Simson Garfinkel on Spooky Cryptographic Motion at a Distance
Glorious learn. One instance:
Think about the case of fundamental public key cryptography, during which an individual’s private and non-private key are created collectively in a single operation. These two keys are entangled, not with quantum physics, however with math.
Once I create a digital machine server within the Amazon cloud, I’m prompted for an RSA public key that will probably be used to regulate entry to the machine. Sometimes, I create the private and non-private keypair on my laptop computer and add the general public key to Amazon, which bakes my public key into the server’s administrator account. My laptop computer and that take away server are thus entangled, in that the one method to log into the server is utilizing the important thing on my laptop computer. And since that administrator account can do something to that server—learn the sensitivity knowledge, hack the online server to put in malware on individuals who go to its internet pages, or the rest I would care to do—the non-public key on my laptop computer represents a safety threat for that server.
Right here’s why it’s not possible to judge a server and know whether it is safe: as lengthy that non-public key exists on my laptop computer, that server has a vulnerability. But when I delete that non-public key, the vulnerability goes away. By deleting the information, I’ve eliminated a safety threat from the server and its safety has elevated. That is true entanglement! And it’s spooky: not a single bit has modified on the server, but it’s safer.
Learn all of it.
Sidebar photograph of Bruce Schneier by Joe MacInnis.