying that no technology has had a more profound impact than cryptography, and that public-key cryptography has been underappreciated for its role in the Internet. Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.' You can view the podcast and pictures of the event at the Voltage Security site.."
This discussion has been archived. No new comments can be posted.

30 Years of Public Key Cryptography

Comments Filter:
  • by krell ( 896769 ) on Saturday October 28, 2006 @06:23AM (#16621138) Journal
    Let's celebrate the anniversary! Party at d$3vF434. $D%f$sdsN4. Don't miss it!
  • by elronxenu ( 117773 ) on Saturday October 28, 2006 @06:28AM (#16621144) Homepage
    Can't make sense of it - what's the passphrase?

  • by Myself ( 57572 ) on Saturday October 28, 2006 @06:40AM (#16621176) Journal
    bayl bhgynjf jvyy unir cevinpl.

    (If you do a run of stickers with that on them, kindly tell me, and I'll buy some from you.)
  • by Anonymous Coward on Saturday October 28, 2006 @06:50AM (#16621220)
    So, is this the 30th anniversary of the public discovery of public key cryptography or the 30th anniversary of the official (publicised) date on which Clifford Cox and co secretly discovered it for a very non-public organisation?
    • by Al Dimond ( 792444 ) on Saturday October 28, 2006 @12:53PM (#16623644) Journal
      Wikipedia says that Diffie and Hellman published their work in 1976, and that the earlier secret work was going on in the early 70s. So it looks like they're talking about the public discovery, assuming both that Wikipedia is correct and that I can add small numbers in my head accurately.
    • by Anonymous Coward on Saturday October 28, 2006 @01:48PM (#16624022)
      Yes, public key cryptography was first discovered by Clifford Cox (of the British GCHQ) in 1973 (in contrast, RSA was invented in 1977 according to wikipedia). But, because Cox' research was kept secret until long after RSA had become mainstream it did nothing to advance cryptographic research. Same applies to the first computer - We now know that Colossus was the first computer [1] and not Eniac, but since Eniac was not kept secret it literally became the grandfather of all computers in spite of Colossus; because, lets face it, Colossus has nothing to do with the linage of computers we have today. Sure, the britts were first but because of their lack of vision and secrecy, they may always be remembered as the "mee too"-guy.

      [1] Actuallly, some claim a German beat them to the punch.

      I assure you I'm not American. I just feel the Americans deserve a hell of a lot more credit for this stuff because without RSA we might never have gotten public key cryptography. IIRC Clifford Cox's work was only made public because RSA became widely known.
  • first papers on PKC (Score:5, Interesting)

    by ei4anb ( 625481 ) on Saturday October 28, 2006 @06:51AM (#16621228)
    It was a fun time.

    I was a math undergrad interested in large prime numbers and numerical computing when the first hints on what RS&A were doing came out in Scientific American. At that time I had only 3 years programming experience and it was a big thrill to get a public key crypto email system working (first in Pascal on a DEC-20) but I only distributed it to a small group as the university was not yet on the Internet.

    I told the story to PZ at a conference about 8 years ago and we had a good laugh wondering how things might have developed differently had that program been distributed on Usenet by someone outside the USA!

  • by Yahma ( 1004476 ) on Saturday October 28, 2006 @06:56AM (#16621250) Journal
    Historians of science will certainly spend time sorting out the various claims. David Kahn, the author of the best selling history The Codebreakers, said that he recently asked the National Security Agency to declassify some documents so he could write the proper history of public key cryptography. He said an NSA staff member told him, "I've spoken to the guys who did this, but they don't want to be interviewed now." This suggests that the NSA also may have discovered public-key systems or had a hand in exploring them. Kahn hopes that the NSA will follow in Britain's lead so an accurate history can be written.

    It is likely that the NSA discovered public key Cryptography in the late 60's or early 70's. Public Key Cryptography may be as old as 40 years old at this point, but without clarification from the NSA, we will never be certain.


    ---
    Yahma
    Proxy Storm [proxystorm.com] - Free Anonymous Proxy Service for security conscious individuals.
  • Worst. post. (Score:-1, Redundant)

    by Anonymous Coward on Saturday October 28, 2006 @07:02AM (#16621272)
    ever.
  • by onetwofour ( 977057 ) on Saturday October 28, 2006 @07:04AM (#16621284) Homepage
    Time for it's mid life crisis then, well with the UK Government wanting all our keys soon then it's nice and apt.
  • by Anonymous Coward on Saturday October 28, 2006 @07:07AM (#16621290)
    no technology has had a more profound impact than cryptography

    I hear that the wheel had quite an impact. Oh yeah and the steam engine. Not fogetting the printing press. Or even plastic. Seriously, do they even think before parroting this nonsense?
  • GCHQ in 1973! (Score:5, Informative)

    by spoonist ( 32012 ) on Saturday October 28, 2006 @07:08AM (#16621296) Journal
    • by Anonymous Coward on Saturday October 28, 2006 @09:56AM (#16622104)

      oh come on everyone knows the Americans cracked the Enigma code and single handedly beat the Germans in WW2, invented the steam engine, electricity, telephones, TV and are the World champions of baseball and football !

      GO USA #1 *

      *not applicable in 191 countries
    • by leob ( 154345 ) on Saturday October 28, 2006 @10:33AM (#16622408)
      Right, and Native Americans invented the wheel.

      At GCHQ, they did not understand the importance of it.
    • by Anonymous Coward on Saturday October 28, 2006 @11:59AM (#16623212)
      "Did you know...
      "GCHQ employs more mathematicians than the average university maths faculty?


      And fewer English majors than the average Englishes faculty.
    • by shma ( 863063 ) on Saturday October 28, 2006 @01:05PM (#16623708)
      I would suspect that they are celebrating the 30 year anniversary of PKC being available to the general public. Still, it is only fair to credit the original inventors.
    • Martin Hellman and Whitfield Diffie unveiled DES encryption in June 1976, after years of work and being told by IBM that it was impossible. DES had a disadvantage; it required both parties to be active at the same time.

      Ronald Rivest, Adi Shamir and Leonard Adleman invented RSA encryption in 1977. It was better than DES, because it did not require the both parties to be online at the same time. It did require a public key directory, though.

      It was not until years later that the British Government announced that the GCHQ had invented RSA cryptography in 1973. James Ellis, a very eccentric cryptographer and Clifford Cocks, a young mathematician were responsible for the discovery. Malcom Williamson, another GCHQ mathematician, verified the valitidty of their methods. Both were graduates of Manchester Grammar School and contestants in the 1968 Mathematical Olympiad.

      Then in June 1991 Phil Zimmermann released PGP to the public, which earned him a grand jury investigation for being an arms dealer, as cryptography is classified with missiles an bombs.

      Now, governments around the globe are trying to ban strong encryption, as it ruins digital wiretapping. If strong encryption is restricted by the government, such as part 3 of the UK's RIP Act, the future of computer commerce is at stake.
  • by agent dero ( 680753 ) on Saturday October 28, 2006 @07:28AM (#16621372) Homepage
    the biggest names in crypto turned out to celebrate at an event hosted at the Computer History Museum.

    I'm disappointed that our government missed this key opportunity to ensure their surveillance will go forward willout having to deal with that silly "encryption" and such ;)

    Then again, maybe on that note, we can organize a "Islamic Fundamentalist Luncheon" and let some mob-folk "take care of things."
  • by notnAP ( 846325 ) on Saturday October 28, 2006 @07:33AM (#16621392)
    So, then, by the book, crypto has only been around for, what, 30 hours?
  • by CFD339 ( 795926 ) <andrewp.thenorth@com> on Saturday October 28, 2006 @07:38AM (#16621422) Homepage Journal
    A lot of people seem to forget that one of the first really widespread products that end users in corporations used that fully integrated public/private key encryption was Lotus Notes. I started using it in 1991, but I believe as early as 1989 it was functionally part of the product.

    Sure, others used it before then, but in terms of a widely used corporate end user audience, it was (and still is to some extent) unique.

    Yes, you may now rag on Notes if you like -- of course, keep in mind it remains the only real solution for a major corporation that by public key authentication and encryption by default, has a fully functional smtp mta built in, handles the front end needs of end users well enough for salespeople (not like a typical pop or imap client) and of course, fully supports linux as a server platform (and within a few months as a client platform as well). :-)
    • Yes, you may now rag on Notes if you like -- of course, keep in mind it remains the only real solution for a major corporation that by public key authentication and encryption by default

      Like many other good ideas I believe it was given a bad reputation by the lusers who invested their careers in notes as a platform for everything.

      Once standardisation sets in notes becomes a reason not to do stuff, or at least not to bother trying.

  • by xxxJonBoyxxx ( 565205 ) on Saturday October 28, 2006 @07:42AM (#16621438)
    No Zimmerman? Where was the real party?
  • by Roger_Wilco ( 138600 ) on Saturday October 28, 2006 @08:57AM (#16621772) Homepage

    I don't like to take away from their excellent work, but it is possible, though inconvenient, to do private-key crypto for such things.

    Your bank, for example, would need to [paper] mail you a private key to type into your machine (or give you a thumbdrive with it, whatever you like). Inconvenient, yes; you'd need a new key for each company you interact with. Probably it would encourage a few monopolies (amazon and eBay) to dominate, since you'd only need to interact with them by paper once. But not impossible.

    • by wkk2 ( 808881 ) on Saturday October 28, 2006 @09:09AM (#16621850)
      For most transactions, you only really need a private key shared with your credit card provider.
      Merchants could do the same and the problem is mostly solved without a PKI. We still might need to do this anyway.
      One time tokens anyone?
    • would need to [paper] mail you a private key

      This would not work at all, because someone could easily intercept your mail at the mailbox, post office, etc. Sending plaintext by snail mail is just as secure as sending plaintext over the net, i.e. its not.

      For this to be secure you would probably have to go and pick up your private key at the bank yourself.

      • Well how do you get your password for online banking.

        It's (snail)mailed out to you, then you login and change it.

        I don't see the difference between this and mailing you a key.

        And yes i know them mailing personal authentication data to you is horrendously insecure, but that's not the point.

        The real advantage to PKI is that you can set up the encryption prior to the exchange of authentication data, which makes application design much easier.
    • That's not exactly how it works, there are two keys one private (bank) and one public (customer). The public key does not need to be a secret since it can't be used to decrypt the message only encrypt it. The "one way" math function is based on the difficulty of factorising large numbers (thus all the interest in large primes). Having a one way function is why PKE is different to other forms of encryption, it means you don't have the problem of distributing a single secret key.

      Eg: SSL uses public key encryption and you don't need a "new key on a bit of paper" for each store. Note that SSL only makes the communication secure, you still need the credit card details to buy stuff.
  • by Anonymous Coward on Saturday October 28, 2006 @09:14AM (#16621868)
    Why didn't they invite theo de raadt, responsible for getting ssh into the mainstream?
  • Wrong Date (Score:3, Informative)

    by gilgongo ( 57446 ) on Saturday October 28, 2006 @09:35AM (#16621960) Homepage Journal
    Public key encryption was invented in 1973 at GCHQ in Britain.

    I suppose the commercial victors get to (re)-write the history books then.

  • How many use it? (Score:3, Interesting)

    by steevc ( 54110 ) on Saturday October 28, 2006 @09:49AM (#16622056) Homepage Journal
    I've had a public key for a few years and have cross-signed keys of a few people I know, but most do not encrypt or even sign their emails despite knowing the insecurities of email. I'm surprised that it is not used more commercially, but I have never had a signed or encrypted email at work and that often involves commercially sensitive information.

    Could it be that encryption is still to complex for most people?

    I will continue to encrypt emails to those I know can handle it and will sign others.
    • by xmodem_and_rommon ( 884879 ) on Saturday October 28, 2006 @10:04AM (#16622156)
      Can you please point me to either a free email client that is easy enough to use and has a decent interface? Or a plugin for an existting one, that supports this? I'd be very interested in doing this (although I don't know anyone who has the technical capacity to figure out how to read it that wouldn't just ask me to send it unencrypted)
    • by cryfreedomlove ( 929828 ) on Saturday October 28, 2006 @10:04AM (#16622162)
      You are right that it is not in common use for emails. However, the fact that it is there and available for private individuals is comforting to me.
    • by SLi ( 132609 ) on Saturday October 28, 2006 @01:20PM (#16623814)
      It's not very common with e-mail (and that makes me sad), but it's very common in WWW. Every time you access a https-URL you use public key cryptography.
    • by TheRaven64 ( 641858 ) on Saturday October 28, 2006 @01:33PM (#16623926) Journal
      Do you do any online banking? Have you ever bought anything from a web site? If you have, then you have used HTTP tunnelled over SSL. SSL is an example of public key cryptography.
    • by Sloppy ( 14984 ) on Saturday October 28, 2006 @02:20PM (#16624228) Homepage Journal

      Complexity may be an issue, but I think it's a relatively minor one.

      The biggest issue is that people simply really just don't care. When I try to advocate this stuff to laymen, by far the most common comment I hear is "So what if someone reads my email?" Most people don't think email privacy is worth protecting. Yes, even despite the news stories in the last few years (i.e. the government really is reading your email; it's not just a paranoid crackpot theory anymore).

      Another issue is something that has actually gotten worse in the last 10 years. Webmail is very popular. It's nearly impossible to do email encryption correcting using webmail instead of "real" (e.g. POP or IMAP) mail. You either have to trust a foreign system with your keys, or you have to have so much non-web-intelligence running inside the web browser (e.g. a Java applet or something) that it isn't really webmail anymore. And even if you make it sophisticated enough to run on the web browser, you lose one of the major advantages of webmail: checking your email from anywhere, including untrusted machines. (The only way to do it then, is for the user to do the crypto inside their head instead of using a computer.) It's a mess and it just can't be done right. As long as people want webmail, as long as they see it as a good thing instead of a bad thing, they can't have good encryption. (Well, unless they are the admin of the web server. e.g. One person at Google could conceivably use gmail as a secure webmail system. ;-)

  • by jonwil ( 467024 ) on Saturday October 28, 2006 @10:33AM (#16622410)
    Hopefully in 30 years from now, we will live in a world where encrypting email, IM conversations, personal documents and anything else that you would rather not be public becomes something everyday people do and not something that "geeks" do.
    Hopefully we see a world where the major email clients (including Thunderbird/Seamonkey) come with easy to use email encryption out of the box.
    Hopefully we see a world where your communications and data are safe from people you would rather didnt see them (black-hat hackers, identity thieves, your worst enemy, your boss, the RIAA etc etc)
    • by WuphonsReach ( 684551 ) on Saturday October 28, 2006 @11:24AM (#16622900)
      I suspect that what might work without overhauling SMTP completely (and this is very much a blue sky idea).

      1a) Mail servers that start caching SSH-style public keys for servers that they talk to. Then encrypt the transport between the two servers. There are definitely MITM attacks that could be mounted, but the outbound MTA might simply keep track of key-changed events in the log files. Let the admins worry about it, if they do.

      1b) IPSec with opportunistic encryption for encrypting the transport. Maybe you get DNS (or secure DNS) involved for proving the validity of the public keys. Or maybe you take a page out of the SSH playbook and simply tell the user that the mail may not have been delivered to the system that we think it should've been delivered.

      2) Mail clients that create a public key and hand it the POP3/IMAP server. Then the server could simply encrypt the message files as they get written to the disk using the user's public key. This runs into all sorts of issues (no web-access to your mail folder, difficulting in retrieving e-mail with another e-mail client, lost e-mail if you lose your private key). So I don't know how well that would work out in principle (probably not well).

      Personally, I think securing the SMTP link is probably the most realistic. Paranoid MTA admins could decide that all keys have to be pre-validated before e-mail can be delivered to the remote system. The rest of us could simply accept the small risk of MITM and watch our log files for keys that change. Or check our destination keys against public lists of server keys (sort of a reputation service).

      • by jonwil ( 467024 ) on Saturday October 28, 2006 @12:19PM (#16623388)
        You dont need to make it that complex.
        Essentially, if the recipiant supports encryption, the recipiants public key is pulled from a key server. Then, the email client encrypts it using something similar to PGP or GPG. Something thats standard enough that anyone can implement it.
        At the other end, it is decrypted by the mail client using the recipiants private key.
        All that the servers in the middle see is an encrypted email (same as they would see if you encrypted an email right now with PGP or GPG or whatever). The servers dont need to know about the encryption or be changed in any way.

        No issues with being able to access the email from anywhere, as long as you have your private key, any email client with the right encryption support would be able to decrypt the email (including web based email clients if you were willing to trust uploading your private key to a https:/// [https] server run by whoever provides your email)

        And with this, mail servers (and mail server admins) never see the unencrypted email.

        Assuming the key management is good enough (i.e. that you can trust that who the system says owns the key actually owns it), it can also be used to verify that the sender is who they say thay are.

        The downside is the need to en- and de-crypt on the client side which might be an issue for some embedded applications (although these days most mobile phones, PDAs and the like that have internet/email generally have web browsers that understand SSL and if they have the CPU to handle SSL, they can probobly handle encrypted email)
  • by szyzyg ( 7313 ) on Saturday October 28, 2006 @11:54AM (#16623162)
    We all know public key cryptography was a secret for many years before it became public. Officially GCHQ got there first.
  • John Markoff (Score:3, Interesting)

    by Progoth ( 98669 ) on Saturday October 28, 2006 @01:03PM (#16623694) Homepage
    Is this the same John Markoff that got Kevin Mitnick thrown in jail for lying about him in the New York Times?
  • by Myria ( 562655 ) on Saturday October 28, 2006 @01:22PM (#16623834)
    For all the legitimate uses of public-key cryptography, I seem to think that most uses of it are bad. I see the Xbox, Xbox 360, Vista, Leopard and Tivo using public-key cryptography for nothing but removing the authority of computer owners to decide what software they run on their computer. I see VeriSign getting rich off the VeriSign Tax.

    I personally think that it would be far better to make use of shared-secret systems for when you need communication security, like logging onto banks. The solution to phishing is clearly to use a shared secret system, because things like IE7's anti-phishing filtering can be worked around. SRP6 is great, but unfortunately that is based on public-key technology (though doesn't actually involve a public key, like Diffie-Hellman).

    I hope that someday it is proven that public-key cryptography cannot be securely attached to an NP-complete problem, and that either a fast discrete logarithm algorithm (*) is found or quantum computers take off.

    (*) A fast solution to the discrete logarithm problem implies a fast solution to integer factorization.

    Melissa
  • YuO fail it!S? (Score:-1, Flamebait)

    by Anonymous Coward on Saturday October 28, 2006 @01:27PM (#16623872)
    continues toChew the deAl wFith you and arms and dick
  • Overstatement (Score:3, Interesting)

    by iamacat ( 583406 ) on Saturday October 28, 2006 @01:37PM (#16623958)
    Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.

    Hardly. Phone conversations are not encrypted and can be/are intercepted, yet phone commerce is commonplace. Even in-person credit card purchases are hardly secure and there are a number of websites that do e-commerce without encryption. Without public key cryptography, more attention would be paid to security of the path between your ISP and the vendor. Websites could also have you set up username and password over a more secure channel and then use plain symmetrical encryption for the actual purchase.
  • by Anonymous Coward on Saturday October 28, 2006 @01:43PM (#16623996)
    As important as Zimmermann is, Schneier's a must have. Also no Rivest, Shamir or Adleman? It sounds like a party for management by management.


    Sigh ...

  • by iansmith ( 444117 ) on Saturday October 28, 2006 @02:26PM (#16624270) Homepage
    Without public key cryptography, ecommerce would be an idea as opposed to an enabler of billions of daily transactions.

    And without the patent on public-key encryption that covered not just the method but the very idea of it, we might all have secured communications by now. But instead we are not much further ahead except for ssh which at least helps network admins.

    I just have a hard time cheering for RSA which did nothing other than patent a mathematical formula discovered by multiple people and prevent it's dfree use in America and other countries that allow software patents.

    I was using PGP back in the early 90's and was frustrated that it's use was hamstrung by the patent and US laws on exporting encryption software. What a waste.

  • by Anonymous Coward on Saturday October 28, 2006 @06:26PM (#16626262)
    Public Key Cryptography was developed by the the British back in the 60's. The only reason that you Americans did not notice was that either they can keep a secret.
  • by Anonymous Coward on Saturday October 28, 2006 @10:37PM (#16628418)
    It's probably a good time to reflect on the public key cryptography patents.

    These shut down public key cryptography work for a long time. It wasn't until those wretched patents expired that internet commerce finally took off. And what have we seen with every other patent since then? People avoid them until it expires. The best patent owners can do is 'submarine' them, a la Unisys.

    Rivest, Shamir or Adleman should go down in history as a group of assholes who were at the leading end of the malicious patent trade. When those guys die, I'll be sure to visit their graves and piss on them. Well, Rivest at the very least.

Many aligators will be slain, but the swamp will remain.

Working...