Secure Channels in The Real World
There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (e.g., couriers, homing pigeons, diplomatic bags, etc.) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.
In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie–Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (e.g., the Diffie–Hellman problem in their proposal) is computationally infeasible (i.e., very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper—conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages—will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.
It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.
Read more about this topic: Secure Channel
Famous quotes containing the words secure, channels, real and/or world:
“Though there are wreck-masters appointed to look after valuable property which must be advertised, yet undoubtedly a great deal of value is secretly carried off. But are we not all wreckers contriving that some treasure may be washed up on our beach, that we may secure it, and do we not infer the habits of these Nauset and Barnegat wreckers, from the common modes of getting a living?”
—Henry David Thoreau (18171862)
“Not too many years ago, a childs experience was limited by how far he or she could ride a bicycle or by the physical boundaries that parents set. Today ... the real boundaries of a childs life are set more by the number of available cable channels and videotapes, by the simulated reality of videogames, by the number of megabytes of memory in the home computer. Now kids can go anywhere, as long as they stay inside the electronic bubble.”
—Richard Louv (20th century)
“Of the three forms of pride, that is to say pride proper, vanity, and conceit, vanity is by far the most harmless, and conceit by far the most dangerous. The meaning of vanity is to think too much of our bodily advantages, whether real or unreal, over others; while the meaning of conceit is to believe we are cleverer, wiser, grander, and more important than we really are.”
—John Cowper Powys (18721963)
“The world rolls round,mistrust it not,
Befalls again what once befell;
All things return, both sphere and mote,
And I shall hear my bluebirds note,
And dream the dream of Auburn dell.”
—Ralph Waldo Emerson (18031882)