GCHQ boffins quantum-busted its OWN crypto primitive

Remote control for virtualized desktops

While the application of quantum computers to cracking cryptography is still, for now, a futuristic scenario, crypto researchers are already taking that future seriously.

It came as a surprise to Vulture South to find that in October of this year, researchers at GCHQ's information security arm the CESG abandoned work on a security primitive because they discovered a quantum attack against it.

Presented to the ETSI here, with the full paper here, the documents outline the birth and death of a primitive the CESG called Soliloquy.

Primitives are building blocks in the dizzyingly-complex business of assembling a cryptosystem: individual modules that are expected to be very well-characterised before they're accepted into security standards (and, in the case of crypto like RC4, dropped when they're no longer safe).

Given that improving computer power is one of the ways a primitive can be broken, there's a constant background research effort into both creating the primitives of the future, and testing them before they're adopted and that's where Soliloquy comes in.

As the CESG paper states, Soliloquy was first proposed in 2007 as a cyclic-lattice key exchange primitive supporting between 3,000 and 10,000 bits for the public key. Between 2010 and 2013 presumably as part of their effort to case-harden the primitive before releasing it into the wild the boffins (Peter Campbell, Michael Groves and Dan Shepherd) developed what they call a reasonably efficient quantum attack on the primitive, and as a result, they cancelled the project.

The quantum algorithm they describe would work by creating a quantum fingerprint of the lattice Soliloquy creates; discreteise and bound the control space needed; and run a quantum Fourier transform over that control space, iteratively to get lots of samples approximating the lattice.

That's where the quantum attack is complete: after that, the samples would get fed into a classical lattice-based algorithm to recover the values you want in other words, the key.

The main challenge, the authors write, is to define to define a suitable quantum fingerprinter that could handle the control space.

Read the original here:
GCHQ boffins quantum-busted its OWN crypto primitive

7-year-old boy cleverly thwarts Apple’s iPhone security measures

Matthew Green, cryptography professor at Johns Hopkins, knows all about iPhone security and apparently so does his 7-year-old son, Harrison. According to CNN Money, the child was able to bypass Apple's Touch ID security measures and access Angry Birds Transformers using a simple physical attack.

But Tuesday morning at dawn, little Harrison crept into his parents' bedroom and walked over to his dad's side of the bed. He quietly reached for his father's iPhone, grabbed his right hand and pressed his large thumb onto the fingerprint scanner.

Apple recently increased iPhone and iPad security in iOS 8, encrypting data by default and protecting it in such a way that nobody, except the original owner, can access it via passcode or the biometrics of Touch ID. This improved security has caught the attention of the FBI, which claims these new security measures will hinder investigations and assist criminals. A recent court decision lessened the impact of this security, ruling that Touch ID was not protected by the Fifth Amendment.

Read the rest here:
7-year-old boy cleverly thwarts Apple's iPhone security measures

Chelsea Manning – Henrik “HAX” Alexandersson

NSA whistleblower Edward Snowden is stuck in Russia, only being able to reach out to the world by video link. The same goes for Wikileaks Julian Assange, in limbo at Ecuadors embassy in London. Journalist and web activist Barret Brown spends his time in custody, waiting to be sentenced after looking too close into outsourcing of US national security matters.

This is in a way better for the US government than just throwing people in jail.

If you compare this tothe case of whistleblower Chelsea Manningher 35 year prison sentence for exposing the truth is clearly a stain on US reputation.

Its more convenient for government to corner trouble makerselsewhere in the world or to constrain their actions with seemingly endlesslegal proceedings. It might not silence thembut it will hamper their work seriously. And you can (normally) do thiswithout enraginghuman rights activists, hacktivists, the media and the general public too much.

It all bears a chillingresemblance to the way the Soviets treated many of their dissidentsduring the Cold War.

/ HAX

Read more:
Chelsea Manning – Henrik “HAX” Alexandersson

2014: Das Internet im Jahr 1 nach Edward Snowden | Valentina Kerst | TEDxKoelnSalon – Video


2014: Das Internet im Jahr 1 nach Edward Snowden | Valentina Kerst | TEDxKoelnSalon
This talk was given at a local TEDx event, produced independently of the TED Conferences. Edward Snowden deckt 2013 auf, wie Staaten und Organisationen das Internet nutzen. Sascha Lobo ...

By: TEDx Talks

See the rest here:
2014: Das Internet im Jahr 1 nach Edward Snowden | Valentina Kerst | TEDxKoelnSalon - Video