SlideShare a Scribd company logo
1 of 18
Steven H. McCown
Are Crypto Wars Coming?
Issues, Solutions, and Avoiding Key Escrow
Crypto Wars of the 1990’s
• Strong Encryption == algorithms that governments couldn’t decrypt
• Government rules
• Categorized encryption as a ‘weapon of war’ (munition)
• Export controls created to prohibit dissemination
• Clipper chip, low bit lengths, etc.
• Commercial needs
• Secure financial transfers
• eCommerce
• Secure Socket Layer
• Restrictions still exist, but currently less restrictive
2
Encryption is Everywhere
3
Should we use strong encryption?
4
2015 San Bernardino Attack
2 Dec 2015: 14 people were killed and 22 others were injured
FBI
• “homegrown violent extremists” inspired by foreign terrorist groups
• NSA couldn’t hack perpetrator’s iPhone 5C
• Asked Apple to backdoor iOS
Apple
• Refuses – “too dangerous to create” a backdoor
• Fears the precedent … and use by hackers and malicious insiders
FBI / DOJ
• DOJ court order: Apple must create and install malware
• Wash Post: “professional hackers” paid $1M to create 0-day
• DOJ withdraws the lawsuit
CBS Poll: FBI 50% -- Apple 45% 5References:
• https://www.apple.com/customer-letter/
• https://en.wikipedia.org/wiki/2015_San_Bernardino_attack
Safety or Encryption?
6
Encryption Dilemma … Re-Igniting Crypto Wars?
Criminals: won’t disclose encryption keys
Law Enforcement: can’t break strong crypto
Can technology solve this dilemma?
7
What is a ‘Backdoor’?
Root access via: secret accounts, passwords, policies, weak crypto, etc.
Examples (reported)
• Cisco: HW / SW 0-days let CIA remotely control 318 products (Wikileaks 2017)
• VW: 4 shared secret keys open 100M VW vehicles
• Cannon Printer: ‘Extended Random’ creates vulnerable encryption (BSAFE)
Problems
• Insider abuse (personal, political, financial, etc.)
• External hackers
• Uncontrolled execution
• “Responsible Encryption” (2017-18) euphemism for backdoors
8
References:
• Cisco: https://www.bleepingcomputer.com/news/security/ciscos-investigation-into-vault-7-leak-uncovers-0-day-affecting-318-products/
• VW: https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/
• Cannon: https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
Can Lawmakers Mandate Backdoors?
• FBI Director James B. Comey (2015):
• In a Senate Judiciary Committee called on companies employing end-to-end encryption to
revise their “business model”
• Senator Richard Burr (R-NC):
• Current encryption sets data “above the law.”
• Senator Dianne Feinstein (D-CA):
• “I am hopeful that this draft will start a meaningful and inclusive debate on the role of
encryption and its place within the rule of law … No entity or individual is above the law”
• Ben Wallace, UK Minister of State for Security and Economic Crime, 2018
• “It is mob rule on the internet. You shouldn’t be able to hide behind anonymity.”
9
Is there a model for balancing personal rights
with societal needs
…
without resorting to extreme measures like
key escrow or backdoors?
10
US Constitution as a Model
“The right of the people to be secure in their persons, houses,
papers, and effects, against unreasonable searches and
seizures, shall not be violated, and no Warrants shall issue,
but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the
persons or things to be seized.”
-- Fourth Amendment
11
Can the 4th Amendment be Modeled in Tech?
Goal: to create a technology system that makes searches impossible until
mandatory requirements have been met and verified.
Requirements:
1. Leave encryption keys within the user’s sole possession (i.e., no key escrow)
2. Create immutable rules regarding when and how a recovery may be performed
3. Create a set of reviewing authorities (each with competing interests; law
enforcement & watchdog groups) that independently evaluate access requests
and either provide or deny search authorization
4. Create the technical capability to retrieve a key only after all of the reviewing
authorities reach a unanimous consent to allow a disclosure
5. Require immutable event logging that can be subsequently audited
12
System Overview
A A A A A A
Smart
Contract
Key Recovery
Authorization
Group Steward
Key Recovery
Authorization
Group Steward
Key Recovery
Authorization
Group Steward
Key Recovery
Authorization
Group Steward
App Store
Client software (installed on user device)
- Manages enrolled keys / data
- Obtains user consent of a smart contract of terms
- Creates a unique partial key access token for each Steward
- Evaluates tokens received from Stewards requesting access
- Evaluates completion of smart contract terms
- Transmits key according to smart contract terms
Key Recovery Authorization Group Stewards
- Store partial key access tokens from users
- Evaluate the lawfulness of key recovery requests
- Evaluate whether smart contract terms are met
- Transmits partial key access token as per smart
contract when terms are met
Cryptographic Ledger
- Immutable record of system actions,
access requests, recovery attempts, etc.
13
Transparent Terms: disclosed via Smart Contract
Smart Contract
1. Full process description
2. Keys remain in user’s device
3. Recovery requirements
4. Recovery process methods
5. Audit methods
14
Private Key
1) Users make keys
and
they stay here!
Court of Law
Appeals Court
Watchdog
Group
Law
Enforcement
T1 T2
T3 T4
3) Partial Key Access Tokens
sent to competing agencies
2) Unique Partial Key
Access Tokens created
Process Requirements:
• Multiple Key Recovery Access
Stewards with competing interests
approve or deny access requests
• On-device processes control access
• All tokens must be received by device
to invoke a recovery
• Any access attempt is logged
A A A A A A
Enrollment
15
Private Key
Court of Law
Appeals Court
Watchdog
Group
Law
Enforcement
T1
T2
T3
T4
1. Law enforcement:
-- wants access
-- must send the proper token
Token
Validator
2. Court of Law:
-- concur with request
-- send the proper token
3. Appeals Court:
-- concur with request
-- send the proper token
4. Watchdog Group:
-- concur with request
-- send the proper token
5. Tokens are Validated:
-- Zero Knowledge Proofs
-- Blockchain
6. If all tokens are validated:
-- Key is recovered
7. Else
-- No recovery
A A A A A A
7. Every granted access (or attempt) is
logged and auditable via a blockchain
Recovery
16
Reframing The Encryption Dilemma
Door #2:
No recourse
against criminals
Door #1:
Government control of
encryption
‘Door #3’:
Secure privacy, facilitate lawful recovery
processes, & enforce checks & balances.
17
Steven H. McCown
18
smccown@anonyome.com
https://anonyome.com
https://www.linkedin.com/in/mccown
Anonyome Labs
Chief Architect

More Related Content

What's hot

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Positive Hack Days
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewSam Bowne
 
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborUnsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborRay Potter
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz neweyavagal
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionSachintha Gunasena
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSScott Suhy
 
Threats to network
Threats to networkThreats to network
Threats to networkQ4Points.com
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocentdanish3
 

What's hot (16)

ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
Hacking
HackingHacking
Hacking
 
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
Exploiting Redundancy Properties of Malicious Infrastructure for Incident Det...
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
CNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking OverviewCNIT 123 Ch 1: Ethical Hacking Overview
CNIT 123 Ch 1: Ethical Hacking Overview
 
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe HarborUnsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Uop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz newUop ajs 524 week 4 quiz new
Uop ajs 524 week 4 quiz new
 
Cyber crime1 vaibhavi
Cyber crime1 vaibhaviCyber crime1 vaibhavi
Cyber crime1 vaibhavi
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & EncryptionEntrepreneurship & Commerce in IT - 11 - Security & Encryption
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Threats to network
Threats to networkThreats to network
Threats to network
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 

Similar to Are Crypto Wars Coming?

Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessPrecisely
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Andrew Hammond
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJAsh Yadav
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
From 7331 to legal : a selection of blockchain discussion topics
From 7331 to legal : a selection of blockchain discussion topicsFrom 7331 to legal : a selection of blockchain discussion topics
From 7331 to legal : a selection of blockchain discussion topicsKoen Vingerhoets
 
20190316 - CLBFest - 1337 to legal - Koen Vingerhoets
20190316 - CLBFest - 1337 to legal - Koen Vingerhoets20190316 - CLBFest - 1337 to legal - Koen Vingerhoets
20190316 - CLBFest - 1337 to legal - Koen VingerhoetsBrussels Legal Hackers
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
 
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...Somish Blockchain Labs
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsJohn Gilligan
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity gppcpa
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesPraveen Vackayil
 
CIS 502 Education Redefined / snaptutorial.com
CIS 502 Education Redefined / snaptutorial.comCIS 502 Education Redefined / snaptutorial.com
CIS 502 Education Redefined / snaptutorial.comMcdonaldRyan201
 

Similar to Are Crypto Wars Coming? (20)

cyber forensics
cyber forensicscyber forensics
cyber forensics
 
Protecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i AccessProtecting Your Business from Unauthorized IBM i Access
Protecting Your Business from Unauthorized IBM i Access
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...Have the Bad Guys Won the Cyber security War...
Have the Bad Guys Won the Cyber security War...
 
Quant & Crypto Gold
Quant & Crypto GoldQuant & Crypto Gold
Quant & Crypto Gold
 
blockchain bootcamp @WCNJ
blockchain bootcamp @WCNJblockchain bootcamp @WCNJ
blockchain bootcamp @WCNJ
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
From 7331 to legal : a selection of blockchain discussion topics
From 7331 to legal : a selection of blockchain discussion topicsFrom 7331 to legal : a selection of blockchain discussion topics
From 7331 to legal : a selection of blockchain discussion topics
 
20190316 - CLBFest - 1337 to legal - Koen Vingerhoets
20190316 - CLBFest - 1337 to legal - Koen Vingerhoets20190316 - CLBFest - 1337 to legal - Koen Vingerhoets
20190316 - CLBFest - 1337 to legal - Koen Vingerhoets
 
Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
EOS Smart Contract Audit (https://www.somish.com/blockchain/smart-contract-au...
 
Cyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed ActionsCyber Security: Threats and Needed Actions
Cyber Security: Threats and Needed Actions
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
CIS 502 Education Redefined / snaptutorial.com
CIS 502 Education Redefined / snaptutorial.comCIS 502 Education Redefined / snaptutorial.com
CIS 502 Education Redefined / snaptutorial.com
 

Recently uploaded

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdfMuhammad Subhan
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 

Recently uploaded (20)

AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 

Are Crypto Wars Coming?

  • 1. Steven H. McCown Are Crypto Wars Coming? Issues, Solutions, and Avoiding Key Escrow
  • 2. Crypto Wars of the 1990’s • Strong Encryption == algorithms that governments couldn’t decrypt • Government rules • Categorized encryption as a ‘weapon of war’ (munition) • Export controls created to prohibit dissemination • Clipper chip, low bit lengths, etc. • Commercial needs • Secure financial transfers • eCommerce • Secure Socket Layer • Restrictions still exist, but currently less restrictive 2
  • 4. Should we use strong encryption? 4
  • 5. 2015 San Bernardino Attack 2 Dec 2015: 14 people were killed and 22 others were injured FBI • “homegrown violent extremists” inspired by foreign terrorist groups • NSA couldn’t hack perpetrator’s iPhone 5C • Asked Apple to backdoor iOS Apple • Refuses – “too dangerous to create” a backdoor • Fears the precedent … and use by hackers and malicious insiders FBI / DOJ • DOJ court order: Apple must create and install malware • Wash Post: “professional hackers” paid $1M to create 0-day • DOJ withdraws the lawsuit CBS Poll: FBI 50% -- Apple 45% 5References: • https://www.apple.com/customer-letter/ • https://en.wikipedia.org/wiki/2015_San_Bernardino_attack
  • 7. Encryption Dilemma … Re-Igniting Crypto Wars? Criminals: won’t disclose encryption keys Law Enforcement: can’t break strong crypto Can technology solve this dilemma? 7
  • 8. What is a ‘Backdoor’? Root access via: secret accounts, passwords, policies, weak crypto, etc. Examples (reported) • Cisco: HW / SW 0-days let CIA remotely control 318 products (Wikileaks 2017) • VW: 4 shared secret keys open 100M VW vehicles • Cannon Printer: ‘Extended Random’ creates vulnerable encryption (BSAFE) Problems • Insider abuse (personal, political, financial, etc.) • External hackers • Uncontrolled execution • “Responsible Encryption” (2017-18) euphemism for backdoors 8 References: • Cisco: https://www.bleepingcomputer.com/news/security/ciscos-investigation-into-vault-7-leak-uncovers-0-day-affecting-318-products/ • VW: https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/ • Cannon: https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/
  • 9. Can Lawmakers Mandate Backdoors? • FBI Director James B. Comey (2015): • In a Senate Judiciary Committee called on companies employing end-to-end encryption to revise their “business model” • Senator Richard Burr (R-NC): • Current encryption sets data “above the law.” • Senator Dianne Feinstein (D-CA): • “I am hopeful that this draft will start a meaningful and inclusive debate on the role of encryption and its place within the rule of law … No entity or individual is above the law” • Ben Wallace, UK Minister of State for Security and Economic Crime, 2018 • “It is mob rule on the internet. You shouldn’t be able to hide behind anonymity.” 9
  • 10. Is there a model for balancing personal rights with societal needs … without resorting to extreme measures like key escrow or backdoors? 10
  • 11. US Constitution as a Model “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” -- Fourth Amendment 11
  • 12. Can the 4th Amendment be Modeled in Tech? Goal: to create a technology system that makes searches impossible until mandatory requirements have been met and verified. Requirements: 1. Leave encryption keys within the user’s sole possession (i.e., no key escrow) 2. Create immutable rules regarding when and how a recovery may be performed 3. Create a set of reviewing authorities (each with competing interests; law enforcement & watchdog groups) that independently evaluate access requests and either provide or deny search authorization 4. Create the technical capability to retrieve a key only after all of the reviewing authorities reach a unanimous consent to allow a disclosure 5. Require immutable event logging that can be subsequently audited 12
  • 13. System Overview A A A A A A Smart Contract Key Recovery Authorization Group Steward Key Recovery Authorization Group Steward Key Recovery Authorization Group Steward Key Recovery Authorization Group Steward App Store Client software (installed on user device) - Manages enrolled keys / data - Obtains user consent of a smart contract of terms - Creates a unique partial key access token for each Steward - Evaluates tokens received from Stewards requesting access - Evaluates completion of smart contract terms - Transmits key according to smart contract terms Key Recovery Authorization Group Stewards - Store partial key access tokens from users - Evaluate the lawfulness of key recovery requests - Evaluate whether smart contract terms are met - Transmits partial key access token as per smart contract when terms are met Cryptographic Ledger - Immutable record of system actions, access requests, recovery attempts, etc. 13
  • 14. Transparent Terms: disclosed via Smart Contract Smart Contract 1. Full process description 2. Keys remain in user’s device 3. Recovery requirements 4. Recovery process methods 5. Audit methods 14
  • 15. Private Key 1) Users make keys and they stay here! Court of Law Appeals Court Watchdog Group Law Enforcement T1 T2 T3 T4 3) Partial Key Access Tokens sent to competing agencies 2) Unique Partial Key Access Tokens created Process Requirements: • Multiple Key Recovery Access Stewards with competing interests approve or deny access requests • On-device processes control access • All tokens must be received by device to invoke a recovery • Any access attempt is logged A A A A A A Enrollment 15
  • 16. Private Key Court of Law Appeals Court Watchdog Group Law Enforcement T1 T2 T3 T4 1. Law enforcement: -- wants access -- must send the proper token Token Validator 2. Court of Law: -- concur with request -- send the proper token 3. Appeals Court: -- concur with request -- send the proper token 4. Watchdog Group: -- concur with request -- send the proper token 5. Tokens are Validated: -- Zero Knowledge Proofs -- Blockchain 6. If all tokens are validated: -- Key is recovered 7. Else -- No recovery A A A A A A 7. Every granted access (or attempt) is logged and auditable via a blockchain Recovery 16
  • 17. Reframing The Encryption Dilemma Door #2: No recourse against criminals Door #1: Government control of encryption ‘Door #3’: Secure privacy, facilitate lawful recovery processes, & enforce checks & balances. 17

Editor's Notes

  1. References: https://www.apple.com/customer-letter/ https://en.wikipedia.org/wiki/2015_San_Bernardino_attack
  2. References: Cisco: https://www.bleepingcomputer.com/news/security/ciscos-investigation-into-vault-7-leak-uncovers-0-day-affecting-318-products/ VW: https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/ Cannon: https://blog.cryptographyengineering.com/2017/12/19/the-strange-story-of-extended-random/ Google hacked by hackers from China: http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/ https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?noredirect=on&utm_term=.f128db1dd1d8
  3. https://www.cyberscoop.com/dianne-feinstein-encryption-bill-fbi-apple/ https://www.nytimes.com/2018/03/24/us/politics/unlock-phones-encryption.html https://www.politico.com/newsletters/morning-cybersecurity/2018/04/05/encryption-legislation-takes-baby-steps-159397 https://www.thetimes.co.uk/article/digital-ids-to-end-online-mob-rule-and-anonymity-qq8lnwrcn
  4. https://www.law.cornell.edu/constitution/fourth_amendment