Secure Channels in The Real World
There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (e.g., couriers, homing pigeons, diplomatic bags, etc.) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.
In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie–Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e., very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper—conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages—will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.
It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.
Read more about this topic: Secure Channel
Famous quotes containing the words real world, secure, channels, real and/or world:
“...one of my motivating forces has been to recreate the world I know into a world I wish I could be in. Hence my optimism and happy endings. But Ive never dreamed I could actually reshape the real world.”
—Kristin Hunter (b. 1931)
“No Government can be long secure without a formidable Opposition. It reduces their supporters to that tractable number which can be managed by the joint influences of fruition and hope. It offers vengeance to the discontented, and distinction to the ambitious; and employs the energies of aspiring spirits, who otherwise may prove traitors in a division or assassins in a debate.”
—Benjamin Disraeli (18041881)
“Television is becoming a collagethere are so many channels that you move through them making a collage yourself. In that sense, everyone sees something a bit different.”
—David Hockney (b. 1937)
“The farmer imagines power and place are fine things. But the President has paid dear for his White House. It has commonly cost him all his peace, and the best of his manly attributes. To preserve for a short time so conspicuous an appearance before the world, he is content to eat dust before the real masters who stand erect behind the throne.”
—Ralph Waldo Emerson (18031882)
“Ghosts, we hope, may be always with usthat is, never too far out of the reach of fancy. On the whole, it would seem they adapt themselves well, perhaps better than we do, to changing world conditionsthey enlarge their domain, shift their hold on our nerves, and, dispossessed of one habitat, set up house in another. The universal battiness of our century looks like providing them with a propitious climate ...”
—Elizabeth Bowen (18991973)