Content deleted Content added
→Examples: section |
→Cryptographically strong algorithms: Fixed typo Tags: Mobile edit Mobile web edit |
||
(41 intermediate revisions by 9 users not shown) | |||
Line 3:
{{OriginalResearch|date=November 2021}}
'''Strong cryptography''' or '''cryptographically strong''' are general terms used to designate the [[cryptographic algorithm]]s that, when used correctly, provide a very high (usually
{{ The strong cryptography algorithms have high [[security strength]], for practical purposes usually defined as a number of bits in the [[Key (cryptography)|key]]. For example, the United States government, when dealing with [[Export of cryptography from the United States|export control of encryption]],
Demonstrating the resistance of any cryptographic scheme to attack is a complex matter, requiring extensive testing and reviews, preferably in a public forum. Good [[algorithm]]s and protocols are required (similarly,
==Background==
The level of expense required for strong cryptography originally restricted its use to the government and military agencies
The use of computers changed the process of cryptanalysis, famously with [[Bletchley Park]]'s [[Colossus computer|Colossus]].
== Cryptographically strong algorithms ==
{{sources|section|date=June 2023}}
This term "cryptographically strong" is often used to describe an [[encryption]] [[algorithm]], and implies, in comparison to some other algorithm (which is thus cryptographically weak), greater resistance to attack. But it can also be used to describe hashing and unique identifier and filename creation algorithms. See for example the description of the Microsoft .NET runtime library function Path.GetRandomFileName.<ref>{{citation |url=http://msdn.microsoft.com/en-us/library/system.io.path.getrandomfilename.aspx |title=Path.GetRandomFileName Method (System.IO) |publisher=Microsoft}}</ref> In this usage, the term means "difficult to guess".
An encryption algorithm is intended to be unbreakable (in which case it is as strong as it can ever be), but might be breakable (in which case it is as weak as it can ever be) so there is not, in principle, a continuum of strength as the [[idiom]] would seem to imply: Algorithm A is stronger than Algorithm B which is stronger than Algorithm C, and so on. The situation is made more complex, and less subsumable into a single strength metric, by the fact that there are many types of [[Cryptanalysis|cryptanalytic]] attack and that any given algorithm is likely to force the attacker to do more work to break it when using one attack than another.
There is only one known unbreakable cryptographic system, the [[one-time pad]], which is not generally possible to use because of the difficulties involved in exchanging one-time pads without
The usual sense in which this term is (loosely) used, is in reference to a particular attack, [[Brute force attack|brute force]] key search — especially in explanations for newcomers to the field. Indeed, with this attack (always assuming keys to have been randomly chosen), there is a continuum of resistance depending on the length of the key used. But even so there are two major problems: many algorithms allow use of different length keys at different times, and any algorithm can forgo use of the full key length possible. Thus, [[Blowfish (cipher)|Blowfish]] and [[RC5]] are [[block cipher]] algorithms whose design specifically allowed for several [[Key size|key lengths]], and who cannot therefore be said to have any particular strength with respect to brute force key search. Furthermore, US export regulations restrict key length for exportable cryptographic products and in several cases in the 1980s and 1990s (e.g., famously in the case of [[Lotus Notes]]' export approval) only partial keys were used, decreasing 'strength' against brute force attack for those (export) versions. More or less the same thing happened outside the [[United States|US]] as well, as for example in the case of more than one of the cryptographic algorithms in the [[Global System for Mobile Communications|GSM]] cellular telephone standard.
Line 38 ⟶ 39:
==Legal issues==
{{see also|Cryptography#Forced disclosure of encryption keys}}
Widespread use of encryption increases the costs of [[surveillance]], so the government policies aim to regulate the use of the strong cryptography.{{sfn | Riebe | Kühn | Imperatori | Reuter | 2022 | p=42}} In the 2000s, the effect of encryption on the surveillance capabilities was limited by the ever-increasing share of communications going through the global social media platforms, that did not use the strong encryption and provided governments with the requested data.{{sfn | Riebe | Kühn | Imperatori | Reuter | 2022 | p=58}} Murphy talks about a legislative balance that needs to be struck between the power of the government that are broad enough to be able to follow the quickly-evolving technology, yet sufficiently narrow for the public and overseeing agencies to understand the future use of the legislation.{{sfn|Murphy|2020}}
Since use of strong cryptography makes the job of intelligence agencies more difficult, many countries have [[Key disclosure law|enacted laws or regulations]] restricting or simply banning the non-official use of strong cryptography. For instance, the [[United States]] previously defined cryptographic products as munitions since [[World War II]] and prohibited [[export of cryptography]] beyond a certain 'strength' (measured in part by [[key size]]).{{Citation needed|date=September 2020}} However, the U.S. restrictions eased in the 1990s along with the rising need for secure e-Commerce and web-connected public software applications. The Clinton Administration issued new rules in 2000 allowing export of products containing strong cryptography, subject to certain limitations.<ref>{{Cite magazine|title="Reducing US Crypto Export Rules"|url=https://www.wired.com/2000/01/reducing-us-crypto-export-rules/|access-date=2021-08-05|magazine=Wired|language=en}}</ref> President and government of Russia in 90s has issued a few decrees formally banning uncertified cryptosystems from use by government agencies. Presidential decree of 1995 also attempted to ban individuals from producing and selling cryptography systems without having appropriate license, but it wasn't enforced in any way as it was suspected to be contradictory the [[Russian constitution of 1993|Russian Constitution of 1993]] and wasn't a law per se.<ref>{{Cite web |url=http://www.interesting-people.org/archives/interesting-people/199504/msg00018.html |title=<nowiki>A ban on cryptography in Russia (fwd) [Next .. djf]</nowiki> |first=Dave |last=Farber |date=1995-04-06 |accessdate=2011-02-14}}</ref><ref>{{Cite web|last=Antipov|first=Alexander|date=1970-01-01|title=Пресловутый указ №334 о запрете криптографии|url=https://www.securitylab.ru/informer/240707.php|access-date=2020-09-21|website=www.securitylab.ru|language=ru}}</ref><ref>{{Cite web|title=Указ Президента Российской Федерации от 03.04.1995 г. № 334|url=http://kremlin.ru/acts/bank/7701|access-date=2020-09-21|website=Президент России|language=ru}}</ref><ref group="note">The sources provided here are in Russian. To alleviate the problem of lack of English-written ones the sources are cited by using official government documents.</ref> The decree of No.313 issued in 2012 further amended previous ones allowing to produce and distribute products with embedded cryptosystems and requiring no license as such, even though it declares some restrictions.<ref>{{Cite web|title=Положение о лицензировании деятельности по разработке, производству, распространению шифровальных средств и систем|url=https://rg.ru/2012/04/24/shifry-site-dok.html|access-date=2020-09-21|website=Российская газета|language=ru}}</ref><ref>{{Cite web|title=Миф №49 "В России запрещено использовать несертифицированные средства шифрования"|url=http://bankir.ru/publikacii/20090714/mif-49-v-rossii-zaprescheno-ispolzovat-nesertificirovannie-sredstva-shifrovaniya-2228626/|access-date=2020-09-21|website=bankir.ru|language=ru}}</ref> [[France]] had quite strict regulations in this field, but has relaxed them in recent years.{{Citation needed|date=February 2010}}▼
=== USA ===
The initial response of the US government to the expanded availability of cryptography was to treat the cryptographic research in the same way the [[atomic energy]] research is, i.e., "[[born classified]]", with the government exercising the legal control of dissemination of research results. This had quickly found to be impossible, and the efforts were switched to the control over deployment (export, as prohibition on the deployment of cryptography within the US was not seriously considered).{{sfn|Diffie|Landau|2007|p=726}}
{{main|Export of cryptography from the United States}}
The export control in the US historically uses two tracks:{{sfn|Diffie|Landau|2007|p=727}}
* military items (designated as "munitions", although in practice the items on the [[United States Munitions List]] do not match the common meaning of this word). The export of munitions is controlled ty the [[Department of State]]. The restrictions for the munitions are very tight, with individual export licenses specifying the product and the actual customer;
* [[dual-use]] items ("commodities") need to be commercially available without excessive paperwork, so, depending on the destination, broad permissions can be granted for sales to civilian customers. The licensing for the dual-use items is provided by the [[Department of Commerce]]. The process of moving an item from the munition list to commodity status is handled by the Department of State.
Since the original applications of cryptography were almost exclusively military, it was placed on the munitions list. With the growth of the civilian uses, the dual-use cryptography was defined by [[cryptographic strength]], with the strong encryption remaining a munition in a similar way to the guns ([[small arms]] are dual-use while artillery is of purely military value).{{sfn|Diffie|Landau|2007|p=728}} This classification had its obvious drawbacks: a major bank is arguably just as systemically important as a military installation,{{sfn|Diffie|Landau|2007|p=728}} and restriction on publishing the strong cryptography code run against the [[First Amendment]], so after experimenting in 1993 with the [[Clipper chip]] (where the US government kept special decryption keys in [[escrow]]), in 1996 almost all cryptographic items were transferred to the Department of Commerce.{{sfn|Diffie|Landau|2007|p=730}}
=== EU ===
The position of the EU, in comparison to the US, had always been tilting more towards privacy. In particular, EU had rejected the [[key escrow]] idea as early as 1997. [[European Union Agency for Cybersecurity]] (ENISA) holds the opinion that the [[backdoor (cryptography)|backdoors]] are not efficient for the legitimate surveillance, yet pose great danger to the general digital security.{{sfn | Riebe | Kühn | Imperatori | Reuter | 2022 | p=42}}
=== Five Eyes ===
The [[Five Eyes]] (post-[[Brexit]]) represent a group of states with similar views one the issues of security and privacy. The group might have enough heft to drive the global agenda on the [[lawful interception]]. The efforts of this group are not entirely coordinated: for example, the 2019 demand for Facebook not to implement [[end-to-end encryption]] was not supported by either Canada or New Zealand, and did not result in a regulation.{{sfn|Murphy|2020}}
=== Russia ===
▲
== Examples ==
Line 49 ⟶ 68:
===Weak===
{{sources|section|date=July 2023}}
Examples that are not considered cryptographically strong include:
* The [[Data Encryption Standard|DES]], whose 56-bit keys allow attacks via exhaustive search.
* Triple-DES (3DES / EDE3-DES) can be subject of the "SWEET32 Birthday attack"<ref>[https://www.ibm.com/support/pages/security-bulletin-sweet32-vulnerability-impacts-triple-des-cipher-affects-communications-server-data-center-deployment-communications-server-aix-linux-linux-system-z-and-windows-cve-2016-2183 Security Bulletin: Sweet32 vulnerability that impacts Triple DES cipher]. IBM Security Bulletin, 2016.</ref>
* [[Wired Equivalent Privacy]] which is subject to a number of attacks due to flaws in its design.
* [[Transport Layer Security|SSL]] v2 and v3. TLS 1.0 and TLS 1.1 are also deprecated now [see RFC7525] because of irreversible flaws which are still present by design and because they do not provide elliptical handshake (EC) for ciphers, no modern cryptography, no CCM/GCM ciphermodes. TLS1.x are also announced off by the PCIDSS 3.2 for commercial business/banking implementations on web frontends. Only TLS1.2 and TLS 1.3 are allowed and recommended, modern ciphers, handshakes and ciphermodes must be used exclusively.
* The [[MD5]] and [[SHA-1]] hash functions, no longer immune to collision attacks.
* The [[RC4]] stream cipher.
* The 40-bit [[Content Scramble System]] used to encrypt most [[DVD-Video]] discs.
* Almost all [[classical cipher]]s.
* Most rotary ciphers, such as the [[Enigma machine]].
* DHE/EDHE is guessable/weak when using/re-using known default prime values on the server
==Notes==
Line 76 ⟶ 90:
* {{cite journal |last1=Vagle |first1=Jeffrey L. |title=Furtive Encryption: Power, Trusts, and the Constitutional Cost of Collective Surveillance |journal=[[Indiana Law Journal]] |date=2015 |volume=90 |issue=1 |url=https://www.repository.law.indiana.edu/cgi/viewcontent.cgi?article=11134&context=ilj}}
* {{cite book |last1=Reinhold |first1=Arnold G. |title=Strong Cryptography The Global Tide of Change |date=September 17, 1999 |publisher=[[Cato Institute]] |url=https://www.cato.org/briefing-paper/strong-cryptography-global-tide-change | series=Cato Institute Briefing Papers No. 51}}
* {{cite book |
* {{cite journal | last=Murphy | first=Cian C | title=The Crypto-Wars myth: The reality of state access to encrypted communications | journal=Common Law World Review | publisher=SAGE Publications | volume=49 | issue=3–4 | year=2020 | issn=1473-7795 | doi=10.1177/1473779520980556 | pages=245–261 | url = https://journals.sagepub.com/doi/10.1177/1473779520980556 | hdl=1983/3c40a9b4-4a96-4073-b204-2030170b2e63 | hdl-access=free }}
* {{cite journal | last1=Riebe | first1=Thea | last2=Kühn | first2=Philipp | last3=Imperatori | first3=Philipp | last4=Reuter | first4=Christian | title=U.S. Security Policy: The Dual-Use Regulation of Cryptography and its Effects on Surveillance | journal=European Journal for Security Research | publisher=Springer Science and Business Media LLC | volume=7 | issue=1 | date=2022-02-26 | issn=2365-0931 | doi=10.1007/s41125-022-00080-0 | pages=39–65 | url = https://link.springer.com/content/pdf/10.1007/s41125-022-00080-0.pdf?pdf=button}}
* {{cite journal | last=Feigenbaum | first=Joan | title=Encryption and surveillance | journal=Communications of the ACM | publisher=Association for Computing Machinery (ACM) | volume=62 | issue=5 | date=2019-04-24 | issn=0001-0782 | doi=10.1145/3319079 | pages=27–29 | doi-access=free }}
* {{cite web |last1=Schneier |first1=Bruce |title=Security pitfalls in cryptography |url=http://www.madchat.fr/crypto/papers/pitfalls.pdf |access-date=27 March 2024 |date=1998}}
==See also==
|