{"id":33021,"date":"2017-08-17T01:41:56","date_gmt":"2017-08-17T05:41:56","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/the-laws-of-mathematics-and-the-laws-of-nations-the-encryption-debate-revisited-lawfare-blog.php"},"modified":"2017-08-17T01:41:56","modified_gmt":"2017-08-17T05:41:56","slug":"the-laws-of-mathematics-and-the-laws-of-nations-the-encryption-debate-revisited-lawfare-blog","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/the-laws-of-mathematics-and-the-laws-of-nations-the-encryption-debate-revisited-lawfare-blog.php","title":{"rendered":"The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited &#8211; Lawfare (blog)"},"content":{"rendered":"<p><p>    Australia is weighing in on the encryption debate regarding    exceptional access by law enforcement. As George Brandis, the    Australian Attorney-General, described    last month, the Prime Ministers office advocates requiring    internet companies and device makers [to follow] essentially    the same obligations that apply under the existing law to    enable provision of assistance to law enforcement and to the    intelligence agencies, where it is necessary to deal with    issues: with terrorism, with serious organized crime, with    paedophile networks and so on. He further asserted that the    chief cryptographer at GCHQ, the Government Communication    Headquarters in the United Kingdom had assured him that this    was feasible.  <\/p>\n<p>    The Prime Minister of Australia, Malcolm Turnbull, subsequently    entered into an interesting interchange with a reporter.    When     asked by Mark DiStefano, a reporter from ZDNET, Wont the    laws of mathematics trump the laws of Australia? And then    arent you also forcing people onto decentralized systems as a    result? The Prime Minister of Australia said the laws of    Australia prevail in Australia, I can assure you of that. The    laws of mathematics are very commendable, but the only law that    applies in Australia is the law of Australia.\"  <\/p>\n<p>    This interchange provides a good opportunity to explore where    the laws of mathematics and the laws of nations hold sway.    DiStefanos comment about the laws of mathematics is a    reference to the conclusion offered by many technically    informed parties that including a capability for exceptional    access into any encryption scheme invariably reduces the    security afforded by that scheme.  <\/p>\n<p>    But this conclusion is not what the Attorney-General was    referring to; he spoke only of an obligation of vendors to    provide assistance to law enforcement and intelligence agencies    (presumably to provide clear text when required by law). It is    certainly possible to develop a system that enables vendors to    meet this requirement, and a system with this capability must    be that which the chief cryptographer at GCHQ asserts is    feasible. This system will not be as secure as it would be    without this requirement, though it will enable certain law    enforcement and intelligence activities to take place that    would not otherwise be possible.  <\/p>\n<p>    So once again, we see that participants in this debate are not    arguing about the same thing. The anti-exceptional access    community is talking about the impossibility of developing a    system with exceptional access capability that affords the same    security as one without such a capability. The pro-exceptional    access community is talking about the feasibility of a system    with exceptional access capabilities that provides the best    security possible given that requirement. And both communities    are correct.  <\/p>\n<p>    Whether the tradeoff is worthwhilelesser security for all in    exchange for better ability to pursue certain law enforcement    and intelligence activitiesis clearly a policy and legal    decision for the Australian government. Of course, to have a    reasonable debate about this question, the Australian    government would have to acknowledge the first part of this    tradeofflesser security for alland whether or not it is    willing to do so is not yet clear.  <\/p>\n<p>    Turnbulls statement is absurd on its face. A more astute    response would have been to acknowledge that human laws must be    consistent with the laws of mathematics but then to say that    the laws of mathematics do not prevent compliance with a    requirement such as the one proposed by the Attorney-General.    But the Prime Minister would also have had to acknowledge the    above-mentioned trade-off explicitlyand maybe such an    acknowledgment would have been politically inconvenient.  <\/p>\n<p>    As I have     writtenbefore, these comments also apply precisely to    the corresponding debate in the United States. To make progress    on either side of the Pacific Ocean, it would help if both    sides were talking about the same thing.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.lawfareblog.com\/laws-mathematics-and-laws-nations-encryption-debate-revisited\" title=\"The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited - Lawfare (blog)\">The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited - Lawfare (blog)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Australia is weighing in on the encryption debate regarding exceptional access by law enforcement. As George Brandis, the Australian Attorney-General, described last month, the Prime Ministers office advocates requiring internet companies and device makers [to follow] essentially the same obligations that apply under the existing law to enable provision of assistance to law enforcement and to the intelligence agencies, where it is necessary to deal with issues: with terrorism, with serious organized crime, with paedophile networks and so on<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-33021","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33021"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=33021"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/33021\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=33021"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=33021"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=33021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}