PUBLIC KEY ENCRYPTION AND DATA SAFETY IN THE INFORMATION AGE By Nancy Larson and Your Name The Information Age The current era in history has been dubbed “The Information Age.” Sharing information quickly and electronically is the starting point of this moniker. An ever increasing amount of information is available wirelessly through computer systems. Books are stored on Google’s servers. Wikipedia allows everyone who registers to update the information. Educational institutions post research and grades online. Corporations and organizations advertise on websites to advertise and inform. Medical groups maintain records electronically. Access to information is critical for our progress. Restricting access on a “need to know” basis is also critical. The History of the Internet What is now referred to as “the Internet” began as a defense department project to ensure continuous communication for the military in the event of a nuclear war. The contract to construct the network was awarded in 1968 and the network was physically constructed in 1969 with only four hosts.1 This network could not yet be called a public source. Throughout the next twenty years the network grew in range and was increased in speed. In 1981 the National Science Foundation developed CSNET to allow research institutions to communicate through 50 Kbps lines. The system of naming domains was established by the University of Wisconsin and the TCP/IP protocols were put in place in 1983. By the mid-80s, the demand for service on the network increased and T-1 lines were implemented. Demand continued to increase and the development of the next generation of lines (to be called T-3 lines) began immediately. These lines (at 45 Mbps) were 1 History of the Internet2010. 27 March 2010. <http://www.davesite.com/webstation/net-history.shtml> available by 1990. Through the 1980s and 90s, the internet transitioned from a military and research communication tool to a public communication tool.2 By the mid-1990s, companies were finding ways to market through the internet. Microsoft’s Windows 98 provided a source of standardized internet access to a large number of consumers, both business and individuals. Other software companies followed suit. E-commerce was going strong, led by companies such as Amazon. The former military network was now used by a majority of the public in the United States.3 E-commerce brought the need for sharing private information securely from a public site. Payment was usually made by credit card, so the number must be sent through the internet. The use of electronic records, accessible from multiple locations, has required a secure system which can transfer larger packets of information securely. These records are used in many fields, including education, banking and medicine. How are these records protected? Protecting Data Transferring data is possible because computers handle all information numerically. The letters of the alphabet are matched to numbers in a code referred to as ASCII. (See the table in Appendix A.) Each letter and number symbol is represented by a number. The computer does not use “E”. It uses 069. For “e” the computer uses 101. The complete table is in the appendix. Since all data is represented by numbers, performing calculations on the numbers hides the data. The technique that is most commonly used for this is called public key encryption. Founders of Public Key Encryption 2 Zakon, Robert. Hobbes' Internet Timeline. 1 January 2010. 25 March 2011 <http://www.zakon.org/robert/internet/timeline/ 3 Howe, Walt. A Brief History of the Internet. March 24, 2010. Retrieved March 27, 2011.<http://www.walthowe.com/navnet/history.html>. A trio of mathematical researchers proposed an asymmetric cypher in mathematical literature in 1976.4 These researchers were Whitfield Diffie, Martin Hellman, and Ralph Merkle and the asymmetrical cypher became known as public key encryption. The paper published at that time provided a means of encryption, but the cypher to the encryption (the means to return the coded data to the original) would have to be transferred to the recipient of the communication. The transfer of the information that would break a code was a weak point in the encryption technique. Intercepting the cypher would allow the breaking of the code. But the paper published by Diffie, Hellman and Merkle proposed that an asymmetric function would solve this problem. There was only one drawback; no one knew of an asymmetrical function. A group of researchers for MIT, that were located in East Africa, were determined to make the asymmetric function a reality. Ronald Rivest, Adi Shamir, and Leonard Adleman tried ideas and discarded them for over a year. Leonard Adleman was the mathematician of the group. Rivest and Shamir were creative thinkers. They made a good team. Rivest and Shamir proposed ideas. Adleman found the fallacy in their proposals. Little time was wasted on ideas that would not work. In April 1977 Rivest proposed a solution that Adleman could not refute. 5 In August, 1977, Martin Gardner announced RSA public key encryption in the Games column of Scientific American. (Gardner) The underlying premise of public key encryption is that the person receiving the information will choose two large prime numbers. (Prime numbers are those that can be evenly divided only be itself and one.) These two prime numbers are the private key. The product of these two primes, resulting from multiplication of the two prime numbers, is the public key. 6 Data Safety 4 Singh, Simon. The Code Book. New York: Random House, 1999. 5 Singh, Simon. The Code Book. New York: Random House, 1999. 6 Singh. Are credit card numbers safe with a basic set of calculations like this? Are medical records secure? All the hacker would have to do is find one prime number that is a factor of the public key, and the second number will reveal itself, too. Luckily, it isn’t as easy as that. Martin Gardner, in the article that first announced public key encryption, challenged his readers to decode a cyphertext using a public key of 129 digits that he printed in the article.7 Eighteen years later a group of 600 volunteers was able to break the encryption by factoring the public key. The group split the job into parts and used the computers and supercomputers in a parallel effort to succeed. One other point must be considered. The public key in this example was 129 digits. Many are 300 digits in length, vastly complicating the factoring. (Singh) Public key encryption makes other forms of hacking more appealing than breaking the key for encryption. Locating the Public Key Everyone who has purchased products online has used public key encryption. The computer user doesn’t need to enter the number. The public key is sent to the computer sending information by the computer that will receive the information. For the user it is invisible. The visible signals that encryption is in place are a padlock at the bottom left of the browser window and/or a web address that starts https:// indicating a secure site. The public key can be regenerated as often as it is needed. How often that occurs is determined by a company’s security protocols. Based on prime numbers, the encryption has a large number of possibilities. The number of prime numbers is at this time limited, but the total number of prime numbers has been proven to be infinite. If, or when, a better method of finding prime numbers is developed, the flexibility of public key encryption will increase. Usernames and Passwords 7 Gardner, Martin. "A new kind of cypher that would take millions of years to break." Scientific America August 1977: 120-124. Internal company websites, intranets, and emails often require a specific login, usually requiring a unique username and password for each individual. These websites will also use public key encryption when these passwords are transmitted. The double layer of encryption provides more security for the protection of proprietary information, personnel information and other information that the corporation wishes to protect. These types of security measures are also used for controlling access to medical and school records. The choice of password also influences the level of security. Some corporations are now requiring sixteen characters in the passwords with upper and lower case letters and numbers included in every password. Some security software will check the password for recognizable words, names and phrases. These weaken the password and are rejected by the security software. Randomly generated passwords are harder to break. However, passwords that are randomly generated are usually more difficult to remember. When the password is hard to remember, people are inclined to write it down, or save it on their computer. This reduces security. Choosing the length and security of passwords is a balancing act. The Future of Security The security issue will need to be constantly updated as the criminals become more adept at decoding or stealing the information to break current security measures. Public key encryption will be a strong part of network security for a long time in the future. The ability to access data from multiple locations provides more accurate medical records for the benefit of both doctors and patients, provides parents and students the opportunity to monitor grades throughout the school year and provides online banking and financial services at any hour of the day. This is the expected standard in the twenty-first century. Appendix A Table 1: ASCII Codes Sample ASCII codes ASCII value 048 049 050 051 052 053 054 055 056 057 058 059 060 061 062 063 064 065 066 067 068 069 070 071 072 073 074 Character 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J ASCII value 075 076 077 078 079 080 081 082 083 084 085 086 087 088 089 090 091 092 093 094 095 096 097 098 099 100 101 Character K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ a b c d e ASCII value 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 Character f g h i j k l m n o p q r s t u v w x y z Prime Numbers 2 13 31 53 73 101 127 151 179 199 233 263 283 317 353 383 419 443 467 503 3 17 37 59 79 103 131 157 181 211 239 269 293 331 359 389 421 449 479 509 5 19 41 61 83 107 137 163 191 223 241 271 307 337 367 397 431 457 487 521 7 23 43 67 89 109 139 167 193 227 251 277 311 347 373 401 433 461 491 523 11 29 47 71 97 113 149 173 197 229 257 281 313 349 379 409 439 463 499 541