Simpson Garfinkel on Spooky Cryptographic Motion at a Distance
Wonderful learn. One instance:
Take into account the case of primary public key cryptography, by which an individual’s private and non-private key are created collectively in a single operation. These two keys are entangled, not with quantum physics, however with math.
After I create a digital machine server within the Amazon cloud, I’m prompted for an RSA public key that shall be used to manage entry to the machine. Usually, I create the private and non-private keypair on my laptop computer and add the general public key to Amazon, which bakes my public key into the server’s administrator account. My laptop computer and that take away server are thus entangled, in that the one method to log into the server is utilizing the important thing on my laptop computer. And since that administrator account can do something to that serverlearn the sensitivity knowledge, hack the net server to put in malware on individuals who go to its net pages, or the rest I’d care to dothe non-public key on my laptop computer represents a safety threat for that server.
Right here’s why it’s unattainable to judge a server and know whether it is safe: as lengthy that personal key exists on my laptop computer, that server has a vulnerability. But when I delete that personal key, the vulnerability goes away. By deleting the information, I’ve eliminated a safety threat from the server and its safety has elevated. That is true entanglement! And it’s spooky: not a single bit has modified on the server, but it’s safer.
Learn all of it.
Posted on October 30, 2024 at 10:48 AM •
0 Feedback
Sidebar picture of Bruce Schneier by Joe MacInnis.