Content deleted Content added
m Reverted 1 edit by 2806:105E:10:E0CF:1C27:BEF5:3D5B:C326 (talk) to last revision by LaffyTaffer |
No edit summary |
||
Line 120:
|doi=10.1145/167088.167260
|doi-access=free
|quote=Now, certain types of information cannot reasonably be assumed to be concealed. For instance, an upper bound on the total volume of a party’s sent or received communication (of any sort) is obtainable by anyone with the resources to examine all possible physical communication channels available to that party.
}}</ref><ref name="karger1977nondiscretionaryaccesscontrol">{{cite thesis
|last=Karger
Line 223:
|website=UpGuard
|access-date=June 26, 2020
}}{{sps
{{cite web
|author=martin
Line 233:
|archive-url=https://web.archive.org/web/20160819165216/https://en.greatfire.org/blog/2013/jan/china-github-and-man-middle
|archive-date=19 August 2016
}}{{sps
{{cite web
|url=https://en.greatfire.org/blog/2014/sep/authorities-launch-man-middle-attack-google
Line 241:
|website=GreatFire
|access-date=June 26, 2020
}}{{sps
=== Public key infrastructure ===
Line 274:
=== Classified discovery ===
In 1970, [[James H. Ellis]], a British cryptographer at the UK [[Government Communications Headquarters]] (GCHQ), conceived of the possibility of "non-secret encryption", (now called public key cryptography), but could see no way to implement it.<ref>{{cite web| last=Ellis| first=James H.| title=The Possibility of Secure Non-secret Digital Encryption| date=January 1970|url=https://cryptocellar.org/cesg/possnse.pdf| publisher=CryptoCellar| access-date=18 January 2024}}</ref><ref>{{cite news |last=Sawer |first=Patrick |title=The unsung genius who secured Britain's computer defences and paved the way for safe online shopping |journal=The Telegraph |date=11 March 2016 |url=https://www.newindianexpress.com/world/2016/mar/12/the-anonymous-researcher-who-held-the-key-to-cyber-security-910751.html}}</ref>
In 1973, his colleague [[Clifford Cocks]] implemented what has become known as the [[RSA (cryptosystem)|RSA encryption algorithm]], giving a practical method of "non-secret encryption", and in 1974 another GCHQ mathematician and cryptographer, [[Malcolm J. Williamson]], developed what is now known as [[Diffie–Hellman key exchange]].
The scheme was also passed to the US's [[National Security Agency]].<ref name="zdnet"/> Both organisations had a military focus and only limited computing power was available in any case; the potential of public key cryptography remained unrealised by either organization:
<blockquote>
|