Cryptography by Keith Martin
Author:Keith Martin
Language: eng
Format: epub
Publisher: W. W. Norton & Company
Published: 2020-03-30T16:00:00+00:00
How to Save the World
Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies).
Two intelligence agents sit tensely in a car, careering through busy city streets in a race against time. The driver is panicking and urgently talking to base. The passenger, the geeky agency computer analyst, has just inserted a recently purloined memory stick into a laptop computer. “What’s on there?” asks the driver. “It’s encrypted,” responds the analyst. “Can you break the code?” asks the driver. The analyst wrestles with the keypad while mysterious symbols dance across the screen, purses his lips, and slowly exhales. “I’ve never seen this means of encryption before; it’s unbelievably complex. Whoever wrote this knew what they were doing,” he says. “But can you crack it?” fires back the driver, as a timer on the screen hurtles second by second toward zero hour. The analyst grimaces and clatters his fingers over the keypad once more. The camera focuses on the laptop, where a digital Niagara of jumbled data is pouring down the screen. The driver runs a red light, overtakes a bus, and narrowly evades a head-on collision with a motorcycle. The analyst taps away at the keyboard, muttering to himself, eyes like saucers, staring in wonder at the festival of ciphertext on screen. The driver decides to take a shortcut and makes a sudden right turn, finding the way blocked by a garbage truck. The car screeches to a halt, and the driver sighs with despair as the timer enters the final seconds of its countdown. The analyst gasps, “I’ve got it!” And the world is saved, again.
Either the analyst has knowledge of an otherwise unknown unknown about cryptography, or (to get to the point of the issue as succinctly as possible) this is . . . nonsense.
What just happened? The cryptographic expert in the passenger seat reports that the encryption algorithm is unfamiliar. How did they work it out? Ciphertext from any decent encryption algorithm should appear to be randomly generated, so you shouldn’t normally be able to determine which algorithm was used to encrypt it just from idle inspection. But let’s set this problem aside. By somehow being able to deduce that none of the encryption algorithms he is familiar with have been used, the analyst is informing us that the algorithm is unknown to him. Since the analyst also indicates that whoever encrypted the data knew what they were doing, it is safe to assume the analyst has not extracted the decryption key from the memory stick (otherwise the key management is so poor that they certainly did not know what they were doing). So, the analyst knows neither the algorithm nor the key. Where, then, did the plaintext just come from?
There is only one conclusion. The analyst has, somehow, been able to try every possible algorithm and, for each of these algorithms, every possible key. Every possible algorithm? How many possible encryption algorithms could there be? It’s not even worth trying to reason about this; the number is so large that this capability can be safely dismissed.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Cryptography | Encryption |
Hacking | Network Security |
Privacy & Online Safety | Security Certifications |
Viruses |
Future Crimes by Marc Goodman(3002)
Mastering Python for Networking and Security by José Manuel Ortega(2950)
Blockchain Basics by Daniel Drescher(2890)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2511)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2483)
Practical Threat Detection Engineering by Megan Roddie & Jason Deyalsingh & Gary J. Katz(2353)
The Art Of Deception by Kevin Mitnick(2297)
The Code Book by Simon Singh(2209)
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(2207)
Machine Learning Security Principles by John Paul Mueller(1907)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(1895)
Wireless Hacking 101 by Karina Astudillo(1848)
DarkMarket by Misha Glenny(1847)
Hands-On AWS Penetration Testing with Kali Linux by Benjamin Caudill & Karl Gilbert(1842)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1839)
Mobile Forensics Cookbook by Igor Mikhaylov(1814)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1806)
Solidity Programming Essentials by Ritesh Modi(1794)
Bulletproof Android: Practical Advice for Building Secure Apps (Developer's Library) by Godfrey Nolan(1671)