Skip to content

@vanoorschotPublicKeyCryptography2022

[!info] - Cite Key: @vanoorschotPublicKeyCryptography2022 - Link: van Oorschot - 2022 - Public Key Cryptography’s Impact on Society How D.pdf - Bibliography: van Oorschot, PC. 2022 Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World. In:. Slayton, R (ed.). Democratizing Cryptography. 1st ed. New York, NY, USA: ACM. pp. 19–56. DOI: https://doi.org/10.1145/3549993.3549997.


Title: [@vanoorschotPublicKeyCryptography2022] date: {{date}} type: reference project:


tags:: #programming #blackbox projects:


Note

I brought this article in because I thought it related to a couple thoughts that I have been having. Firstly and foremost, data integrity. How do we ensure that the data we are reading is what we think we are reading? This was similar to book consistency.

Secondly, I thought about how technologies becoming obsolete is a trend that is happening often in recent societies. However, this is not limited to physical technologies. Digital technologies and methods are also being quickly taken over by a 'better version'.

Lastly, I would like to tie my memex together with aspects of Computer Science, because that is what I am interested in.


Reference

Oorschot, Paul C. van. “Public Key Cryptography’s Impact on Society: How Diffie and Hellman Changed the World.” In Democratizing Cryptography, edited by Rebecca Slayton, 1st ed., 19–56. New York, NY, USA: ACM, 2022. https://doi.org/10.1145/3549993.3549997.


Summary & Key Take Aways

This article details the history and impacts that Diffie and Hellmans discovery of public key cryptography had on the development of secure communication. van Oorschot details many examples of ideas that Diffie and Hellman had prior to their discovery, as well as the technologies that were able to be created after the discovery. Examples of these technologies include e-commerce, specifically the ability to send your credit card info securely over the internet, as well as simple tasks such as secure messaging channels, like WhatsApp.


data integrity


Annotations

%% begin annotations %%

Imported on 2023-02-06 12:20 pm

Questions / confusion

[!quote|#ffd400] Highlight The invention of public key cryptography had little noticeable impact on society over 19761985, the first decade after its discovery.

Page 8 [[2023-01-19#10:30 am]]

[!quote|#ffd400] Highlight What did draw interest in this second decade was the maturation of smart cards or chip cards—integrated circuits with non-volatile storage (e.g., for cryptographic keys), but also processing capabilities

Page 9 [[2023-01-19#10:35 am]]

[!quote|#ffd400] Highlight Smart cards employing public key algorithms emerged later in the form of chip-and-PIN payment cards

Page 9 [[2023-01-19#10:36 am]]

[!quote|#ffd400] Highlight During this second decade (1986-1995), a new focus for widescale deployment of public key cryptography was secure email.

Page 9 [[2023-01-19#10:36 am]]

[!quote|#ffd400] Highlight Unsurprisingly, one culprit is key management, in this case, how to bridge trust in public keys not only across a few communities, but across essentially all email users in the world (as global interoperability is the default expectation for email).

Page 9 [[2023-01-19#10:37 am]]

[!quote|#ffd400] Highlight This is a grand success of public key cryptography in the second decade of the 21st century.

public key cryptography is not that widely used? Still has ways to go? Not sure.

Page 10 [[2023-01-19#10:41 am]]

[!quote|#ffd400] Highlight In 1995, 20 years after the discovery of public key cryptography, its impact on society remained relatively small, or at least largely unnoticed.

Page 10 [[2023-01-19#10:41 am]]

[!quote|#ffd400] Highlight Navigator 1.1. SSL and its successor, the Transport Layer Security (TLS) protocol [72], are recognized as the key technologies that enabled the rise of e-commerce.

Page 10 [[2023-01-19#10:41 am]]

[!quote|#ffd400] Highlight This apparently triggered changes by browser providers, e.g., making ECDHE a default for TLS in browser sessions.

Page 10 [[2023-01-19#10:43 am]]

[!quote|#ffd400] Highlight This accommodation plan has turned out to be wildly successful [2, 39], and TLS is now used as a general utility for secure data transfer by a wide variety of applications such as web- and video-conferencing, office productivity software, instant messaging, and applications connecting to cloud storage

Page 11 [[2023-01-19#10:55 am]]

[!quote|#ffd400] Highlight bearing in mind that manual triggering of upgrades by many users is slow to occur, if at all.

Page 13 [[2023-01-19#11:04 am]]

[!quote|#ffd400] Highlight A collection of FIDO specifications includes those governing use of such technology to either augment or entirely avoid use of passwords.16

Page 13 [[2023-01-19#11:06 am]]

[!quote|#ffd400] Highlight How can one protect not only the plaintext content of a message, but also hide related metadata such as the identities of the participants in a communication, and the time of the communication?

Page 13 [[2023-01-19#11:07 am]]

[!quote|#ffd400] Highlight The turning point for e-commerce was the emergence, and wide adoption, of TLS (above)

Page 15 [[2023-01-19#11:12 am]]

[!quote|#ffd400] Highlight As Table 1 shows, today’s largest US public companies are precisely those that dominate e-commerce and the digital economy.20

Page 15 [[2023-01-19#11:14 am]]

[!quote|#ffd400] Highlight he reported use of encryption by gmail and Google Drive is now stable at 100%

Page 16 [[2023-01-19#11:14 am]]

[!quote|#ffd400] Note

stoppedhere

Page 16 [[2023-01-19#11:16 am]]

%% end annotations %%

%% Import Date: 2023-02-06T12:20:40.335-05:00 %%