Secure Channel - Secure Channels in The Real World

Secure Channels in The Real World

There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (e.g., couriers, homing pigeons, diplomatic bags, etc.) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.

In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie–Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e., very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper—conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages—will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.

It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.

Read more about this topic:  Secure Channel

Famous quotes containing the words real world, secure, channels, real and/or world:

    The things of this world reveal their essential absurdity when they are put in the Venetian context. In the unreal realm of the canals, as in a Swiftian Lilliput, the real world, with its contrivances, appears as a vast folly.
    Mary McCarthy (1912–1989)

    The climate of Ohio is perfect, considered as the home of an ideal republican people. Climate has much to do with national character.... A climate which permits labor out-of-doors every month in the year and which requires industry to secure comfort—to provide food, shelter, clothing, fuel, etc.—is the very climate which secures the highest civilization.
    Rutherford Birchard Hayes (1822–1893)

    The enthusiastic uprising of the people in our cause, is our great reliance; and we can not safely give it any check, even though it overflows, and runs in channels not laid down in any chart.
    Abraham Lincoln (1809–1865)

    If you’re treated a certain way you become a certain kind of person. If certain things are described to you as being real they’re real for you whether they’re real or not.
    James Baldwin (1924–1987)

    This world has many rings, like Saturn, and we live now on the outmost of them all. None can say deliberately that he inhabits the same sphere, or is contemporary, with the flower which his hands have plucked, and though his feet may seem to crush it, inconceivable spaces and ages separate them, and perchance there is no danger that he will hurt it.
    Henry David Thoreau (1817–1862)