What does "encryption" mean? – East-Tec

Turn your sensitive information into unintelligible data with east-tec InvisibleSecrets and east-tec SafeBit so that unauthorized parties cant exploit it.

In its original form encryption was first used by the ancient Egyptians, Mayans, then the Greeks and Romans in wartime and politics. They used it as a security practice to encode messages that can deceive the enemy. In its modern day application it is basically the method of turning plaintext information into unintelligible format (cipher), using different algorithms. This way, even if unauthorized parties manage to access the encrypted data, all they find is nothing but streams of unintelligent, alphanumerical characters.

Encryption has widely been used to protect data in numerous areas, such as e-commerce, online banking, cloud storage, online communication and so forth.

A simple example of a cipher can be, for instance, the replacing of the letters in a message with the ones one forward in the alphabet. So if your original message read Meet you at the cafe tonight the encrypted message reads as follows: Nffu zpv bu uif dbgf upojhiu

The encryption algorithm is the chain of calculations that determine what ways the input plain text will be transformed into the output ciphertext. In the simple example above there was only one calculation carried out, which moved each letter of the message one forward in the alphabet. Of course, advanced encryption software programs can generate extremely complicated algorithms to achieve complex ciphers. Encryption algorithms fall into two basic categories: symmetric, or asymmetric key algorithms. You can find their description further below.

To control the algorithm and the process of encryption/decryption, a key (password) is used. It is basically either a random binary key or a passphrase. It determines the exact pattern the algorithm uses to turn plaintext into ciphertext. To guarantee the secrecy of the key plays crucial role in protecting the privacy of the message because the key may initiate the process of encryption, decryption, or both. If a hacker manages to obtain the key, just by itself, even the most complex algorithm will fail to prevent the encrypted data from being decrypted, because algorithms are publicly known. So if the password is cracked by a hacker, he can use it to decrypt the encrypted confidential data with it. In order to reduce chances of the key getting hacked, it is highly recommended to create one which is a combination of letters, numbers and special characters, so is to frequently change the key. The key also has to have a particular size so that it can be considered safe. Using a virtual keyboard when entering the password is a must to protect it against keylogger malware that might be present on the PC. There are two fundamental ways of secure communication based on encryption algorithms and the significance of the key in both are explained right below.

Algorithms in this category use the same key for encrypting plaintext and decrypting ciphertext. The preparation for symmetric key based communication is as follows: The sender and the receiver need to securely exchange a secret key (password) prior to sending messages (for instance, in a private meeting, or via a phone call), and agree that the same key will be used for protecting all messages between them afterwards. Using symmetric key algorithms makes it easy for both parties to maintain secure communication once the secret key got exchanged in the beginning, because, unlike in the case of asymmetric algorithms, parties do not need to verify each time a communication is about to take place that it was indeed them who sent a message using a particular key. Symmetric key algorithms are also faster, consume less computer resources that asymmetric ones do and can handle large amount of data thats why they are used for general encryption. One of the disadvantages of this method is that if unauthorized parties manage to obtain the key from either the sender or the receiver, either during the time when it is being exchanged, or afterwards, they can easily decrypt any message sent between the original parties. Another noteworthy downside is the difficulty of maintaining and managing separate keys for each partner one communicates with. Our encryption suite, east-tec InvisibleSecrets, offers solutions for both problems. Its Secure Password Transfer feature guarantees protected password exchange between two computers and its Password Manager makes it easy to handle multiple passwords safely.

As opposed to symmetric key algorithms, asymmetric key algorithms use a key-pair (two randomly generated numeric strings) to control the encryption of plaintext and the decryption of ciphertext. The key used for encryption is a public-key, that is, the sender can encrypt a message with a key that was not secretly shared with the receiver in advance, but is available in specific directories for anyone to use. The other key of the pair, the private or secret key, is generated by complex mathematical processes and is linked to its public key pair. In other words, if a message, or file was encrypted with a public key, only its private key pair can decrypt it.

One of the inherent advantages of using asymmetric key algorithms for secure communication is that the sender and receiver do not need to exchange a secret key prior to sending secret messages, this way greatly decreasing the risk of the key getting hacked. This type of communication also allows the use of digital signatures which makes it easy to detect if a message got accessed in transit by unauthorized parties, because a digitally signed message can only be modified if the signature was first invalidated. Downside issues include the necessity of public key authentication each time a message is to be sent; then there is the scenario of private-key loss, when decryption of the encrypted message becomes impossible. Asymmetric algorithms are much slower and resource consuming than symmetric ones so they aren`t well suited for general communication purposes that involve computing large amounts of data. However, they offer a great way to protect small amount of data, such as the key (password) which needs to be securely exchanged. Most encryption software programs employ both symmetric and asymmetric algorithms where symmetric ones handle the bulk of the message and asymmetric ones protect the key.

The fast progress computing saw in the last two decades made it necessary for governments to set improved encryption standards that are able to provide secure protection against advanced hacking techniques. The present day top-security standard, set by the U.S. National Institute of Standards And Technology, is the Advanced Encryption Standard (AES) based on the Rijndael algorithm. Both east-tec InvisibleSecrets and east-tec SafeBit employ that method among others. More info on different algorithms further below.

The well-known and most used algorithms we are going to list below (which are also supported by our software products) fall into the category of block cipher algorithms. Block ciphers got a revealing name that describes how they work. They break the input text into blocks and process it block by block. Each block has a fixed size of bits, for instance 128. The full length of the input text gets split into the exact same sized blocks during the process of encryption and decryption.

Security of symmetric key block cipher algorithms depends on the key length. The length is measured in bits and the size defined as secure in AES is 128, but 192 and 256 bits are also used for extra security. If the key is shorter than that, chances are that it can be hacked by brute force and used to decrypt the encrypted confidential data.

east-tec InvisibleSecrets can be used for several encryption scenarios such as: file/folder encryption, password encryption, application encryption, and email encryption. In addition to these features, the software also lets you hide the very existence of any file. This method is called steganography, which is the process of disguising a file by making it look like something else than it really is. You can, for instance, hide a text file into an image file. Read more about this concept here.

east-tec SafeBit was designed to cover for volume encryption needs. It lets you encrypt entire disks by creating virtual drives (safes) where all your data is kept encrypted at all times. The software employs on-the-fly encryption so there is no need to encrypt/decrypt data each time you mount/dismount the safe. For extra safe data handling you can upload your encrypted safe into your cloud storage space, or copy it onto external hard drives. east-tec SafeBit has further security features that include: turn your USB & Flash Cards into safe keys, and key logger protection. The software also provides an extra layer of protection over your antivirus by storing your confidential data in a closed, encrypted safe.

Read more here:
What does "encryption" mean? - East-Tec

Edward Snowden: New Pentagon Source Shows Need for …

NSA whistleblower Edward Snowden. (Gage Skidmore / CC-BY-2.0)

Edward Snowden is calling for a complete overhaul of U.S. whistleblower protections after a new source from inside the Pentagon leaked a startling account of how the system became a trap for those seeking to expose wrongdoing by the government.

The Guardian reports:

The account of John Crane, a former senior Pentagon investigator, appears to undermine Barack Obama, Hillary Clinton and other major establishment figures who argue that there were established routes for Snowden other than leaking to the media.

Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake, in an episode that helps explain Snowdens 2013 National Security Agency disclosures. Not only did Pentagon officials provide Drakes name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence.

Snowden, responding to Cranes revelations, said he had tried to raise his concerns with colleagues, supervisors and lawyers and been told by all of them: Youre playing with fire.

He told the Guardian: We need iron-clad, enforceable protections for whistleblowers, and we need a public record of success stories. Protect the people who go to members of Congress with oversight roles, and if their efforts lead to a positive change in policy recognize them for their efforts. There are no incentives for people to stand up against an agency on the wrong side of the law today, and thats got to change.

Snowden continued: The sad reality of todays policies is that going to the inspector general with evidence of truly serious wrongdoing is often a mistake. Going to the press involves serious risks, but at least youve got a chance.

Continue reading.

Posted by Alexander Reed Kelly.

More Below the Ad

If you have trouble leaving a comment, review this help page. Still having problems? Let us know. If you find yourself moderated, take a moment to review our comment policy.

See the rest here:
Edward Snowden: New Pentagon Source Shows Need for ...

Cryptography: An Introduction (3rd Edition)

%PDF-1.3 % 4 0 obj << /Length 5 0 R /Filter /FlateDecode >> stream xOK189&iPxn]lMCHEr~/sy2bb hC0+z7}6OYm`_)}5eA{zS:)@WJh', ik_:9o;q Kdt ,lghVn@(+uc_O)!DA/ClonZ~^ endstream endobj 5 0 obj 242 endobj 2 0 obj << /Type /Page /Parent 3 0 R /Resources 6 0 R /Contents 4 0 R /MediaBox [0 0 612 792] >> endobj 6 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc1.0 7 0 R /Tc2.0 8 0 R >> >> endobj 9 0 obj << /Type /ExtGState /SM 0.02 >> endobj 10 0 obj << /Type /ExtGState /OPM 1 >> endobj 12 0 obj << /Length 13 0 R /Filter /FlateDecode >> stream x+T endstream endobj 13 0 obj 11 endobj 11 0 obj << /Type /Page /Parent 3 0 R /Resources 14 0 R /Contents 12 0 R /MediaBox [0 0 612 792] >> endobj 14 0 obj << /ProcSet [ /PDF ] >> endobj 16 0 obj << /Length 17 0 R /Filter /FlateDecode >> stream xrGx ,Tn=,hD5 >H~dVEH(de9ON_/fN?M?Na9}g7Y,r_XuiWf1]NM{:tmlLgw*Byyb2N~sl??$-bd}k_7p_SMg{02~kQ?2"b:t#^"5]OfTcR~!}WEGUOf]6RSH s,v6]A+*r>Tn[05& DV8@s q7fu5+<86d;mg3n@+(Ib`7%E9Uw'f$6&M6)&P]!>R/2SP(s5U4/rw8>ZN EIPu^E[;RF@< 4pv'C%plQh N)g^!4uK7H07T~8x_VuvGdUP<'[<4d&Ea-+:kF < k3SDEA-#&9zv2/cn" CwAI!2$dBnFlU1'HCW=1wL0Ya NK+J/jbw'Aqat=q"@uF)+~m^1^(RL1QPl:SPCnYmt3~ k39)#L9G0V`b|h4e_R_!S`& &+ .8B6C*KaRj2K/`+.szT-ahkp@c/#nrdKu1hCVYkX]c;u^w'e1_N$[V"f4P C72.^!d"j9#+HcVTRXNyxSiulw;mo% G|{ DY@!QL}d-SsIu;m9z^R j?VKh1[+-j/T9+7T#q%Ln^<~:K$Y'g*aweB5EPxy,iT UB4CEJ[mS5mGKby#09htFw!!zN6B}|VcdA#o#N4).-N?y5|@4K9Y_pn0s`G$s?"HLtQ`Ii,M.z,6` N"2.H=P[xR!oL[kW85pBU g=s@^aFL De)[h^d2[hD+V+tF_! =6K'zf ~y)$h4B,${). !,.$7j3}y8Vens"@96reJRf(N ?eKj5I$Ri,C mI5mQ'tB WA$b$L;`Po/ f R9@E,IRQ%rc^ hjVSTmJuFqeZ.`zmkPi!+ 0FQ/j:O6IABYV!gUtH/5fi/0HlCd K(x}L@B78VY;7nyaKe*% K|m#ukn5)nQOj(]A {@%~w7^X ;&1q@(a*di"Ck<9q;$,:~Mu> nE*<^}cHP5Z)3a]h:a q4|k)MM)o7-(_L 7O >JP2Tg&Uc 8KST2&g&V3"xhM4T"TzdZ1$t,"8Mrb^$a:r

+2a |/w1'T_bKnccHC^-9E=j7oxSIV U8u(1BG D"m%y $R/V=&/Jc}TJLW[>$D@?ymKdm1ZYy>cN_!sN T{~SpZQ}a:~;CF*0d]sU*f= 0 ]TeG?m wo <3E;2.cu}3@E(PY+QCyVP.">41z@HOkm_q(G.$kV*B q;^cf%p,M}m(,9q6Rt}RJyZ(Y7H&~b@K=qI#e7xTa]4"4E9?nu|E>ad>`5TZAc,D?Q4`f9|S$fuiF7k)RMcOvV=^;yNidM$^,M-b1 N/&]w- =DDB[<@,I3@xpz+ / I^fCQ%h:D`Tkd*> j:hEy^]L"<_(?zP2$V*8 C0p*V3mO-(E`fc[r CUw;Igu+>U&>+8o?w9;A:}% y?Nkb/&w'r?s:MO8PpN;bziQl+rqFs@!Xd d1@0V<9+Z&~!9/(7Hq. BG/` = z(P0h0O|!O]nXxJ'yCz1qv_L;`)`#KE:hctE^xTnn|%NSurxku7z Ot"zWEKv N/hFvBztLo;Ij%A*M:>H$f*c> !d,D`A/d0#$J]U]O^N#HQ(MM>BUi;|N.Ry<"!/%,q._ 75QGRB`TrJhZ@b^!y&q3`4=1>=PDB1Vp;~3d#nOXP2R!ST ic1OfL].7~}Fk!6me04eYR~)i>6;O5&D6*8#|m!& Htf~Bkem,(3}R:UNVn_$S20 US%dO95goEN4 /-"+EJQ 33 "A+gBoGY1T V*(a&i/O,W/G+n-}C:*g]O`rO endstream endobj 17 0 obj 6752 endobj 15 0 obj << /Type /Page /Parent 3 0 R /Resources 18 0 R /Contents 16 0 R /MediaBox [0 0 612 792] >> endobj 18 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc5.0 21 0 R /Tc6.0 22 0 R /Tc1.0 7 0 R /Tc4.0 20 0 R /Tc3.0 19 0 R >> >> endobj 24 0 obj << /Length 25 0 R /Filter /FlateDecode >> stream x+T endstream endobj 25 0 obj 11 endobj 23 0 obj << /Type /Page /Parent 3 0 R /Resources 26 0 R /Contents 24 0 R /MediaBox [0 0 612 792] >> endobj 26 0 obj << /ProcSet [ /PDF ] >> endobj 28 0 obj << /Length 29 0 R /Filter /FlateDecode >> stream xrWvH*Li2*phmO'YZ{w PtT^{tk~rz}Fr1=_e;.y,e3_w.t9x;o/gv.tvt?lu>~}f2{y.964-Bb[/owvUk.utq/Xu6B H9h:^%}9|10(nK>S0uAlRk'EWh,;vA#K{*eu68OB_k v:VBr}`:{AjGQ!i`1#ipTp ^$*4$:l"0+^U +9,S&!JG*.eIseT{~hSP(7@b=qn iDS>ei(J`aNoOi(~8Kra.;X[%?>7b8}icim,)"CvNcH C!&b BiihiDWH#l.]!m *H*l1P^pbf!R/*M6. ,)-Z L&s`(-S'CbDV9hB#G''Mep3?h?59>? V>I/`/O@F#r%&6,7vrM;]]V] >f6"cjFJzrAaHO768zKQuwRw.iUA31no-K-e~))^{VEv jc?fyj}lJ~Qk&m"Z7qGj{Fn4`(]7VRD(VhQ`JT+VLAD>pZzA}XjQcfwH['P{Aw{`"vk~db(}%xH?cKDYMhE0M&1`vy40~hA {ON4A#m509]$hl9Z5ZEB%0q)9T62KBEq!S3ke5('K%@:EXaU`%(5 5u:h+*ebMu^n!4=8;TjOZ .*3TDz,.)t2#q-lOZ_/Bf9"|>Sm=Z&N$RcOA] ,**0cR5bvI|]QK_T,4Gl,l{Sk~KTbPrZN/vp$?#lO8y3Jxj(KQ q 9Os(Wn+6FNFC/7ka(NtnA!hJN$h(R"#f" tEcshss n8qf1R^2P"H5S ib,KE`i %HVh2@M'%yn8;~y6cYooqBs$a{1%/tU8D%,y1`rQU"1M?|RoyR6xBaX% e8swpbjQ"ub=DBH`G$A+18;a[eGr&&'S&yV$O+aJ:(p^mEij,!X[+w$CXrKu/ .IAGlOJH`,Z*NW%-Gq5 <{:x:Fnw3m2"+T=(>=y/hLPj w%/}_?d=As9%m mY'yA*_`b #g=V898NCAX#o$j`9bt;zHM>hZ=!5D5T(-5r(U|7(X;PL};vc[s~};RIV.DJ w!q[YWLcON-d j(R_~2)}.vYhBG.`-T#)r5Q' N %w:Z%{3Nfpuq:BT|*]V(MGB l*6'f),MzF*o Y*|_T '=P!*A-' #7?t?~z^3T^6/p!d=&xaeKpb#!wyp.e2!Dr_JTDd6d_h*Ip4zhE"+Uy EpV-K_5+r9oX)L e3]F%vJjRh7R2X a*QB A>LoMTZU2BLCcPZ5*`Ww5Tc%a`hvvZ%^,ObH(8hpP J>uN>hluljfK>UZ )hKfH|R/QO+B0WEH-Tk_+]w^ [b8O=ye#eU*K5%ry 7E Bk tq"WfL}# (G'q>^{< ;hW`@@8E#>~&$D",LJK,Y8Eq8 {M'XObh|LU.f< bUcprdrVILJ`+-C'Q+GRo% 0p:k&G?M_DxSm,CuS124dxL4b~Yv&8ng2r-S5I 0}MKeWDe r@lQ|PeTwQ5WDe(1M)@`&J%&p*(*2CHWRZ)M,D.YEo^Kjq?#;ALQ1vl^AhFJH&q{xq2aP-On_}9*o|{}~/jrPNF39^jA^I?L%qO|s83`c{uY`P+L ES#DueYhhi-SP< [qZ@h$@mXK HD0o>ix A bJ4,R)Oyv@vT5CZQV`D )D$|1fMKTcd0^A%I7_ &rXhM.>{F7aaVMqkCR{e694iM VW"A% `3;+/3RyD{kI}zE4LNW0-@M^"EJZ!)6Aqsh,8#r;E^ 3|+:7EuB d;,^*~ W9>dpm;tx$8xR zYbULm^MBi%613^s'/B`^'w1e/q>e9bsKm$:5_&mo=k(3TIV:SrB[3sQJIE7nV>Ra>d=<24NLTz 64) JAO=0o6QLgFA?l98%(yW,7B8QuWps?+cNEe:6Y8:nxWDOh|h#{6vEjA9FRtP~dOwT&Jhv-w)%b.NLkQUxN[Kp'}1^?BDsxUYs9-m,%Wc~Pn]q??$wor;U)672 endstream endobj 29 0 obj 7463 endobj 27 0 obj << /Type /Page /Parent 3 0 R /Resources 30 0 R /Contents 28 0 R /MediaBox [0 0 612 792] >> endobj 30 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc7.1 32 0 R /Tc1.0 7 0 R /Tc8.1 34 0 R /Tc5.0 21 0 R /Tc9.0 35 0 R /Tc6.0 22 0 R /Tc4.0 20 0 R /Tc3.0 19 0 R >> >> endobj 37 0 obj << /Length 38 0 R /Filter /FlateDecode >> stream xY%b(qz1+dERg[*}8] V)|-C *y._wU7Ydhf<)Zahhnn.If SL+l n?1.ohRLC3m(Tza"tM$?;!am$pcWQ?nI*[c_MOmHNmMzP]Cz d>[ 8?zmQZJ_5MM@GEDWUWocPh/:_0Vlq<0e`LB|.`H`^c2Rr++F]04Oo&Z?CH y"eB^gt2Yo:#!6Ux%1^74BMZAtg~&QHpT"%{dE2Kez{)[yCXkh|4;b/o?A$Q=0H?Lb)k (uJ)oadC-B8G4Q|ugz;s;Y/!6|Dqx-X?|WB$X#^vV1 jo V~Bmcjc{IFk4LW.QiYTRen1@U6'I "H)00pLq8VY4b#H5B,612uq==+WHAE,LTV135fn:Ml |m] f*lvN1kCFH fB HT@h ?0'dZT[@TeCdMg`tHPPWTg(Ru|v bq+v6qcTY4pjo.5zJqij{oqBZ<,Kk{cLapsZ1S4FVF;*`4!> "*J*VMf_|M-}f7b lg"|$,zND+97?~,LLwUv'1DVVfsVgp~yz}_M?(]u#D"3|e24#p $+!pE+?C!hk+Ue{g,Az pih;'>O&BdOQOKFyk1=q[C6g#m)3vo=jw DY%W# */? K)`k$hl;b-,;qW5Ddk&/EUMMW CxP}+U`L_oBLN-rUyIp/+AlyntqPL Mw*kP#Sz8M'3GV! ]2aWp%6FSva].1{"g=h]Al9M4MFv_$VWw*{g5!e#sw{ B%9j,9cZ{G7wn 5n2y} Nfj:jfnufV{~V7Yk/1!|"k@A Z@Lw! Ppq(y(Bhd""xV39 w+8vd~vy7:dA ^kluDNL6QbS0^Y]h$ (M+%U4@~C2 EAxh3tN s*j UE&qM *.PhZU$WWIWU:Dw)BZ[F%0njCld}jO88@l5FT,@GZ.W HT2xAQ[ TI^SJ3S`t3hkjC!ax/++;o?d:gH]"uzE{6!z( CtC' [g4&zFiwgidc]5bn>wt=a_YuTN nc4b_Vk=zC}.cG;p4VF CJjL+[KqK9lF3ZrF^ojFR3m`Rl>L&i#1 in^;J@=AFvai`U&O$Jc 4LsWNNfi%w?$SB4)e/|p32fNcePB#1gDHO 3V=/tpb. oIfHV@bqGR]=8:qk1&BV-XZqhWC2)y (@6g.8<~ 9A6?cYz0qo!Ig b1 !jZlDcdhWij-^c7}P]A|gwH,S@7kg# H!ab5gB7^8O@R^"&DyWP#(=[}QO,:yS m/iZ:D;Ka|/7gp1]jOC:d&2ecAVy16kx8a/oKM9&hlG7(NHu-3`z~IaN'S &MyyG[`>u}9yqfvUq%(imaG[^X38JB!BrjR=n+[hg+''^!J}!,9zB4Piok.Dm 2!5{*vtNxiDN SE-dPyHkK^ `"xt 5D}cX KWX]bFIaF*.lLLbA;tTpqB`I6=f9 4*:K1{,tC,Pge[G8bF8$ DKS/p[Q|o f3 J.C,k=, 4kLWp~u>>L=Z-9H; Y} *2$*aXd=n5b,h~4.o4LwY{ha; 8av| '4xc!jRfeD=Qrl$4S}!^5I zY2e0!dMCr41mFuo`q,LI;+'.p=IpAli;n|`Y4"QKs^{NzX"B_K*D2>5xg{oN@Xr@T~;MCb1 ^Dnk%vWw|Vf%(:g ?%q7h0Z[<@=nz(KL,F.M/Zd}*(At0=qc[b;X/|zFFQ;">#kiX'}C[ATjl{ vV tbyxdAnJy76gT.N7c1k@R'4`f;&2=h^)UB=Y[$`>0pxG~ZfmlBNVoj3Z:#Lh&(t wI2:wM3Yl2@F'>^eY<>jiIZNx#KiV,-m55` ;mDbc{UL6ydad9;*i?R'7A,&]s.apojA ~N;y[Rlq$ pf{nR+j/9 ;Fd.xL$|/x+aQq5BQO")Sy-VNF3LU PZ[I]w4,^ Vt:|Ln& 7{`Os1C) M?`2*r8h^1!C[`*sB}a6*:|aa"tb g;=)<^G|4;6(VbY>fj "n'U=I G05j+8E:jeV0lPR'[>|Rlf&9Mj@YF! fd !PK)|(W7k>^rZrOo-/b}Uu[wH~/ycJ(84`opb d0qUT2u7!PW?_B}^y;%,6@dS|r 9'W/!=# j4<]BNhCIGNhn}PMghhBD'+9 t31_|T=p$PK0Fb"T 31>'&o8+d>|Z6|eSsu)*aT?FL!rs~ep hq1Q[#/cAjaOI4gc8)WufCdLfJ4HyJ0Y=_HZ)C0(( QCn6PkXQ2==XbhQ|bSR[ +t"m|oFz .Zsk:6[?8^ !G_@{_RZ0y'n{d.]7%uVVx?'Nx1{,ug[@8kSbHcJq=G^b4h*4kzUbpHA{ jW!b.2A qm(&Q|JQV2`>w/m;ERo03,fYt[/3WN.{Y=u[?p:%^6I W0Q@[58ZZ%S~{mC U^l> endobj 39 0 obj << /ProcSet [ /PDF /Text ] /ColorSpace << /Cs1 40 0 R /Cs2 41 0 R >> /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc9.0 35 0 R /Tc6.0 22 0 R /Tc5.0 21 0 R /Tc8.1 34 0 R /Tc3.0 19 0 R >> >> endobj 42 0 obj << /Length 43 0 R /N 3 /Alternate /DeviceRGB /Filter /FlateDecode >> stream xwTS7" %z ;HQIP&vDF)VdTG"cEb PQDEk 5Yg}PtX4XXffGD=H.d,P&s"7C$ E6<~&S2)212 "l+&Y4P%%g|eTI(L0_&l2E9r9hxgIbifSb1+MxL0oE%YmhYh~S=zU&AYl/$ZUm@O l^'lsk.+7o9V;?#I3eEKDd9i,UQ h A1vjpzN6pW pG@ K0iABZyCAP8C@&*CP=#t] 4}a ;GDxJ>,_@FXDBX$!k"EHqaYbVabJ0cVL6f3bX'?v 6-V``[a;p~2n5 &x*sb|! ' Zk! $l$T4QOt"yb)AI&NI$R$)TIj"]&=&!:dGrY@^O$ _%?P(&OJEBN9J@y@yCR nXZOD}J}/G3k{%Ow_.'_!JQ@SVF=IEbbbb5Q%O@%!ByM:e0G7 e%e[(R0`3R46i^)*n*|"fLUomO0j&jajj.w_4zj=U45n4hZZZ^0Tf%9->=cXgN].[7ASwBOK/X/_Q>QG[ `Aaac#*Z;8cq>[&IIMST`kh&45YYF9<|y+=X_,,S-,Y)YXmk]c}jc-v};]N"&1=xtv(}'{'IY) -rqr.d._xpUZMvm=+KG^WWbj>:>>>v}/avO8 FV>2 u/_$BCv< 5]s.,4&yUx~xw-bEDCHGKwFGEGME{EEKX,YFZ ={$vrK .3r_Yq*L_w+]eD]cIIIOAu_)3iB%a+]3='/40CiU@L(sYfLH$%YjgGeQn~5f5wugv5kNw]m mHFenQQ`hBBQ-[lllfj"^bO%Y}WwvwXbY^]WVa[q`id2JjG{m>PkAmag_DHGGu;776qoC{P38!9^rUg9];}}_~imp}]/}.{^=}^?z8hc' O*?f`gC/O+FFGGz)~wgbk?J9mdwi?cOO?w| x&mf endstream endobj 43 0 obj 2612 endobj 40 0 obj [ /ICCBased 42 0 R ] endobj 44 0 obj << /Length 45 0 R /N 1 /Alternate /DeviceGray /Filter /FlateDecode >> stream xVS?&@Xd1laE%&!0+PQTD@-hQ HEQwA J-VqaVIw ( E!aFGEAA8A*}f|on> ry(W67G$+2D8X19,X$?B2 yb>-fg))l=HM2G.i +#b$LxKzVt^'nC!vC7bs"!6 !@xb/Xo ~+l2p0f 0$HwbI } !'!fpx(SZ)tI @8+bC[B f.@,(fP=eY?@ASlpox%`JTHB }Fs3 }%-jF"IWqW^JtPK w^5tg?dvs>ttkG4*i s"jv3cf13/fbe3~e2!t6HZa%X cLs9f9bS=|tf] 9O7 a_`7V[<:K0[1pR3^O.N83" @N$]`p^z9`[+'w>l;@:pp ``*BCT-D1E;D$C!""@:8r AdyPiT@ yD0t 9h>-Gk=^A{):A)2A`N# 1xPH(# mN a#a4^1 n`8H%MD1@A, ka+L2$|H$*R1i7N! &d*D$.r4:yFBJBKJK"FB('Q&qHurlmW%%')C%DYO)4RSQ^HIIHKKIK(5(VZAD]:V:Szv/TCnQRPd,dX2222eJ2e*;&')g .[#W)w_nB&o)("_,HY@SO@8 aE"K1IH{nq%JJ+*N* ( Y#}ha4q9UT UTzUU=UUWLVQ;66WqGQGMCWSRi81]MY]I>:::y:M:u)vu;tO `A!0(18x5$)jjc7mcF47K3---,Z,3oyw-,}-,,2XUZO5.-5zF?llm66zqUvvAvvnkOuqp8c!y/rqb;U; 8upvaf3 gn71= tWy}|4XVkw9?iP &bE"E@VAAiA?+XtB }Vv7(<3#B6"6.uGdi@QW1w,-[bdKK &h1.2P{v =j89JyKG%&$%I>I{^'&H(4H*R5SWLE4ib?qm:$5C4*s092GW68+U* kX6:uS'9WrC|uC_yU_ S .q7kBn"FQYbNo,)%6%{muzT4thmle{wRvf(/oknMUU^uO^E{}VwusAM>}GZ?9xz>~!67V7)73?!#~G:mQccHsvxKb@ktkqmm~ 'N?tvQ3C::{~/^py.lw.c?[|kzr nn^ ?p{k;Yw&GWx_~54`3prcaCJGGeXdcZ55>/T_xeDW)&_Q}swOxO~_m>=cF endstream endobj 45 0 obj 2939 endobj 41 0 obj [ /ICCBased 44 0 R ] endobj 47 0 obj << /Length 48 0 R /Filter /FlateDecode >> stream xn$)Ci,c$["`,{PCxHJ~>z?"2#_uoqq7zz~y>_._7fxX~m[7nrXqm'_5Ng/~NyOx|-e+S0yax{| Nz_=]|;WQU/_fY%e|;?y= @ Z;f[}#b9EP!t3Z. c,,Tk9DU G # 1;Q,,L#!FE;EaH4.ARvi+U'=g> fae[22#?0 xD4SRW|o7E]f]#{g(mEC##7$-fM9_b_kf/'rrT"EO"l/.`_A2u xD_fmIzmU"~ ""~Y@FWJr"sRH&N-gvHUG!&bp-2f /2F)@0_}@=(,N_FA18c I2Lu ro94 b}'!V}*_5_I"Szn7;]ER*VI A!4Zk %>xfKE^X1/ J'R.'e|7@G9iN~0h7#3Kv{!aIe J8Ue"%p@BlTLjv Wibbp Z /qxMa^U}xX|*&xW5@{<8#TIn,$gA~8$~s9Wk aNv< u>[ !tZ )tJ1)%YyvMzOt[9[{8hU +t,,exV5x: aY@/7.3Y''+Qqsj Kua@7 '*;KH(FTGuHUUisHUyB myTURw/@U3=GpC,Hy[VBiWj0qF,&M{UV2B[&1`^KiAf+c1RCaV =J~Kp/OdiYb9L7at4[0Lx0gO8SC&-1X,1Oq2WVu 9zKrV.}RmGu+']GO^K+ 1pEHy'&H&LceE *VT9$)`*iB`0,1&"E[vl=hFA)[/bKG^@,)5, JkMxa`dpxc87l/3(Z[a(7u;jBrRF9)-d##Y "23Nj'/veM'0umj$ MytHC[`,C+'=!dZ $RxMIVVewSO%4gh^tTIY. uU]TGDt/w-+Z,d8!Vk&%>%7 YeK PJ- 3mUw( U&T[fIcHP/uiO4jh6gU3q8VPSPtzT*m`(kTbM0BBVZEExI,eQzbE N)Y(YTt:f b! 2uQG+e8RQI(Ov=*Yz,cjEQ uF/uCQq&=ep(NBr^L)}hWz#c=DT*"vps'A,7n#/ZA]9<_C@$.0+U] -NUp|M(w Cuj!6pe0^W8)XUZx$0 tISYN,k/m>oWPLrPFQ*K0Xe(["oiY>(#*9H%ljNa]]jk,L4zLRC::bM0 FDLm%*,V0jmlNV]<|HvU[P0 4z)8j}vTwMX]s~ bCa|{H7x|]pCdP?JEvRlR8V#,' `Ztr_3XZeZB_v_02{z#>6*EKT2#[]('PXcS'!y`D@yg42<@^4H`/SK S*FNOE>AuBpX_gI(z`$~C2fyTo|(Vn`i jy |Vi|`jZgi8R'{1`&i`3HpA-D_w o51:d u ndcseXSS&T*|OvX.bzX"B.7/]e^3FS,j;o!0{-y~sWL^"L?5mbWjEd$FIn7 B;&P05sb|s}G*LxA/m<{4B>=%c0;`*~!A)WbkZavs [0c=/9RweOn%s=>|R!B[^qGoZXL@l 3V'>{v&"/ D1I(LN |P=g X^B~j?Y(4@YYr)'`s p h -=HJ`h3|H~/R.2yA|xr/u'.D$ xGLvi.PeBFIb2eHA'9nBtk~,1]/E~3nk4H5L(@|]e.65r %&3yqi (j>z, ,c9x$% NJi?4L9-/ EK-^QjCDEE~_Bi 8^X+7)%4i-!5gjk1lT*3{h5=uc&/^q^YiK`6l2mH6^GIMC^kS(GJHug5@:"&1tk;,`m)ID6Gh#d}4r&tQPt.ZWUt!O`'}fRB,9bGtR5+c'Oy&6z )%$3NyPJWXk%TUb(#| SB4*li rX2*#(qKC>3D%:sQ~ALNNP-|* WTP"4I/PZe/I^2^e'TpLaWRL*elW}8z:NsPnP(L:T%j(> D!R=s0h ({: 4E&Mi!8aK kb[v#4Q(U 17Vz?Duc,@RZ%@!9f H :$ z7^N#MN.&!&?MZt3:S3b{Mg>)^RJW1z:R$$7"U+j0'rP 9gI6mIg`[R2DSY_uv`9;,9M[uWA?OX Zyx=4ZXJDudBYm>D;cAnjNIuY)]RlJ8o[Q'5Lk:/j:Wx~ 0fV+$2RT,ScDGjp]%QY{Julf:(zM+M,)xDy]7sH.f:i]jVPaB,sKPqbz6)@:}hR)#HJYb"()G)AF 2)~"$]?_( :n=!)^xz]1Wba89MsqR)}#fy&wjuRJ2uIkvn*3h@'W"9wP|(^I>bNnoIG=B -N_?dX'kT4[qV{heHGVKra,Ig,vI'fH)/rq.Nl''SQw9/*"""Z*5ICLCGt+?cQHTj&bnR_01"8M$ T`4(N>H@%Z+[AS) m(=(F5~8pT"8X(g9w2j% lPV6j:, _{b^|- ^=;Dq#3;v~"jX A{r xnHb#-XpP`2tq#A=SeBGig='$)jr4zNd5dF*W]%"~tV~bW|^yw4E0{EO+c SMpuq/)e1-GWLKgM`|t%HXD(V[3d*tpGg+,v%; endstream endobj 48 0 obj 8345 endobj 46 0 obj << /Type /Page /Parent 3 0 R /Resources 49 0 R /Contents 47 0 R /MediaBox [0 0 612 792] >> endobj 49 0 obj << /ProcSet [ /PDF /Text ] /ColorSpace << /Cs1 40 0 R /Cs2 41 0 R >> /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc5.0 21 0 R /Tc6.0 22 0 R /Tc9.0 35 0 R /Tc4.0 20 0 R /Tc3.0 19 0 R >> >> endobj 51 0 obj << /Length 52 0 R /Filter /FlateDecode >> stream x}nFsI%xNqm/^b-Gr$Oofw%UPrs?[$ndY//ygmjogiFjmvQ}5e?zIM~RvPv$'r9])[eyRrEebBPZZs9%?ZyMK{8mhN-hS KG)0lBWg5K# sqww$|)nRK (?%MJ_{{); > endobj 53 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc6.0 22 0 R /Tc9.0 35 0 R /Tc1.0 7 0 R /Tc3.0 19 0 R >> >> endobj 56 0 obj << /Length 57 0 R /Filter /FlateDecode >> stream xrV00%S"[[+UeZ4,TE`0>w>MwNgU*-Wk+K/We^e}f~Oi=eXrMG(G|o]TM^l77if6Ef;k_:.oI:d??7agS_>'Rj4{@ cQ${j$4@)V mffr9 OOUfdvC,u)P|;_g<,aa[l,0tK#M1ifoy6fAZ$v}^tuH#jb}= "< Nx}2}dyz51maoa1G&rlH/#_16UGA/ dr 4lR } >AsXiq-t+TH01X!6a& &P3+Xv0]A{iya[Y( C`D8~Ga&Q@ I4IZlU;)WuyW1|ydd)[5i}uJYH"s-I_]=cLq~r'B)Pm6y7x 9e-wh^l#uC.n2&a~.h* o$ Ay'c]|oLdesO$/{3Dr:uQAh4=4`ok1H!PKcCk CJy$,c6t0{UA >H"bGF. Z:h Ai^75zsM&$oM#B+R}>A),nF2MIr-{ ?N*!2Wzy{L*yJh/ooRC<|=^+1W%%u!kpcg9%f)-a<{UEk,>q1-,sBZV[Wyh%{X$:BpEXq$3y /Pm"I.Y%1IZWm^/f[zFa{e:BFc!R &pp4Y'ohI#Y:>14Jll'B( a.L>acE rk:;+G# AdWefjC NXQA#yXQ_eX^7hQU=oyX2~eC.:~&@<1:~L.:-OvGC|OIn_}zT9L|SUuh endstream endobj 57 0 obj 2901 endobj 54 0 obj << /Type /Page /Parent 55 0 R /Resources 58 0 R /Contents 56 0 R /MediaBox [0 0 612 792] >> endobj 58 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc3.0 19 0 R /Tc6.0 22 0 R /Tc1.0 7 0 R /Tc10.0 59 0 R >> >> endobj 61 0 obj << /Length 62 0 R /Filter /FlateDecode >> stream xx ,a4b)dK%sb<'tFVl))Hn@Jt.95??_|.tot+j`mrbwWu_Uruu5Om9uU7Mq6e.rU18nmro.czk._b~]#"Z9u7. Yg`uoM43dvP`f :F-iY4d%^V*S]D$t:Lf>7n4]yWoa_#=*2anPF[$&(j ( bEYqY)PxF]RbBfth{=x z2[M=0vFbNbX! FIj*VDaa> /Zo-6 L}o&[>}_w&.wwE~Vm7T wlXxkY/ ,K%q 4][oza%TxV?(ShN!P{fy;Tkbsc2}T=ptlr` 9wbbC/?^rEv$ii+ |?H[V_dCf_S!.*R`a"!!={l^2++m` V "hUY}51~8DR#+z-Hh/y";]3D{%Xj'kc5Kpy 6^2r{ baogy8E <5^r9B)df4xx;B Ri"i;4+IbQ~&za8Co /b%Q5Q0>w5V;OcF|5}f +R%!i|&95g+*iFmx`|=4Cm/Lm5W:&et<&DIiA"$ NmI0??;(Vs3pD)LhxZnIvu7%<1>s lP)!?SbJYy*8MtS_,Twsm&GS^dmI7Z?~/7XwYp6da5g s%t$*%^N_%T,jO^_j[mJ{jJL=sGz2&Z>i4R3j|9M&bj3OF|J`2g&8:<-+^8W Mg)['QQ90)=l%3-L]bIniCO gID88sq!:Ib00q_x}giK)delSEo.G(d@z*{34Q5xIj[D"%Tbg8qP~MZ4P7~m|Q T"YMKt!0lzcWm/lAf;@DQV%2CV9Exv -'Awp^|hdj-upoaA';slaGB@OU`DO$2w>#%6w"YFjnZS>6dV_N;|[ -~3u@S:4N0u:uh@<[pz:cph3,?Z6 5%u3yp~vH'=6cVe,TB~M,ix9 v,"^( 8HtPx:y)3-a=}].,/1YwOee}$6.Lr{y](9/T8sV>xv'A9L;j ('U6nNc~t=3zUm*/D?YOV_;;jCLJ[~"79OFiS}'H@v,PC2sL#HG$z"#4*~$ >?:&9~K 19VFCT$a+> {xHR)ak0U%0u+gr5J{&Wd9Qg2(?%e=l;&*wvRA&%'T{~"M}VB=%:[> endobj 63 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc3.0 19 0 R /Tc10.0 59 0 R /Tc6.0 22 0 R >> >> endobj 65 0 obj << /Length 66 0 R /Filter /FlateDecode >> stream xx dG.%V.,1/&zd%'Szm%_ $`2snCeC^!_w!?}?96_uQ3lV]}}oWE^og_|}2 MhU/rojbU&eN2$d9Wnw{8UU%evSE/DC7g mxY_q55MU3Enk1e>#.;e 3fep&Q=M#!$]EmnYs<.p^gF{gJ* ,U[hF'nV#deuZ I:Am/1 5f3WX g<|.\G|e#7YVZr!aG^_T$A SB00M4hZra6HsYPz@;pbp&z /T@rC|{_50Elimz*f#^R f]Vuy<u}90/?.|ajS6#&hg $vS b)&:+:^<)l45|Dp@zRAk$M=^P-CK'u$LK`v49m+~ v)z/" UI.xL,<)^JB5?$[Xb`W}@U@-?Q a({~.fPYQ_~$Rbx?:jGRO>1J>PJ(DJ(Qzo)Egt'u9;JIA$7I=.g,Ps]#2")/Qm~adX>R9EH{P9Z?bI1LN+ 58cC>TGmRs$}T>>0w%#Q"r |Y2re]$:j3(>f])5];kaGJp;sgFDZfxhWP3d}f [ZWa{WRXkV")r?/IVv$/`)"1Bn ?WH;@K:PJUv:sB`YbV A{w"P_ZZw!WPX EN9^LjNvktD&Q]La)0GPtja9 $',#>JNI<#crlC(9$5quEp#%:>!LRGU)*fM0>j+O`DIJ[(Z7' mB'l cu*P4I#%"7c,_6~Y}##V6Jr)-G!Ha^SQ q~aC^w%qu?}+t]z_xJP!S/c>iq,8:SNF7Tb p_/?Q-NG:#0p l@ox` i0xJLybP? @C endstream endobj 66 0 obj 3523 endobj 64 0 obj << /Type /Page /Parent 55 0 R /Resources 67 0 R /Contents 65 0 R /MediaBox [0 0 612 792] >> endobj 67 0 obj << /ProcSet [ /PDF /Text ] /ExtGState << /Gs1 9 0 R /Gs2 10 0 R >> /Font << /Tc6.0 22 0 R /Tc10.0 59 0 R /Tc8.1 34 0 R /Tc3.0 19 0 R >> >> endobj 69 0 obj << /Length 70 0 R /Filter /FlateDecode >> stream xr `pe%6r0.Ml)3$SZ,9{zSMS^Uuu]]CU~VZOwy_}Yg1>vEWU|Sn,|sv+tC/k!u{-~Zm>ng9W`De67m>lrkw'[6tc^1 2C3 K7}QvXzi2|.5w:$B|#2'oGGknikWtCyw)@@mT"0^KAd39Lf8=`F+y(0ygnG0Us(YqLCKj6ISt#/Ez^lBO{-wC&a]@w,F)(0q",$C^w7+go^n(E; VrF K8pnT9}R /JCc '18# 4kDWD"lc#eAxi3K@[W"tiwgik8L rs*Bf@Rtt5kMqF|b(*I mH?'fE!aKzh:!{A+ETGuX=wekMD M C,p0+MZAdy'o^8a(E{(a$,MmeZMVKv(W^clyiZ+8 o15x RzyhiFb.#$#}Wt8$_VR32IUQ"@0[>#XB#_a/rodHYR(I,CfbbL2X^LE%n4N6VJ,pz*4v}13co oQGq+T:.q9Z"*M"M1$T*&r%`Gv6 $l+ gER^b+"'b,r!-bMBn@$D$Wkz*14HgM9<9*KYOSy1nS*1DiM{t&O1|4*}RX9&}5&hIKvF~i~ P~wEM{(me*v39vy|VCQO| = (Y Rll1gX^ al4oCji&-)0ZVe#6Rrdh }Gnjuub8qIO6$]"2Qn)Mb eCuCYt_ }=BA|Biau}6y-c,DzR|1Z oHC?ckt@(#:qLN_zjq1E*LHR_jKU:3}pA_$SrALUU]8(lFzYday([lR~dJ_>`Uv%=*f3B"bkb%"32E&jDS>1 p`A l,ar-4<2.8d2&ILKHM7-Z ~Cia@T/3%Cn0uxx87P27 e6gK{ ^=SDb)#U!=e%jTM PiajXQ!D9si1H-5C$nx+a2.F,!Z=Jg3N MH%3Gjvm)VGiIf:UEI'65rHvnxG=0:nlNogC[Jg/ETr~mJG{ Zrq 0Ro74}NU1!B!i65[d,a u_C5WqD`ju'_p;-Or*),8[1xWY#I/ E2ULnh:SD5I%! jQ9=r;K'r

Originally posted here:
Cryptography: An Introduction (3rd Edition)

Chapter 7: The Role of Cryptography in Information Security …

After its human resources, information is an organizations most important asset. As we have seen in previous chapters, security and risk management is data centric. All efforts to protect systems and networks attempt to achieve three outcomes: data availability, integrity, and confidentiality. And as we have also seen, no infrastructure security controls are 100% effective. In a layered security model, it is often necessary to implement one final prevention control wrapped around sensitive information: encryption.

Encryption is not a security panacea. It will not solve all your data-centric security issues. Rather, it is simply one control among many. In this chapter, we look at encryptions history, its challenges, and its role in security architecture.

Cryptography is a science that applies complex mathematics and logic to design strong encryption methods. Achieving strong encryption, the hiding of datas meaning, also requires intuitive leaps that allow creative application of known or new methods. So cryptography is also an art.

The driving force behind hiding the meaning of information was war. Sun Tzu wrote,

Of all those in the army close to the commander none is more intimate than the secret agent; of all rewards none more liberal than those given to secret agents; of all matters none is more confidential than those relating to secret operations.

Secret agents, field commanders, and other human elements of war required information. Keeping the information they shared from the enemy helped ensure advantages of maneuver, timing, and surprise. The only sure way to keep information secret was to hide its meaning.

Early cryptographers used three methods to encrypt information: substitution, transposition, and codes.

One of the earliest encryption methods is the shift cipher. A cipher is a method, or algorithm, that converts plaintext to ciphertext. Caesars shift cipher is known as a monoalphabetic substitution shift cipher. See Figure 7-1.

Figure 7- 1: Monoalphabetic Substitution Shift Cipher

The name of this cipher is intimidating, but it is simple to understand. Monoalphabetic means it uses one cipher alphabet. Each character in the cipher alphabettraditionally depicted in uppercaseis substituted for one character in the plaintext message. Plaintext is traditionally written in lowercase. It is a shift cipher because we shift the start of the cipher alphabet some number of letters (four in our example) into the plaintext alphabet. This type of cipher is simple to use and simple to break.

In Figure 7-1, we begin by writing our plaintext message without spaces. Including spaces is allowed, but helps with cryptanalysis (cipherbreaking) as shown later. We then substitute each character in the plaintext with its corresponding character in the ciphertext. Our ciphertext is highlighted at the bottom.

Looking at the ciphertext, one of the problems with monoalphabetic ciphers is apparent: patterns. Note the repetition of O and X. Each letter in a language has specific behavior, or socialization, characteristics. One of them is whether it is used as a double consonant or vowel. According to Mayzner and Tresselt (1965), the following is a list of the common doubled letters in English.

LL EE SS OO TT FF RR NN PP CC

In addition to doubling, certain letter pairs commonly appear in English text:

TH HE AN RE ER IN ON AT ND ST ES EN OF TE ED OR TI HI AS TO

Finally, each letter appears in moderate to long text with relative frequency. According to Zim (1962), the following letters appear with diminishing frequency. For example, e is the most common letter in English text, followed by t, etc.

ETAON RISHD LFCMU GYPWB VKXJQ Z

Use of letter frequencies to break monoalphabetic ciphers was first documented by Abu Yusuf Yaqub ibnis-haq ibn as-Sabbath ibn om-ran ibn Ismail al-Kindi in the ninth century CE (Singh, 1999).al-Kindi did what cryptanalysts (people to try to break the work of cryptographers) had been trying to do for centuries: develop an easy way to break monoalphabetic substitution ciphers. Once the secret spread, simple substitution ciphers were no longer safe. The steps are

Eventually, this frequency analysis begins to reveal patterns and possible words. Remember that the letters occur with relative frequency. So this is not perfect. Letter frequency, for example, differs between writers and subjects. Consequently, using a general letter frequency chart provides various results depending on writing style and content. However, by combining letter socialization characteristics with frequency analysis, we can work through inconsistency hurdles and arrive at the hidden plaintext.

Summarizing, monoalphabetic substitution ciphers are susceptible to frequency and pattern analysis. This is one of the key takeaways from this chapter; a bad cipher tries to hide plaintext by creating ciphertext containing recognizable patterns or regularly repeating character combinations.

Once al-Kindi broke monoalphabetic ciphers, cryptographers went to work trying to find a stronger cipher. Finally, in the 16th century, a French diplomat developed a cipher that would stand for many decades (Singh, 1999). Combining the work and ideas of Johannes Trithemius, Giovanni Porta, and Leon Battista Alberti, Blaise de Vigenre created the Vigenre cipher.

Vigenres cipher is based on a Vigenre table, as shown in Figure 7-2. The table consists of 27 rows. The first row of lower case letters represents the plaintext characters. Each subsequent row represents a cipher alphabet. For each alphabet, the first character is shifted one position farther than the previous row. In the first column, each row is labeled with a letter of the alphabet. In some tables, the letters are replaced with numbers representing the corresponding letters position in the standard alphabet. For example, A is replaced with 1, C with 3, etc.

Figure 7- 2: Vigenre Table

A key is required to begin the cipher process. For our example, the key is FRINGE. The message we wish to encrypt is get each soldier a meal.

Write the key above the message so that each letter of the key corresponds to one letter in the message, as shown below. Repeat the key as many times as necessary to cover the entire message

MWCSHHNKXZKNKJJALFR

Figure 7- 3: Selection of Table Rows Based on Key

Our encrypted message used six cipher alphabets based on our key. Anyone with the key and the layout of the table can decrypt the message. However, messages encrypted using the Vigenre cipher are not vulnerable to frequency analysis. Our message, for example, contains four es as shown in red below. A different cipher character represents each instance of an e. It is not possible to determine the relative frequency of any single letter. However, it is still vulnerable to attack.

MWCSHHNKXZKNKJJALFR

Although slow to gain acceptance, the Vigenre cipher was a very strong and seemingly unbreakable encryption method until the 19th century. Charles Babbage and Friedrich Wilhelm Kasiski demonstrated in the mid and late 1800s respectively that even polyalphabetic ciphers provide trails for cryptanalysts. Although frequency analysis did not work, encrypted messages contained patterns that matched plaintext language behaviors. Once again, a strong cipher fell because it could not distance itself from the characteristics of the plaintext language.

Other attempts to hide the meaning of messages included rearranging letters to obfuscate the plaintext: transposition. The rail fence transposition is a simple example of this technique. See Figure 7-4. The plaintext, giveeachsoldierameal, is written with every other letter on a second line. To create the ciphertext, the letters on the first line are written first and then the letters on the second. The resulting cipher text is GVECSLIRMAIEAHODEAEL.

Figure 7- 4: Rail Fence Transposition

The ciphertext retains much of the characteristic spelling and letter socialization of the plaintext and its corresponding language. Using more rows helped, but complexity increased beyond that which was reasonable and appropriate.

In addition to transposition ciphers, codes were also common prior to use of contemporary cryptography. A code replaces a word or phrase with a character. Figure 7-5 is a sample code. Using codes like our example was a good way to obfuscate meaning if the messages are small and the codebooks were safe. However, using a codebook to allow safe communication of long or complex messages between multiple locations was difficult.

Figure 7- 5: Code Table

The first challenge was creating the codes for appropriate words and phrases. Codebooks had to be large, and the effort to create them was significant: like writing an English/French dictionary. After distribution, there was the chance of codebook capture, loss, or theft. Once compromised, the codebook was no longer useful, and a new one had to be created. Finally, coding and decoding lengthy messages took time, time not available in many situations in which they were used.

Codes were also broken because of characteristics inherent in the plaintext language. For example, and, the, I, a, and other frequently occurring words or letters could eventually be identified. This provided the cryptanalysts with a finger hold from which to begin breaking a code.

To minimize the effort involved in creating and toting codebooks, cryptographers in the 16th century often relied on nomenclators. A nomenclator combines a substitution cipher with a small code set, as in the famous one shown in Figure 7-6. Mary Queen of Scots and her cohorts used this nomenclator during a plot against Queen Elizabeth I (Singh, 1999). Thomas Phelippes (cipher secretary to Sir Francis Walsingham, principal secretary to Elizabeth I) used frequency analysis to break it. Phelippes success cost Queen Mary her royal head.

Figure 7- 6: Nomenclator of Mary Queen of Scots (Singh, 1999, loc. 828)

Between the breaking of the Vigenre cipher and the 1970s, many nations and their militaries attempted to find the unbreakable cipher. Even Enigma fell to the technology-supported insights of Marian Rejewski and Alan Turing. (If you are interested in a good history of cryptography, including transposition ciphers and codes, see The Code Book by Simon Singh.)

Based on what we learn from the history of cryptography, a good cipher

makes it impossible to find the plaintext m from ciphertext c without knowing the key. Actually, a good encryption function should provide even more privacy than that. An attacker shouldnt be able to learn any information about m, except possibly its length at the time it was sent (Ferguson, Schneier, & Kohno, 2010, p. 24).

Achieving this ideal requires that any change to the plaintext, no matter how small, must produce a drastic change in the ciphertext, such that no relationship between the plaintext and the resulting ciphertext is evident. The change must start at the beginning of the encryption process and diffuse throughout all intermediate permutations until reaching the final ciphertext. Attempting to do this before the late 20th century, and maintain some level of business productivity, was not reasonable. Powerful electronic computers were stuff of science fiction. Today, we live in a different world.

The standard cipher in use today is the Advanced Encryption Standard (AES). It is a block cipher mode that ostensibly meets our definition of an ideal cipher. However, it has already been broken on paper. AES is a symmetric cipher, meaning that it uses a single key for encryption and decryption. Cryptanalysts have theoretically broken it, but we need better computers to test the discovered weaknesses. It will be some time before private industries have to worry about changing their encryption processes.

A block cipher mode features the use of a symmetric key block cipher algorithm (NIST, 2010). Figure 7-7 depicts a simple block cipher. The plaintext is broken into blocks. In todays ciphers, the block size is typically 128 bits. Using a key, each block passes through the block algorithm resulting in the final ciphertext. One of the problems with this approach is lack of diffusion. The same plaintext with the same key produces the same ciphertext. Further, a change in the plaintext results in a corresponding and identifiable change in the ciphertext.

Figure 7- 7: Simple Block Cipher (Electronic codebook, 2012)

Because of the weaknesses in simple block algorithms, cryptographers add steps to strong ciphers. Cipher block chaining (CBC), for example, adds diffusion by using ciphertext, an initialization vector, and a key. Figure 7-8 graphically depicts the encipher process ( = XOR). The initialization vector (IV) is a randomly generated and continuously changing set of bits the same size as the plaintext block. The resulting ciphertext changes as the IV changes. Since the key/IV pair should never be duplicated, the same plaintext can theoretically pass through the cipher algorithm using the same key and never produce the same ciphertext.

Figure 7- 8: Cipher-block Chaining Cipher Mode (Cipher-block chaining, 2012)

When the CBC cipher begins, it XORs the plaintext block with the IV and submits it to the block algorithm. The algorithm produces a block of ciphertext. The ciphertext from the first block is XORed with the next block of plaintext and submitted to the block algorithm using the same key. If the final block of plaintext is smaller than the cipher block size, the plaintext block is padded with an appropriate number of bits. This is stronger, but it still fell prey to skilled cryptanalysts.

AES, another block cipher mode, uses a more sophisticated approach, including byte substitution, shifts, column mixing, and use of cipher-generated keys for internal processing (NIST, 2001). It is highly resistant to any attack other than key discovery attempts. However, cryptanalysts have theoretically broken AES (Ferguson, Schneier, & Kohno, 2010). This does not mean it is broken in practice; it is still the recommended encryption method for strong data protection.

For additional information on attacks against modern ciphers, see Cryptography Engineering: Design Principles and Practical Applications by Niels Ferguson, Bruce Schneier, and Tadayoshi Kohno.

The processes underlying all widely accepted ciphers are and should be known, allowing extensive testing by all interested parties: not just the originating cryptographer. We tend to test our expectations of how our software development creations should work instead of looking for ways they deviate from expected behavior. Our peers do not usually approach our work in that way. Consequently, allowing a large number of people to try to break an encryption algorithm is always a good idea. Secret, proprietary ciphers are suspect. A good encryption solution follows Auguste Kerckhoffs principle:

The security of the encryption scheme must depend only on the secrecy of the key and not on the secrecy of the algorithm (Ferguson, Schneier, & Kohno, 2010, p. 24)

If a vendor, or one of your peers, informs you he or she has come up with a proprietary, secret cipher that is unbreakable, that person is either the foremost cryptographer of all time or deluded. In either case, only the relentless pounding on the cipher by cryptanalysts can determine its actual strength.

Now that we have established the key as the secret component of any well-tested cipher, how do we keep our keys safe from loss or theft? If we lose a key, the data it protects is effectively lost to us. If a key is stolen, the encrypted data is at higher risk of discovery. And how do we share information with other organizations or individuals if they do not have our key?

AES is a symmetric cipher; it uses the same key for both encryption and decryption. So, if I want to send AES-encrypted information to a business partner, how do I safely send the key to the receiver?

Managing keys requires three considerations:

Many organizations store key files on the same system, and often the same drive, as the encrypted database or files. While this might seem like a good idea if your key is encrypted, it is bad security. What happens if the system fails and the key is not recoverable? Having usable backups helps, but backup restores do not always work as planned

Regardless of where you keep your key, encrypt it. Of course, now you have to decide where to store the encryption key for the encrypted encryption key. None of this confusion is necessary if you store all keys in a secure, central location. Further, do not rely solely on backups. Consider storing keys in escrow, allowing access by a limited number of employees (key escrow, n.d.). Escrow storage can be a safe deposit box, a trusted third party, etc. Under no circumstances allow any one employee to privately encrypt your keys.

Encrypted keys protecting encrypted production data cannot be locked away and only brought out by trusted employees as needed. Rather, keep the keys available but safe. Key access security is, at its most basic level, a function of the strength of your authentication methods. Regardless of how well protected your keys are when not used, authenticated users (including applications) must gain access. Ensure identity verification is strong and aggressively enforce separation of duties, least privilege, and need-to-know.

Most, if not all, attacks against your encryption will try to acquire one or more of your keys. Use of weak keys or untested/questionable ciphers might achieve compliance, but it provides your organization, its customers, and its investors with a false sense of security. As Ferguson, Schneier, and Kohno (2010) wrote,

In situations like this (which are all too common) any voodoo that the customer [or management] believes in would provide the same feeling of security and work just as well (p. 12).

So what is considered a strong key for a cipher like AES? AES can use 128-, 192-, or 256-bit keys. 128-bit keys are strong enough for most business data, if you make them as random as possible. Key strength is measured by key size and an attackers ability to step through possible combinations until the right key is found. However you choose your keys, ensure you get as close as possible to a key selection process in which all bit combinations are equally likely to appear in the key space (all possible keys).

It is obvious from the sections on keys and algorithms that secrecy of the key is critical to the success of any encryption solution. However, it is often necessary to share encrypted information with outside organizations or individuals. For them to decrypt the ciphertext, they need our key.

Transferring a symmetric cipher key is problematic. We have to make sure all recipients have the key and properly secure it. Further, if the key is compromised in some way, it must be quickly retired from use by anyone who has it. Finally, distribution of the key must be secure. Luckily, some very smart cryptographers came up with the answer.

In 1978, Ron Rivest, Adi Shamir, and Leonard Adelman (RSA) publicly described a method of using two keys to protect and share data; one key is public and the other private. The organization or person to whom the public key belongs distributes it freely. However, the private key is kept safe and is never shared. This enables a process known as asymmetric encryption and decryption.

As shown in Figure 7-9, the sender uses the recipients public key to convert plaintext to ciphertext. The ciphertext is sent and the recipient uses her private key to recover the plaintext. Only the person with the private key corresponding to the public key can decrypt the message, document, etc. This works because the two keys, although separate, are mathematically entwined.

Figure 7- 9: Asymmetric Cryptography (Microsoft, 2005)

At a very high level, the RSA model uses prime numbers to create a public/private key set:

There is more to asymmetric key creation, but this is close enough for our purposes.

When someone uses the public key, or the product of the two primes, to encrypt a message, the recipient of the ciphertext must know the two prime numbers that created it. If the primes were small, a brute force attack can find them. However, use of extremely large primes and todays computing power makes finding the private key through brute force unlikely. Consequently, we can use asymmetric keys to share symmetric keys, encrypt email, and various other processes where key sharing is necessary.

The Diffie-Hellman key exchange method is similar to the RSA model and it was made public first. However, it allows two parties who know nothing about each other to establish a shared key. This is the basis of SSL and TLS security. An encrypted session key exchange occurs over an open connection. Once both parties to the session have the session key (also know as a shared secret), they establish a virtual and secure tunnel using symmetric encryption.

So why not throw out symmetric encryption and use only asymmetric ciphers? First, symmetric ciphers are typically much stronger. Further, asymmetric encryption is far slower. So we have settled for symmetric ciphers for data center and other mass storage encryption and asymmetric ciphers for just about everything else. And it works for now.

Although not really encryption as we apply the term in this chapter, the use of asymmetric keys has another use: digital signatures. If Bob, for example, wants to enable verification that he actually sent a message, he can sign it.

Refer to Figure 7-10. The signature process uses Bobs private key, since he is the only person who has it. The private key is used as the message text is processed through a hash function. A hash is a fixed length value that represents the message content. If the content changes, the hash value changes. Further, an attacker cannot use the hash value to arrive at the plain text.

Figure 7- 10: Digital Signing (Digital signature, 2012)

When Alice receives Bobs message, she can verify the message came from Bob and is unchanged: if she has Bobs public key. With Bobs public key, she rehashes the message text. If the two hash values are the same, the signature is valid, and the data reached Alice unchanged.

If hash values do not match, either the message text changed or the key used to create the signature hash value is not Bobs. In some cases, the public key might not be Bobs. If attacker, Eve, is able to convince Alice that a forged certificate she sends to her is Bobs key, Eve can send signed messages using a forged Bob key that Alice will verify. It is important for a recipient to be sure the public key used in this process is valid.

Verifying the authenticity of keys is critical to asymmetric cryptography. We have to be sure that the person who says he is Bob is actually Bob or that the bank Web server we access is actually managed by our bank. There are two ways this can happen: through hierarchical trust or a web of trust.

Private industry usually relies on the hierarchical chain-of-trust model that minimally uses three components:

The CA issues certificates binding a public key to a specific distinguished name provided by the certificate applicant (subject). Before issuing a certificate, however, it validates the subjects identity. One verification method is domain validation. The CA sends an email containing a token or link to the administrator responsible for the subjects domain. The recipient address might take the form of postmaster@domainname or root@domainname. The recipient (hopefully the subject or the subjects authorized representative) then follows verification instructions.

Another method, and usually one with a much higher cost for the requestor, is extended validation (EV). Instead of simple administrator email exchange, a CA issuing an EV steps through a rigorous identity verification process. The resulting certificates are structurally the same as other certificates; they simply carry the weight of a higher probability that the certificate holder is who they say they are, by

A simple certificate issuance process is depicted in Figure 7-11. It is the same whether you host your own CA server or use a third party. The subject (end-entity) submits an application for a signed certificate. If verification passes, the CA issues a certificate and the public/private key pair. Figure 7-12 depicts the contents of my personal VeriSign certificate. It contains identification of the CA, information about my identity, the type of certificate and how it can be used, and the CAs signature (SHA1 and MD5 formats).

Figure 7- 11: PKI (Ortiz, 2005)

The certificate with the public key can be stored in a publicly accessible directory. If a directory is not used, some other method is necessary to distribute public keys. For example, I can email or snail-mail my certificate to everyone who needs it. For enterprise PKI solutions, an internal directory holds all public keys for all participating employees.

Figure 7- 12: Personal Certificate

The hierarchical model relies on a chain of trust. Figure 7-13 is a simple example. When an application/system first receives a subjects public certificate, it must verify its authenticity. Because the certificate includes the issuers information, the verification process checks to see if it already has the issuers public certificate. If not, it must retrieve it. In this example, the CA is a root CA and its public key is included in its root certificate. A root CA is at the top of the certificate signing hierarchy. VeriSign, Comodo, and Entrust are examples of root CAs.

See the article here:
Chapter 7: The Role of Cryptography in Information Security ...

Swedish court upholds Julian Assange arrest warrant – cnn.com

Assange's legal team immediately issued its own statement, saying it will appeal to a higher court.

He's wanted in Sweden on rape allegations, and the United Kingdom arrested him in 2010. He has said he's afraid that if he leaves the embassy, he could end up being extradited and facing the death penalty in the United States over allegations of revealing government secrets through his site, WikiLeaks.

The statement from Swedish prosecutor Marianne Ny said there's still probable cause against Assange on the rape charge as well as reason to believe he will flee to avoid prosecution. Prosecutors have asked Ecuador to let them question Assange at its embassy in London, Ny said.

"The public interest in the investigation continuing is still of high importance" the statement said.

The court in Stockholm also ruled that Assange, 44, should remain detained in absentia.

"The district court finds that the interest of enabling investigation of the crime JA is suspected of by way of questioning him outweighs the intrusion or harm the detention order causes JA. There are therefore grounds for JA to remain detained in absentia," the statement said.

But Swedish prosecutors disagreed, saying Assange's stay in the embassy was not a form of detention.

Journalist Per Nyberg in Sweden and CNN's Claudia Rebaza in London contributed to this report.

See original here:
Swedish court upholds Julian Assange arrest warrant - cnn.com

Snowden calls for whistleblower shield after claims by new …

Edward Snowden has called for a complete overhaul of US whistleblower protections after a new source from deep inside the Pentagon came forward with a startling account of how the system became a trap for those seeking to expose wrongdoing.

The account of John Crane, a former senior Pentagon investigator, appears to undermine Barack Obama, Hillary Clinton and other major establishment figures who argue that there were established routes for Snowden other than leaking to the media.

Crane, a longtime assistant inspector general at the Pentagon, has accused his old office of retaliating against a major surveillance whistleblower, Thomas Drake, in an episode that helps explain Snowdens 2013 National Security Agency disclosures. Not only did Pentagon officials provide Drakes name to criminal investigators, Crane told the Guardian, they destroyed documents relevant to his defence.

Snowden, responding to Cranes revelations, said he had tried to raise his concerns with colleagues, supervisors and lawyers and been told by all of them: Youre playing with fire.

He told the Guardian: We need iron-clad, enforceable protections for whistleblowers, and we need a public record of success stories. Protect the people who go to members of Congress with oversight roles, and if their efforts lead to a positive change in policy recognize them for their efforts. There are no incentives for people to stand up against an agency on the wrong side of the law today, and thats got to change.

Snowden continued: The sad reality of todays policies is that going to the inspector general with evidence of truly serious wrongdoing is often a mistake. Going to the press involves serious risks, but at least youve got a chance.

Thomas Drakes legal ordeal ruined him financially and ended in 2011 with all serious accusations against him dropped. His case served as a prologue to Snowdens. Now Cranes account has led to a new investigation at the US justice department into whistleblower retaliation at the Pentagon that may serve as an epilogue one Crane hopes will make the Pentagon a safe place for insiders to expose wrongdoing and illegality.

If we have situations where we have whistleblowers investigated because theyre whistleblowers to the inspector generals office, that will simply shut down the whole whistleblower system, Crane told the Guardian.

Crane, who has not previously given interviews, has told his explosive story in a new book, Bravehearts: Whistle Blowing In The Age of Snowden by Mark Hertsgaard, from which the Guardian is running extracts. The Guardian has partnered with Der Spiegel and Newsweek Japan on Cranes story.

When someone becomes a whistleblower, theyre making a serious, conscious decision, Crane said.

Theyre making a decision that can change their lives, change their futures, impact family life, too. There needs to be this certain unbreakable trust. Confidentiality is that trust and that cant ever be violated.

Snowden cited Drakes case as a reason for his lack of faith in the governments official whistleblower channels.

When I was at NSA, everybody knew that for anything more serious than workplace harassment, going through the official process was a career-ender at best. Its part of the culture, Snowden told the Guardian.

If your boss in the mailroom lies on his timesheets, the IG might look into it. But if youre Thomas Drake, and you find out the president of the United States ordered the warrantless wiretapping of everyone in the country, whats the IG going to do? Theyre going to flush it, and you with it.

While Drakes case is well known in US national security circles, its internal history is not.

In 2002, Drake and NSA colleagues contacted the Pentagon inspector general to blow the whistle on an expensive and poorly performing tool, Trailblazer, for mass-data analysis. Crane, head of the offices whistleblower unit, assigned investigators. For over two years, with Drake as a major source, they acquired thousands of pages of documents, classified and unclassified, and prepared a lengthy secret report in December 2004 criticizing Trailblazer, eventually helping to kill the program. As far as Crane was concerned, the whistleblower system was working.

But after an aspect of the NSAs warrantless mass surveillance leaked to the New York Times, Drake himself came under investigation and eventually indictment. Drake was suspected of hoarding documentation exactly what inspector-general investigators tell their whistleblowers to do.

They made it clear to keep [documents] wherever possible, and obviously properly handle anything that was classified, Drake remembered.

Crane feared that his own colleagues had told the FBI about Drake. He suspected the Pentagon inspector generals lead attorney, Henry Shelley, whom Crane said had earlier suggested working with the justice department about the leak, had done so. A confrontation yielded what Crane considered to be evasions.

The top lawyer would not reveal to me whether or not Drakes confidentiality had been compromised or not. That was a concern Normally I expect direct answers, Crane said.

When Drakes attorneys sought potentially exculpatory information from the inspector generals office, they learned that much of it had been destroyed before the defendant was charged, pursuant to a standard document destruction policy, according to a 2011 letter from prosecutors.

Crane was livid. All relevant regulations mandated keeping the documents, not destroying them. But a high-ranking colleague, Lynne Halbrooks, prevented Crane from investigating the document destruction. He suspected Shelley and Halbrooks of sacrificing a whistleblower and misleading the justice department and a federal judge, all in a case centering around the cover-up of NSA bulk surveillance.

Cranes relationship with his superiors spiraled downward until they forced him out in 2013, months before Snowdens revelations. The next year, he filed a complaint with a federal agency that works with whistleblowers, the Office of Special Counsel. In March this year, it found a substantial likelihood that the Pentagon inspector generals office improperly destroyed the Drake documents and arranged, with Pentagon consent, for the justice department inspector general to investigate.

Shelley, still the Pentagon inspector generals senior counsel, declined to answer questions but said he was certain my name will be cleared by the new investigation.

Halbrooks, the Office of Special Counsel and the justice department inspector general declined to comment for this story.

Bridget Serchak, a spokeswoman for the Pentagon inspector general, noted that her office and the Office of Special Counsel jointly requested the justice department investigation.

It is important to point out that there has been no determination on the allegations, and it is unfair to characterize the allegations otherwise at this point. DoD OIG will cooperate fully with the DoJ OIGs investigation of this matter and looks forward to the results of that investigation, Serchak said.

Crane considers this latest inquiry a bellwether for whether the whistleblower system can reform itself in a post-Snowden era.

Snowden responded to the way Drake was handled. The Office of Special Council investigation regarding destruction of possibly exculpatory documents regarding Drake might be the end of this saga, Crane said.

More:
Snowden calls for whistleblower shield after claims by new ...

Swedish court upholds Julian Assange arrest warrant | Media …

Julian Assange addressing the media from the balcony of the Ecuadorian embassy in central London. Photograph: Jack Taylor/AFP/Getty Images

A Stockholm district court has upheld an arrest warrant against Julian Assange, saying there is still probable cause for suspicion against the WikiLeaks founder.

Assange is wanted in Sweden over allegations of rape dating from 2010, which he denies, but he has not been charged. He has been confined to the Ecuadorian embassy in London since July 2012, when he sought asylum to avoid extradition.

Lawyers for the Australian sought to have the warrant quashed after a United Nations working group determined in February that Assange was subject to arbitrary detention at the embassy.

But the district ruled on Wednesday that the warrant against him should stand, saying: The district court finds that there is still probable cause for the suspicion against JA [Julian Assange] for rape, less serious incident, and that there is still a risk that he will depart or in some other way evade prosecution or penalty.

Marianne Ny, the director of public prosecutions at the Swedish Prosecution Authority, said in a statement: In our opinion, the public interest to continue the investigation still carries weight. The efforts to conduct an interview and take DNA samples continue, and we are still awaiting a response to the application for legal assistance which was submitted to Ecuador in March 2016. The court shares our view that a continued detention complies with the principle of proportionality.

Per E Samuelson, one of Assanges Swedish lawyers, told the Guardian he was disappointed, of course, and had already received instructions to appeal.

He said he believed the judge had made numerous mistakes, principally in ignoring the UN working groups finding and its request to restore Assanges freedom of movement. This is not even discussed by the judge, it is ignored. Of course it is astonishing that a Swedish court disobeys United Nations fundamental international regulations on human rights.

Samuelson said he was aware of a new request to interview Assange in London, but she [Ny] is very late. The request was still being considered by the Ecuadorean authorities, he said, so we dont know the outcome of that yet.

Excerpt from:
Swedish court upholds Julian Assange arrest warrant | Media ...

Julian Assange: Swedish court upholds arrest warrant for …

Julian Assange remains wanted by Swedish authorities.

A Swedish lower court has upheld the arrest warrant for Julian Assange, saying the Wikileaks founder's stay at Ecuador's London embassy did not equal detention.

Assange, 44, is wanted by Swedish authorities for questioning over allegations, which he denies, that he committed rape in 2010.

An Australian computer hacker who enraged US authorities by publishing hundreds of thousands of secret US diplomatic cables, he has been holed-up in the embassy since June 2012 to avoid the rape investigation in Sweden.

He says he fears further extradition to the United States, where there has been a criminal investigation into the activities of Wikileaks.

"The district court finds that there is still probable cause for the suspicion against JA (Julian Assange) for rape, less serious incident, and that there is still a risk that he will depart or in some other way evade prosecution or penalty," the court said in a statement.

Last year, Sweden's Supreme Court rejected a previous appeal by Assange to revoke a detention order.

Following a statement by a UN panel that his stay in the embassy amounts to arbitrary detention, Assange's lawyers again in February asked the Stockholm District Court to overturn the warrant for his arrest.

"Unlike the UN Working Group on Arbitrary Detention the district court does not consider JA's stay at the Embassy of Ecuador in London a form of detention," the court said.

Assange will appeal the ruling, said Per Samuelsson, one of his Swedish lawyers.

"I just spoke to him, and like us he is not surprised but very critical and angry," he said.

"The Swedish justice system only takes into consideration the Swedish bit, and not the whole situation given the tough sentence hanging over him in the United States."

In 2010, Wikileaks released more than 90,000 secret documents on the US-led military campaign in Afghanistan, followed by almost 400,000 US military reports detailing operations in Iraq.

Those disclosures were followed by release of millions of diplomatic cables dating back to 1973.

Reuters/AFP

Go here to read the rest:
Julian Assange: Swedish court upholds arrest warrant for ...

Edward Snowden performs radical surgery on a phone to make …

If you think that your phone may have been hacked so that your adversaries can watch you through the cameras and listen through the mics, one way to solve the problem is to remove the cameras and microphones, and only use the phone with a headset that you unplug when it's not in use.

In this video for Vice, Edward Snowden demonstrates how to remove the surface-mount mic and camera components from your phone's logic board to render it blind and deaf except when you connect external sensors to it.

On tomorrows episode of Vice, the man himself shows correspondent Shane Smith how to make a smartphone go black by removing the cameras and microphones so they cant be used against you. Find out how to do it yourself in the clip above from Vice, which airs tomorrow at 11 p.m. on HBO.

Watch Edward Snowden Teach Vice How to Make a Phone Go Black [Angela Watercutter/Wired]

Lured by the internets pervasive insistence that it represents a superior, more comfortable typing experience, I recently went back to an old-timey mechanical keyboard. This was a mistake. I am now a hamfisted ASCII jazz disaster.

SpareOne Emergency Phone is a basic cellphone powered by AA batteries. This gives it a relatively short time on a charge, but means that it will have a charge after being stuffed in a drawer or glove box for months. I came across this during my search for the perfect basic phone, but be warned: []

Low-cost carrier Easyjet has prototyped Sneakairs, a pair of shoes that have small vibrating motors and Bluetooth links; they work in concert with your mobile phones mapping app, buzzing left or right when its time to turn, and twice if youve gone the wrong way.

Jared Sinclair developed the RSS reader app Unread, whichmade $10,000 in its first 24 hours on the iOS market.And weve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, theyre also testament to the []

If you or your companys IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a companys long-term prosperity. Its no wonder that the market for IT security specialists is exploding. Certification is the key so learn the tenets of ethical hacking andget []

Your laptop and mobile devices are top of the lineso why are you trotting out that raggedy decades-old suitcase when you go somewhere? Time to up your travel game with a complete 5-piece Herschel Travel Luggage bundleand well even give it to you for free!Of course, youve got to win the Ultimate Herschel Travel Bundle []

Continued here:
Edward Snowden performs radical surgery on a phone to make ...

The Age of Cryptocurrency | How Bitcoin and Digital Money are …

On Wednesday night, Feb. 11, we were part of a special night at the Museum of American Finance on Wall Street, a discussion on digital currency and the future of finance featuring former Treasury Secretary Lawrence Summers that took a look at the ways in which bitcoin and cryptocurrencies are going to effect, and be absorbed and adapted by, the financial system.

Nearly 300 people (the event sold out very quickly) filled the museums main exhibition hall to hear Summers, us, and a panel of experts talk about the future of finance, and digital currencys place in that future.

The museum occupies the old Bank of New York headquarters, a grand old Greek revival building on the corner of Wall and Williams street, a block away from Federal Hall and the New York Stock Exchange. That location and history made for a dramatic backdrop to what was decidedly a 21st century night of questions and discussions.

The media coverage ranged from the mainstream New York Times, which took a very straightforward angle with this write-up of Summers comments, to this decidedly cynical take from Animal New York. On Wednesday night, the Establishment wasnt afraid, Peter Yeh wrote. It was excited. Its members swarmed the CEOs after the panel ended to exchange business cards. Nothing is more traditional finance than that.

There was something to that take. This was one of the first times, if not the first, that the upstart cryptocurrency world met the staid traditional finance world on its own turf, and engaged it on its own terms. The night was less about disruption and more about evolution, and it seemed to us at least that at some point soon, theres going to be something in the museum to represent bitcoin, something that extends the line of history just one step further.

Continue reading

Publication Day!

Jan. 27 has arrived, and with it, the publication of The Age of Cryptocurrency (and a massive blizzard thats about to dump two feet of snow on the east coast, but thats another story). We are extremely excited to have finally made it to this day. The reception so far has been really quite positive, and were anxious to see how the book does now that its on bookshelves.

Our weekend essay in the Wall Street Journal is a good primer on the promise of bitcoin and cryptocurrencies, if you havent read the book yet. It will give you a taste of the direction were going in.

Also over the weekend, the Washington Post gave the book a very strong review. To their ample credit, Paul Vigna and Michael J. Casey, veteran Wall Street Journal reporters, resist the common temptation to hype their trendy subject, the finance writer Daniel Gross said. Theyve written a reported explainer that patiently documents bitcoins rise, acknowledges its flaws and highlights its promise. Smart and conscientious, The Age of Cryptocurrency is the most thorough and readable account of the short life of this controversial currency.

Heres an excerpt from our Journal essay:

No digital currency will soon dislodge the dollar, but bitcoin is much more than a currency. It is a radically new, decentralized system for managing the way societies exchange value. It is, quite simply, one of the most powerful innovations in finance in 500 years.

If applied widely to the inner workings of our global economy, this model could slash trillions in financial fees; computerize much of the work done by payment processors, government property-title offices, lawyers and accountants; and create opportunities for billions of people who dont currently have bank accounts. Great value will be created, but many jobs also will be rendered obsolete.

Continue reading

The book doesnt arrive for another two weeks, but today we published our trailer on YouTube. For this, we performed a relatively simple experiment: we went out into Times Square, and asked people, what is bitcoin? You can see for yourself what they said.

Yes, that is Mike Casey making an ever so brief cameo toward the end.

The Economist this week came out with its review of The Age of Cryptocurrency, saying, essentially, that its a serious book worth reading, one that digs deep into the reasons that bitcoin is significant as a topic, beyond all the manic stuff you read in the media.

Heres a clip, though wed recommend reading the whole thing:

For any book on bitcoin to be worth reading, though, it has to delve further: into the crypto-currencys ideological and technical roots, for instance, or what it adds to the narrative of money, or even what its economic and political impact may be. The currencys dollar price may be three-quarters down on its peak, but the underlying technology also provides plenty of intellectual fodderand is unlikely to go away. So there is plenty to write about if you are serious.

Paul Vigna and Michael Casey, two journalists at the Wall Street Journal, are certainly serious.

The tone is somewhat dismissive of bitcoin (The rise and fall of the crypto-currency is good news for authors at least), and it treats some of the other bitcoin books out there harshly. But it does highlight many of the big-picture issues we explore: the debate about the nature of money, and where cryptocurrencies lie within that; the potential to bootstrap the unbanked into the modern world, a slow-rolling revolution in finance. All in all, its a very positive review and were really pleased to get our first notice from such an august name.

Mike and I both received our first copies of the U.K. version of our book in the mail today, from our publisher The Bodley Head.

Our editor at Bodley Head, Stuart Williams, cut the title down to simply Cryptocurrency, (you can see the Random House page here) but otherwise its the same book. And, yes, that is a bullet on the cover. They really went for a statement with the title and imagery, which we like.

Weve seen a couple of the galleys of our U.S. edition, but this is the first actual copy Ive had in my hands. We put in an awful lot of work between the day we signed the contract and today. It feels very good to have the book arrive, to see the culmination of all that work here sitting next to me.

Here is the book on Amazons U.K. site. One nice little touch on the dust jacket is that they priced it in pounds, and bitcoin.

Cryptocurrency is available in the U.K. beginning Jan. 29 (and Jan. 27 here in the U.S.)

Publishers Weekly gave The Age of Cryptocurrency a starred review; heres what they had to say:

While many readers understandably have a hard time wrapping their heads around the concept of non-government-backed currency, journalists Casey (Ches Afterlife) and Vigna, who blog about cryptocurrency at the Wall Street JournalsMoneyBeat blog, here use their considerable expertise to make the Bitcoin phenomenon accessible.

They take a thorough, multidisciplinary approach to the topic, including a fascinating examination of the origin of money. The authors are appropriately cautious, warning that despite increased public awareness of Bitcoin, it remains a niche product, and the jury is still out on how far and how quickly it and other digital currency will spread.

However, newcomers will gain a better understanding of the revolutionary potential of digital currency, especially for the roughly 2.5 billion people from Afghanistan to Africa to even America who have been shut out of the modern finance system. And the explication of the non-currency applications of the concepts behind Bitcoinsuch as tamper-proof records of verified informationwill be valuable to any reader. Agent: Gillian McKenzie, Gillian McKenzie Agency. (Jan.)

Anyone who doubts that bitcoin and its imitators are at the early stage of altering fundamentally the global payments systemif not the nature of money itselfwill find it difficult to resist Michael Casey and Paul Vignas admirably clear and judicious account. If the word blockchain makes you want to call a plumber, or if you think Satoshi is some kind of raw fish, you need to read The Age of Cryptocurrency today. If youre already a bit-convert, youll still learn a lot. Niall Ferguson, author of The Ascent of Money

Anyone who views bitcoin as a voodoo concept must read this totally comprehensible narrative outlining the history of money and how bitcoin might become a new and better currency. For those confused by bitcoin concepts, this clearheaded and readable book sets forth credible reasons why bitcoin might or might not be an evolving economic miracle. Arthur Levitt, 25th Chairman of the United States Securities and Exchange Commission

An invaluable book: a fascinating field guide to the phenomenon in which three of the most powerful forces shaping our world todaythe reform of finance, technological innovation, and the rejection of traditional politicsmeet. Felix Martin, author of Money: The Unauthorized Biography

The Age of Cryptocurrency not only demystifies and explains bitcoin, but also shows where it fits into the cultural zeitgeist and where its pointed, and what that may mean for our financial system. John Mauldin, New York Times bestselling author of Endgame

The thought-provoking Age of Cryptocurrency was a pleasure to read. The authors have successfully demystified cryptocurrencies like bitcoin so that even a traditionalist like myself can understand them and embrace their potential. And the references to money were so spot-on, they even taught this old dog some new tricks. Edmund C. Moy, 38th Director of the United States Mint, 2006-2011

Vigna and Casey unlock the mysteries of cryptocurrencies and their implications for the future of financial transactions in an engaging, lucid, and thought-provoking account. The technological developments described in this book will someday affect every one of us and I can think of no better guide to what the future holds. Eswar Prasad, author of The Dollar Trap

Even to a bitcoin skeptic like myself, Vigna and Caseys book is a fascinating journey into the cast of characters and oddballs behind the movement into the digital currency realm. Barry Ritholtz, CIO, Ritholtz Wealth Management

Thorough, multidisciplinary approach to the topic, including a fascinating examination of the origin of money newcomers will gain a better understanding of the revolutionary potential of digital currencyAnd the explication of the non-currency applications of the concepts behind Bitcoinsuch as tamper-proof records of verified informationwill be valuable to any reader. PublishersWeekly, starred review

Here is the original post:
The Age of Cryptocurrency | How Bitcoin and Digital Money are ...