Secure Channels in The Real World
There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (e.g., couriers, homing pigeons, diplomatic bags, etc.) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.
In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie–Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e., very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper—conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages—will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.
It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.
Read more about this topic: Secure Channel
Famous quotes containing the words secure, channels, real and/or world:
“Self-respectThe secure feeling that no one, as yet, is suspicious.”
—H.L. (Henry Lewis)
“People between twenty and forty are not sympathetic. The child has the capacity to do but it cant know. It only knows when it is no longer able to doafter forty. Between twenty and forty the will of the child to do gets stronger, more dangerous, but it has not begun to learn to know yet. Since his capacity to do is forced into channels of evil through environment and pressures, man is strong before he is moral. The worlds anguish is caused by people between twenty and forty.”
—William Faulkner (18971962)
“Although a firm swat could bring a recalcitrant child swiftly into line, the changes were usually external, lasting only as long as the swatter remained in view....Permanent transformation had to be internal....The habits of self discipline, as laborious and frustrating as they were to achieve, offered the only real possibility of keeping children safe from their own excesses as well as the omnipresent dangers of society.”
—Mary Kay Blakely (20th century)
“You should go to picture-galleries and museums of sculpture to be acted upon, and not to express or try to form your own perfectly futile opinion. It makes no difference to you or the world what you may think of any work of art. That is not the question; the point is how it affects you. The picture is the judge of your capacity, not you of its excellence; the world has long ago passed its judgment upon it, and now it is for the work to estimate you.”
—Anna C. Brackett (18361911)