Secure Channels in The Real World
There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (e.g., couriers, homing pigeons, diplomatic bags, etc.) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.
In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie–Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e., very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper—conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages—will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.
It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.
Read more about this topic: Secure Channel
Famous quotes containing the words secure, channels, real and/or world:
“I do esteem individual liberty above everything. What is a nation for, but to secure the maximum of liberty to every individual? What do you think a nation is?a big business concern?”
—D.H. (David Herbert)
“It is worth the while to detect new faculties in man,he is so much the more divine; and anything that fairly excites our admiration expands us. The Indian, who can find his way so wonderfully in the woods, possesses an intelligence which the white man does not,and it increases my own capacity, as well as faith, to observe it. I rejoice to find that intelligence flows in other channels than I knew. It redeems for me portions of what seemed brutish before.”
—Henry David Thoreau (18171862)
“Well, most men have bound their eyes with one or another handkerchief, and attached themselves to some of these communities of opinion. This conformity makes them not false in a few particulars, authors of a few lies, but false in all particulars. Their every truth is not quite true. Their two is not the real two, their four not the real four; so that every word they say chagrins us and we know not where to set them right.”
—Ralph Waldo Emerson (18031882)
“Assumptions of male superiority are as widespread and deep rooted and every bit as crippling to the woman as the assumptions of white supremacy are to the Negro.... this is no more a mans world than it is a white world.”
—Student Non-Violent Coordinating Committee, African American civil rights organization. SNCC Position Paper (Women in the Movement)