Secure channel

Secure channel

In cryptography, a secure channel is a way of transferring data that is resistant to interception and tampering.A confidential channel is a way of transferring data that is resistant to interception, but not necessarily resistant to tampering.An authentic channel is a way of transferring data that is resistant to tampering but not necessarily resistant to interception.

ecure channels in the real world

There are no perfectly secure channels in the real world. There are, at best, only ways to make insecure channels (eg, couriers, homing pigeons, diplomatic bags, etc) less insecure: padlocks (between courier wrists and a briefcase), loyalty tests, security investigations, and guns for courier personnel, diplomatic immunity for diplomatic bags, and so forth.

In 1976, two researchers proposed a key exchange technique (now named after them) — Diffie-Hellman key exchange (D-H). This protocol allows two parties to generate a key only known to them, under the assumption that a certain mathematical problem (eg, the Diffie-Hellman problem in their proposal) is computationally infeasible (ie, very very hard) to solve, and that the two parties have access to an authentic channel. In short, that an eavesdropper -- conventionally termed 'Eve', who can listen to all messages exchanged by the two parties, but who can not modify the messages -- will not learn the exchanged key. Such a key exchange was impossible with any previously known cryptographic schemes based on symmetric ciphers, because with these schemes it is necessary that the two parties exchange a secret key at some prior time, hence they require a confidential channel at that time which is just what we are attempting to build.

It is important to note that most cryptographic techniques are trivially breakable if keys are not exchanged securely or, if they actually were so exchanged, if those keys become known in some other way — burglary or extortion, for instance. An actually secure channel will not be required if an insecure channel can be used to securely exchange keys, and if burglary, bribery, or threat aren't used. The eternal problem has been and of course remains — even with modern key exchange protocols — how to know when an insecure channel worked securely (or alternatively, and perhaps more importantly, when it did not), and whether anyone has actually been bribed or threatened or simply lost a notebook (or a notebook computer) with key information in it. These are hard problems in the real world and no solutions are known — only expedients, jury rigs, and workarounds.

Future possibilities

Researchers have proposed, and actually demonstrated in real circumstances quantum cryptography in order to create a secure channel. There is at least one commercial company offering a product embodying it. One aspect of quantum cryptography is absolutely secure data exchange, that is guaranteed (if we understand the physics correctly, and most everyone thinks we do in this case) exchange of uneavesdroppable, non-interceptable, non-tamperable, data. The mechanism is related to quantum uncertainty (the uncertainty relation).

It is not now clear whether the special conditions under which it can be made to work are practical in the real world of noise, dirt, and imperfection in which most everything is required to function. Thus far, actual implementation of the technique is exquisitely finicky and expensive, limiting it to very special purpose applications indeed. It may also be vulnerable to attacks specific to particular implementations and imperfections in the optical components of which the quantum cryptographic equipment is built. While implementations of classical cryptographic algorithms have received the worldwide scrutiny over the years, only a limited amount of public research has been done to assess security of the present-day implementations of quantum cryptosystems (mostly because they are not in the widespread use now).


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • Secure Shell — or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices. RFC 4252] Used primarily on Linux and Unix based systems to access shell accounts, SSH was designed as a replacement for TELNET… …   Wikipedia

  • Secure transmission — In computer science, Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many secure transmission methods require a type of encryption. The most common email encryption is… …   Wikipedia

  • Secure multi-party computation — (also known as secure computation or multi party computation (MPC)) is a sub field of cryptography. The goal of methods for secure multi party computation is to enable parties to jointly compute a function over their inputs, while at the same… …   Wikipedia

  • Channel Tunnel — Map of the Channel Tunnel Overview Location English Channel (Strait of Dover) Coordinates Folkestone …   Wikipedia

  • Secure messaging — is a server based approach to protect sensitive data when sent beyond the corporate borders and provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e Mail are that confidential and… …   Wikipedia

  • Secure units for children — are where children who break the law are sent to punish them and also to protect other people if their offense put other people at risk. In secure units they try and stop re offending. The units also educate children and there are activities for… …   Wikipedia

  • Channel 5 —    Channel 5, television broadcasting’s first new terrestrial station for ten years, was set up in 1997 after several false starts. Its advent had made existing stations apprehensive, but in the first two years they have not had much to worry… …   Encyclopedia of contemporary British culture

  • channel — channel1 [chan′əl] n. [ME chanel, canel < OFr: see CANAL] 1. the bed of a running stream, river, etc. 2. the deeper part of a river, harbor, etc. 3. a body of water joining two larger bodies of water 4. a tubelike passage for liquids 5 …   English World dictionary

  • Secure Socket Tunneling Protocol — (SSTP) is a form of VPN tunnel that provides a mechanism to transport PPP traffic through an SSL channel. SSL provides transport level security with key negotiation, encryption and traffic integrity checking. The use of TCP port 443 should… …   Wikipedia

  • Secure Communications Interoperability Protocol — SCIP is the U.S. Government s standard for secure voice and data communication. The acronym stands for Secure Communications Interoperability Protocol and was adopted to replace the FNBDT (Future Narrowband Digital Terminal) title in 2004. SCIP… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”