New Data Encryption Method
Results 1 to 5 of 5

Thread: New Data Encryption Method

  1. #1

    Lightbulb New Data Encryption Method

    This article is about data encryption. There's a new method being researched at Harvard. I thought it was interesting os here's the story. Taken fromNewsfactor

    Last week, a U.S. District Court told the Justice Department that it could keep its keystroke-logging technology under wraps, even as the Feds used information gathered by the snoopware as evidence in the trial of alleged Mafia defendant Nicodemo Scarfo, Jr.

    While the government uncovered Scarfo's password for an encryption program called PGP (Pretty Good Privacy), a new form of encryption key generation being developed by a Harvard University professor may be upping the stakes for government cybersleuths.

    Now the edge may belong to users in a new encryption key scheme.

    Erasable Keys

    An encryption scheme reportedly in development by Harvard professor Michael Rabin and electrical engineer Woody Yang may usher in the next level of secrecy, using keys that are nearly impossible to duplicate and resulting in messages that disappear.

    Forrester senior analyst Frank Prince told NewsFactor that the idea for an improved key generation scheme and better encryption shows a great deal of promise.

    "If you get a key by applying a rule about sensing the environment, then the key only exists when the rule is applied to the environment," Prince said. "You could store it or not. It would only have to exist while you used it. You would have to know the rules and have the environment data to create the key."

    Keys Of All Kinds

    Possibilities for "environment data" in the scheme being created by Harvard's Rabin include satellite, Internet, cellular telephone and television broadcast transmissions, according to a report in New Scientist magazine.

    Prince said a similar technique is already employed in encryption systems that use "session keys" -- encryption keys for short-term use that are thrown away after the session is over.

    "This would be a great method for session key generation," he said.

    Satellite Secrets

    Professor Rabin reportedly envisions a variety of satellites that could broadcast random bits of data to be used as the keys. By producing more packets than could possibly be stored, the satellite system would provide a flow of public encryption keys that could be used by anyone in the world.

    While he said the idea could present a better key generation scheme, Prince said it would depend on how "heavy-duty" the mechanism is, meaning the cost of the system compared to the value of having a "largely untraceable session key."

    Remote_Access_
    Share on Google+

  2. #2
    Senior Member
    Join Date
    Sep 2001
    Posts
    800
    Good article thanks for the heads up. We should post more news articles since the AO news dissapeared. Keep it up.
    [gloworange]\"A hacker is someone who has a passion for technology, someone who is possessed by a desire to figure out how things work.\" [/gloworange]
    Share on Google+

  3. #3
    Junior Member
    Join Date
    Dec 2001
    Posts
    7

    Question

    Maybe I am missing something here... (Please don't flame me if I am!) ;^)

    If the keys are temporary and you never actually know what they are... I can see how this can be used for secure netwarking etc (like pgpnet), but does this not make this encryption technique useless for securing data ? I mean if you have a file you want to be private - either for storage or to mail to someone else, doesn't this make it useless for this?

    Is that the point - only for peer to peer use, for example?

    Please excuse a security learner if I have missed the point!
    They say the pen is mightier than the sword, the poet will never call the tyrant lord. But when the blade is raised, what will you do? When all you\'ve got is a pen and they\'re coming after you.
    Attila the Stockbroker
    Share on Google+

  4. #4

    Wink heh

    If the keys are temporary and you never actually know what they are...
    Heh, I never knew what they were in the first place.
    I just thought some one here would so I posted the info.
    Well I don't really know the point, I just thought some folks would just like to know.

    Remote_Access_
    Share on Google+

  5. #5
    Junior Member
    Join Date
    Dec 2001
    Posts
    7

    Wink Re: heh

    Originally posted by Remote_Access_


    Heh, I never knew what they were in the first place.
    I just thought some one here would so I posted the info.
    Well I don't really know the point, I just thought some folks would just like to know.

    Remote_Access_
    Thanks for that - I don't feel alone now! lol

    Jerry
    They say the pen is mightier than the sword, the poet will never call the tyrant lord. But when the blade is raised, what will you do? When all you\'ve got is a pen and they\'re coming after you.
    Attila the Stockbroker
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •