1. World problems
  2. Vulnerability of encryption codes

Vulnerability of encryption codes

  • Vulnerability of coded secret information
  • Ineffectiveness of encryption key escrow

Nature

In a society increasingly based on computerized communications, there is concern about the privacy of such communication. Considerable resources have been devoted to encryption of messages. Because public-key encryption systems allow people who have never met to communicate with privacy, the problem of identity verification and authentication arises. When someone's published public key is used to encrypt a message, how does the sender know that it is really the other's key ? Governments favour a hierarchical identification system, preferably with themselves at the top of the hierarchy. In such a system, each layer of identification is derived from the next level of a constantly narrowing pyramid, leaving those at the top with the absolute power to abuse the system.

Background

More and more private communications are being routed through electronic channels. Such messages are very easy to scan for interesting keywords on a routine basis using automatic procedures that are virtually undetectable.

Incidence

In the USA in 1991, through Senate Bill 266, an effort was made to force manufacturers of secure communications equipment to insert special "trap doors" in their products so that any encrypted messages could be read by government agencies. The proposal did not pass into law but other legislation has been formulated with similar objectives. The USA continues long-standing restrictions on exports of powerful encryption devices that it is unable to break. It encouraged installation of a Clipper chip that makes it relatively easy for the government to eavesdrop on encrypted communications. Governments have explored the possibility of allocating the control of encryption keys to trusted third parties, namely government approved agencies -- a process known as key escrow.

Users, especially foreign corporations, employing standard encryption technology approved by governments such as the USA must recognize that their communications could be monitored for the benefit of nationally based corporations.

Claim

If privacy is outlawed, only outlaws will have privacy. Ordinary people do not have access to the crytographic technology available to government agencies and large corporations.

Government should not be granted the power to maintain complete surveillance over the population. It is inappropriate to assume that anything undertaken by government to enhance the ability of the police to catch criminals is acceptable.

Counter-claim

Strong encryption makes surveillance of of communications practically impossible for government. Law enforcement agencies have a legitimate concern that criminals, drug dealers or terrorists may make use of unbreakable encryption codes and could not easily be restrained without special government control of such technology.

If key escrow was in place, few criminals would make use of it and would therefore be the only ones with effective privacy.

Broader

Aggravates

Internet fraud
Yet to rate

Related

Evidence decay
Yet to rate

Strategy

Value

Vulnerability
Yet to rate
Secrecy
Yet to rate
Misinformation
Yet to rate
Invulnerability
Yet to rate
Information
Yet to rate
Ineffectiveness
Yet to rate
Disinformation
Yet to rate
Deformation
Yet to rate

SDG

Sustainable Development Goal #9: Industry, Innovation and Infrastructure

Metadata

Database
World problems
Type
(F) Fuzzy exceptional problems
Subject
  • Information » Information
  • Information » Data, codes
  • Societal problems » Vulnerability
  • Societal problems » Ineffectiveness
  • Defence » Secrecy
  • Content quality
    Presentable
     Presentable
    Language
    English
    Last update
    Oct 6, 2023