Tuesday, January 17, 2012

Cryptography

I thought it was interesting when the book started going into detail about how public-key cryptography worked. I immediately thought of the problems with Marcus' plan.

Marcus went to great lengths to ensure the computer used for key generation wasn't bugged, but what about everyone's cell phones or computers at home? Could everyone there be trusted to securely erase the keys? Most of the people at the party had no idea what was going on. It is doubtful that everyone there would exercise the necessary precautions to keep the keys secure.

The weakest point of a decent encryption system is probably the person using it. Even Marcus himself gave up all his information when being interrogated. In a state where anyone under the slightest suspicion gets questioned, what is the point of employing cryptography if no one is capable of resisting whatever interrogation techniques are used.

My bitstrip pokes fun at the flaws in Marcus' plan.

No comments:

Post a Comment