In the time it's taken politicians to throw up a road block, an MIT professor has invented a new encryption technology

Politics and technology are becoming increasingly intertwined. Which is to be expected: technology has created great wealth in some places, and money is the most potent of political lures.

Sniffing money, politicians have a way of showing up and proposing a tax, a law, an embargo, a moratorium, an investigation, a witch hunt or an all-out ban - or otherwise blocking, entangling, obfuscating or getting in the way. The reason is simple: if some process is creating wealth and jobs and raising living standards without them, politicians worry, rightly, that we will begin to wonder why we need them.

Conversely, if a pol can make enough trouble, at some point it just gets easier to play along. Once upon a time in America, there was another class of citizen who practised a similar approach. In certain, often humble neighbourhoods, these folks would come along selling "insurance" - insurance that your windows didn't get smashed, or your arm broken, or your head cracked. Folks didn't like it very much but were pragmatic enough to pay up, at least if they owned any windows, arms or heads.

Giving in means ceding power. And power and money are to politicians as matter and energy were to Albert Einstein: two sides of the same coin.

So it is with our political leaders, and their methods date from at least the epoch immediately following the casting out from the Garden of Eden. Recently, however, many of these same leaders find themselves struggling to keep up with the pace of technological change.

Technology moves so fast that opportunities flash past too quickly for this set to get their hooks in. It even comes to pass that once they've got their arms around something, a twist in the technology leaves them with empty hands. Just such a situation may currently be in the making.

America's political leadership has drawn a bead on strong encryption. They absolutely refuse to let citizens keep their private affairs private, using the pretty flimsy pretence that they're doing this to keep encryption out of the hands of criminals. Most not-particularly-sharp 10-year-olds can tell you that, by definition, making something illegal keeps it out of the hands of the law-abiding, not the criminal, element.

Even though his advisers admit that this policy is a failure, President Clinton continues to support the notion that all encryption schemes must have a "back door" key that the government can get their hands on whenever they want to check up on us.

The Feds have indicated that they will never mess with authentication keys - digital signatures that individuals and corporations can use to prove, among other things, that they are really who they say they are when conducting transactions.

So it was amusing this week to come across a new scheme for securing messages - by Ronald Rivest, an MIT professor - that does not depend on secret keys or encryption. Rivest (he's the "R" in "RSA encryption") proposes a system called "chaffing and winnowing". Chaffing, Rivest explains, is the reverse of winnowing, which means "to separate or eliminate the poor or useless parts".

Chaffing and winnowing work like this: an author, say, Alice, composes a message to Bob, and breaks it into convenient blocks of text. She precedes each plain-text block with a sequence number, and ends it with an authentication code computed from the text, plus her own authentication key.

At some point, a bunch of dummy blocks (or blocks of messages from other users) are randomly mixed in with Alice's. Alice can do this, or she can let somebody downstream do it - say, her Internet service provider. ISPs already send all their traffic as intermingled blocks called packets.

Bob just has to look for a complete sequence of blocks with the correct authentication code, jettison the extras, the chaff, and he's got the whole message. In practice, Alice and Bob's software would do all of this invisibly. Alice's would break up the message, add the sequence number and calculate the authentication keys, while Bob's would reject any message block that didn't match the sender's key and reassemble the full text.

It should be noted that this scheme, so far, is very much like what happens to any message sent electronically over a network. Messages are routinely broken up into packets with a sequence number and a check-sum or other code that allows the receiver to know if the packet was transmitted correctly. A law against this scheme would essentially be a law against messaging on networks with current techniques.

If the blocks were sized or otherwise handled cleverly, and enough chaff were mixed in, the odds of someone recovering the right blocks without knowing the authentication key could be made extremely slim - as slim as they are in the case of strong encryption. There are a number of twists that can be added - none of which depend on encryption or secret keys - which can make this system very, very secure.

This legerdemain makes escrowed recovery keys useless - remember, the message itself is in plain text - and depends instead on authentication keys that the US government has pledged it will never touch.

In short, in the time it has taken a few hundred politicians to throw up a road block, a professor has just invented a new technology. As Rivest puts it: "The policy debate about regulating technology ends up being obsoleted by technological innovations."

Maybe Rivest's greatest contribution will be to winnow the citizenry from politician's chaff.

cg@gulker.com

Arts and Entertainment

Film Leonardo DiCaprio hunts Tom Hardy

Arts and Entertainment
And now for something completely different: the ‘Sin City’ episode of ‘Casualty’
TV
Have you tried new the Independent Digital Edition apps?
Arts and Entertainment

ebooksNow available in paperback
Arts and Entertainment

ebooks
Latest stories from i100
Have you tried new the Independent Digital Edition apps?
SPONSORED FEATURES

ES Rentals

    Independent Dating
    and  

    By clicking 'Search' you
    are agreeing to our
    Terms of Use.

    Blairites be warned, this could be the moment Labour turns into Syriza

    Andrew Grice: Inside Westminster

    Blairites be warned, this could be the moment Labour turns into Syriza
    HMS Victory: The mystery of Britain's worst naval disaster is finally solved - 271 years later

    The mystery of Britain's worst naval disaster is finally solved - 271 years later

    Exclusive: David Keys reveals the research that finally explains why HMS Victory went down with the loss of 1,100 lives
    Survivors of the Nagasaki atomic bomb attack: Japan must not abandon its post-war pacifism

    'I saw people so injured you couldn't tell if they were dead or alive'

    Nagasaki survivors on why Japan must not abandon its post-war pacifism
    Jon Stewart: The voice of Democrats who felt Obama had failed to deliver on his 'Yes We Can' slogan, and the voter he tried hardest to keep onside

    The voter Obama tried hardest to keep onside

    Outgoing The Daily Show host, Jon Stewart, became the voice of Democrats who felt the President had failed to deliver on his ‘Yes We Can’ slogan. Tim Walker charts the ups and downs of their 10-year relationship on screen
    RuPaul interview: The drag star on being inspired by Bowie, never fitting in, and saying the first thing that comes into your head

    RuPaul interview

    The drag star on being inspired by Bowie, never fitting in, and saying the first thing that comes into your head
    Secrets of comedy couples: What's it like when both you and your partner are stand-ups?

    Secrets of comedy couples

    What's it like when both you and your partner are stand-ups?
    Satya Nadella: As Windows 10 is launched can he return Microsoft to its former glory?

    Satya Nadella: The man to clean up for Windows?

    While Microsoft's founders spend their billions, the once-invincible tech company's new boss is trying to save it
    The best swimwear for men: From trunks to shorts, make a splash this summer

    The best swimwear for men

    From trunks to shorts, make a splash this summer
    Mark Hix recipes: Our chef tries his hand at a spot of summer foraging

    Mark Hix goes summer foraging

     A dinner party doesn't have to mean a trip to the supermarket
    Ashes 2015: With an audacious flourish, home hero Ian Bell ends all debate

    With an audacious flourish, the home hero ends all debate

    Ian Bell advances to Trent Bridge next week almost as undroppable as Alastair Cook and Joe Root, a cornerstone of England's new thinking, says Kevin Garside
    Aaron Ramsey interview: Wales midfielder determined to be centre of attention for Arsenal this season

    Aaron Ramsey interview

    Wales midfielder determined to be centre of attention for Arsenal this season
    Community Shield: Arsene Wenger needs to strike first blow in rivalry with Jose Mourinho

    Community Shield gives Wenger chance to strike first blow in rivalry with Mourinho

    As long as the Arsenal manager's run of games without a win over his Chelsea counterpart continues it will continue to dominate the narrative around the two men
    The unlikely rise of AFC Bournemouth - and what it says about English life

    Unlikely rise of AFC Bournemouth

    Bournemouth’s elevation to football’s top tier is one of the most improbable of recent times. But it’s illustrative of deeper and wider changes in English life
    A Very British Coup, part two: New novel in pipeline as Jeremy Corbyn's rise inspires sequel

    A Very British Coup, part two

    New novel in pipeline as Jeremy Corbyn's rise inspires sequel
    Philae lander data show comets could have brought 'building blocks of life' to Earth

    Philae lander data show comets could have brought 'building blocks of life' to Earth

    Icy dust layer holds organic compounds similar to those found in living organisms