Skip to main content

Throwing an Eliptic Curve Ball

Defeatist Attitudes

The hullabaloo around the pervasive NSA and GCHQ snooping is still ongoing.  Nevertheless, the common public is indifferent, since they don't understand it and feel that they cannot do anything about it anyway - defeatism at its worst.

Computer security is an asymmetric battle.  The little guy is up against goliath, with only some obscure mathematics to safeguard him. The sad fact of the matter is that we were never supposed to have to take on the likes of the NSA and GCHQ.  They were supposed to be the good guys, but their overreach have moved them over to the Dark Side.

Leaky Sieves

The problem is that the NSA and GCHQ are leaky sieves.  They gather tons of data and then leak it out to all and sundry - after all, what is the point of gathering data if nobody will ever look at it?  Therefore the only way to secure your data is to ensure that they can never get their grubby paws on  it in the first place.

The computer geeks of the world have a heavy burden to shoulder, trying to keep company business transactions secure, installing and deploying encryption systems despite general apathy and the constant nagging feeling that it is all for naught - that you are forced to go to a lot of trouble to install a complex encryption system that has already been broken without your knowledge.

Eliptic Curve and Diffie Hellman to the Rescue 

At this point, after reading numerous  articles, my advice is to switch to Elliptic Curve Encryption with the Diffie Hellman Key Exchange, despite Bruce Schneier's reservations about the NSA involvement in the selection of the constants (Much as I dislike their current overreach, the NSA isn't all bad, just don't use Dual_EC_DRBG from NIST SP 800-90, which was discredited by very good Microsoft cryptographers. :).

Look for the keyword ECDHE when you select and install off the shelf VPN equipment or software.  Make the keys as long as you can tolerate (larger than 500 bits) and put your trust in forward security, so that if one session gets compromised, it doesn't automatically spill all the beans in your NSA archive. That seems to be about the best you can do.

You should use standards and devices that are designed to be interoperable, for example Suite B described on this page: http://www.nsa.gov/ia/programs/suiteb_cryptography/ and the one I prefer would be this http://www.nsa.gov/ia/_files/SuiteB_Implementer_G-113808.pdf, which is Elliptic Curve  key agreement with a Discrete Logarithm algorithm and a Diffie Hellman handshake.

Interoperable equipment ensures that the implementation was reviewed by multiple parties.  Do not trust proprietary algorithms from a single source, since it could be snake oil.

Sometimes I get tempted to add a large block of /dev/urandom data to the end of every email, just to give the spooks grief...

Good Luck With This

***IDEA2048***�̽����=��-�w� �%� ��麿�(:����R �vO �� R� -�ו؅*� �
� _fT�Ϯ�M듾)[�=�vz�� ��?"�{���趢�� ��|T
CH�[ߋuK�� .D(��72 ���z -�
                          M=O��LF "��/L+S��m$򖹒�t3��M�c��Ǎ��QnT���PY����O� h �8�h G� ����m ���?�߄|=���><lK� d� ��<\��
                                     ���p�$���W��.&R� �� � ��K?V
                                                                 zs7����O�D� �#m����,�� � ��nh�� I Y�,w��ǒ89vH���b�S7�֒A ���M�O� ��"�)uO���bmWF��vڊ�7�D� p �� t����G2$����7L ��+T�ݿs�*��]�/9 �� 78X(�o��'���l( ���,���� � %�� +~ �����
p��r߂dY^�r
           /i��#�ay���G�C �ln ^*e96�z|�6����c ��~���aL(��W<4ӌ&j����/    � ��w �z6sp?G�T�d�k�;l�����%o
���Z������`�z'̎���躸f�$ ���X�*�%���V�kA��d�p�=�|� �xyـ� V&� ��.1�{|
                                                                   � P���^`���ۚ�$M>ձ� � - 3� k���f| K�4�tK & ��{�Ir P�č XN �W���� �����r[�~z�øub[��x�ay���dn=o��P� � ���0��V ����s�Ji�����z.Ef�b���C���[��L� ��_Z�e� � nE���c��>T[�� qn s˱��i@W��+]�9����1&L� gɔ_ y�k�ɪ���QԲ"�zW�
;B�������0��***END IDEA2048***


Comments

Popular posts from this blog

Parasitic Quadrifilar Helical Antenna

This article was reprinted in OSCAR News, March 2018:  http://www.amsat-uk.org If you want to receive Satellite Weather Pictures , then you need a decent antenna, otherwise you will receive more noise than picture. For polar orbit satellites, one needs an antenna with a mushroom shaped radiation pattern .  It needs to have strong gain towards the horizon where the satellites are distant, less gain upwards where they are close and as little as possible downwards, which would be wasted and a source of noise.  Most satellites are spin stabilized and therefore the antenna also needs circular polarization, otherwise the received signal will flutter as the antennas rotate through nulls. The helical antenna, first proposed by Kraus in 1948, is the natural solution to circular polarized satellite communications.  It is a simple twisted wire - there seems to be nothing to it.  Various papers have been published on helix antennas, so the operation is pretty well understood. Therefore,

To C or not to C, That is the Question

As most would know, the Kernighan and Ritchie C Programming Language is an improved version of B, which is a simplified version of BCPL, which is derived from ALGOL, which is the Ur computer language that started the whole madness, when Adam needed an operating system for his Abacus, to count Eve's apples in the garden of Eden in Iraq.  The result is that C is my favourite, most hated computer language , which I use for everything. At university, I learned FORTRAN with punch cards on a Sperry-Univac, in order to run SPICE, to simulate an operational amplifier.  Computers rapidly lost their glamour after that era! Nobody taught me C.  I bought the book and figured it out myself. Over time, I wrote a couple of assemblers, a linker-locator, various low level debuggers and schedulers and I even fixed a bug in a C compiler - not because I wanted to, but because I had to, to get the job done!   Much of my software work was down in the weeds with DSP and radio modems ( Synchronization,

Weather Satellite Turnstile Antennas for the 2 meter Band

NEC2, 2 m band, 146 MHz, Yagi Turnstile Simulation and Build This article describes a Turnstile Antenna for the 2 meter band, 146 MHz amateur satcom, 137 MHz NOAA and Russian Meteor weather satellites.  Weather satellite reception is described here .  A quadrifilar helical antenna is described here .   Engineering, is the art of making what you need,  from what you can get. Radiation Pattern of the Three Element Yagi-Uda Antenna Once one combine and cross two Yagis, the pattern becomes distinctly twisted. The right hand polarization actually becomes visible in the radiation pattern plot, which I found really cool. Radiation Pattern of Six Element Turnstile Antenna Only a true RF Geek can appreciate the twisted invisible inner beauty of a herring bone antenna... Six Element Turnstile Antenna Essentially, it is three crosses on a stick.  The driven elements are broken in the middle at the drive points.  The other elements can go straight throug