First of all, because it matters
most of all, I'm gratified that I'm getting email from many of you, little
flares of discussion on Twitter, and informed multisided argument over at Light Reading about "Silence Like Diamonds". That little adventure novelet is honestly
drawing more attention and creating more conversation than some of my novels.
(Possibly it even deserves to.) Thanks, guys, not only could I not have done it
without you, by definition, if there hadn't been a you, I wouldn't've done it.
Second, in case you missed that
there subtle hint right there, time to start reading "Silence Like Diamonds,"
because Episode 7 is up now, and as I mentioned
earlier this week, we are now, rhymthically speaking, getting into the
space where a whole lot of stuff ought to blow up. (And I am nothing if not
slavish to rhythm). If you haven't
started yet, since each episode is only a thousand words, you can be caught up
in something less than an hour, so just hop on over and start at Episode 1 or
wherever you like on the Episode List.
And now to the heart of things: One
chunk of the ongoing discussion I've been enjoying, mostly as a spectator, is
the conversation brought on by this blog piece and amplified by Mitch Wagner over at Light Reading, where you'll find the public discussion. The question,
broadly, is that given that many good minds are at work on a fast factorization
process, and a fast factorization process would rip open RSA and public key
encryption generally, reducing decrypting times from literally astronomical to
a matter of days or less. Right now we don't know if it's even possible (and
depending on how paranoid you are, we also don't know that someone doesn't have
it already).
So, Mitch asked a bit nervously,
if a fast factorization algorithm is found, that means all the locks are open
and everything will be read. Can humanity survive? More importantly, can people in the computing, software, and communications industries continue to afford upgrades, games, and huge conferences?
I think the reason behind that
question is that we're living in a polar condition -- that is, privacy and
secrecy could hardly be more effective than they are now. Nearly all the hacks and penetrations we know
about are caused by sloppy humans, not by broken encryption. The balance was
tipped over hard to the encryptor side two generations ago, and our security wizards have developed some
extremely comforting and predictable adages about where to look for trouble, which have worked so well
for so long that some of them have been lulled into the comforting belief that
that is all there is to it. If you like a slight dash of irony, the major weakness in security with respect to this subject is that so many security people have a false sense of security.
But historically there have been times when the
balance flipped the other way. The world did not end, but it sure was different.
During the mid-19c cluster of wars that began with the
Crimean War and finished with the Franco-Prussian War, for example,
cryptanalysts were breaking codes at their desks within hours (tools like frequency tables were well developed, the more common transpositions were easily parsed by known methods, single value ciphers were still the most common, and the trick of assigning tasks to half a dozen code clerks had been mostly worked out). Moreover, the
more important messages had to move by courier because the telegraph lines were
insecure. Cavalry scouts spent a fair bit of their time looking for a man by himself in
the other uniform, riding hard, and their instructions about such riders were "The mail doesn't go through, and getting the saddlebag is more important than getting the prisoner."
How did the armies of the time adapt? First of all,
they very nearly abandoned cryptography.
Lee's Special Order 191, the one that was used to wrap three cigars and
fell into McClellan's hands, was unencrypted. (Had it been encrypted in the strongest cipher Lee and Stonewall Jackson shared, McClellan's cipher clerks would have needed no more than two hours to figure out the gist of it, with a few words ambiguous or garbled). The intercepted, enciphered
diplomatic telegram that eventually became a key to proving Dreyfuss's
innocence was partly decoded on the first day and fully decoded within six; but
the intercepted document that pointed suspicion toward him in the first place
was also unencrypted, even though it was a letter to the German embassy offering a catalog of French top secret military documents for purchase.
Instead of the futile effort to
make the meaning unreadable, they concentrated on physical security and
deception. That was the great age of the hollow cane, the false-bottomed flask,
and the double-layered corset. Vital messages might be sent in multiple copies
-- only one of which was valid -- by multiple riders, none of whom knew whether
they were carrying the true one or not. Authentication was by prearrangement,
personal codes that resembled passwords, trellis devices, and a host of other
techniques, but perhaps the most important security measure was always
understood to be to minimize the need for secrecy in the first place: send the message as late as possible, talk only about the very immediate future.
Or consider how banks in the
United States operated between President Jackson's successful closure of the
Bank of the United States and Lincoln's establishment of the National Banking
System. In those days checking accounts
were rare, and for the wealthy; the most common way banks gave out money was by
issuing banknotes, which at the time was not just a quaint expression for
denominated bills, but were actually issued by individual private banks, to be redeemed
at that bank only for gold or silver, or the notes of other
banks (and very occasionally for government securities, including "Treasury notes," i.e. the paper money the federal government issued to pay its employees, which went into circulation when they spent it and went back out when people used it to pay taxes).
At that time not only did the
U.S. prohibit interstate banking, but many states didn't allow intercounty
banking, so the result was that there
were literally thousands of banks all issuing paper money in the United States,
some in states like Ohio, Michigan, New York, and Vermont that regulated the
practice tightly, and some in states like Texas, South Carolina, Delaware, and
Missouri that barely regulated it at all. (Check out the slideshow on thispage, which is actually about a quite different topic; a few slides into the show, there
are a dozen or so images of bills in strange denominations -- $3, okay, but an $11 bill? They wanted
them all in primes, or to always get change back from a ten?)
Especially before the telegraph,
this meant that if you accepted payment in $17.50 bills (yes, that denomination existed) from, say, Reverend Bob's Friendly Bank
of Possum Droppings, Minnesota, and deposited them into the Dependable Farmers
and Mechanics Bank of Swampland, Louisiana, it might take a month for the bank
notes to be mailed back to Possum Droppings and the clerk there to send a
verification letter to a clearinghouse that would then ship gold coin to
Swampland. (This, by the way, is why train robbers were so intent on robbing trains for
generations, and train robbing was the career peak for armed robbery: the mail train carried many big sacks of untraceable banknotes that could be
redeemed in thousands of places if you had the time).
To the surprise of no one who has ever known
any people, notes from non-existent banks abounded; unscrupulous printers made
copies of notes from distant banks; people opened banks solely to print notes;
Ponzi schemes long before Ponzi were widespread.
Yet the United States economy
managed to be the fastest growing in the world, and though there was plenty of
trouble and the great banking historian Bray Hammond commented that when
Abraham Lincoln took office to run what would be, in many ways, the first modern
war, he had a financial system perfectly designed for the Wars of the Roses
.... all the same, it worked.
How did they do it? Discount
houses would pay a fraction of face value in exchange for assuming the value of
the bills. More than a dozen publishers
put out monthly volumes listing known-to-be-reliable banks and the
denominations, serial numbers, and descriptions of their bills. Money was
printed that could only be in private hands up to a fixed date, after which
private individuals were not supposed to take it but banks and clearinghouses would accept it for redemption. After the
telegraph, bank detectives could be dispatched to distant cities with up to
date information to keep corresponding banks safe from false notes issued on
more reliable banks. And by the late
1840s, the urgent need for fast shipping of banknotes and money orders to and
from the California gold fields resulted in the creation of "express"
companies, which specialized in high-security (i.e. armed guard) high-speed
(i.e. railroads and steamboats where available, horse relays or stagecoaches
where not) shipments mostly of bank notes, and sometimes of gold. In very short
order, the express companies began to handle dozens of other financial and
security duties, since they had bonded clerks and often the only decent safes in tow. By the 1870s, express companies had become predominantly financial. (Two of those
early express companies are still with us: American Express and Wells Fargo).
Now, shipping boxes of doubtful
bank notes by fast horse with armed guards is certainly not the economical way
of doing things. It was a huge overload and a drag on the economy. But it could be done, and it worked well
enough for the economy to keep going. There's even a fair case that it may have
led to more rather than less growth; much of the canal era and the early
railroad era were financed in large measure by bank notes that could never be
redeemed, so that much of the building of vital infrastructure was in effect a
freebie for the entrepreneur (and a ripoff for the investor).
As for the thing that scares a lot
of people about decryption, the revelation of secrets like that bank account you're going to use
to run off with your on-the-side, or the payments to your love-child's mother,
or your top secret weed stash financing (which lately has been making banks in
Colorado, where I live, very happy and mellow indeed without ever having to
touch the product) ... ever gone to a coed steambath or a nudist colony? Disconcerting momentarily, but when
everyone's naked, it stops being a thing pretty fast. One church deacon with a Swiss bank account
and a Costa Rican love nest is a scandal; a hundred thousand of them, with two
thousand more caught every month, is just a predictable part of the
archbishop's overhead.
I'm not saying that the shattering
of encryption would make no difference at all.
All the alternatives -- more extensive use of one time pads, physical
security, spoofing, alternate-channel verification, and so on -- would cost
much more and work much less well than what we have now. Look for more fraud, more robbery, more money
spent by both sides on guards, goons, and guns.
Look for a time when good security
people get rich quick, and lead interesting lives. Which brings me back to Episode 7 of "Silence Like Diamonds. " Remember the main
characters in that story are flourishing private consultants and business people
pulling down fat contracts from major corporations. And what field are they all in? Security.
If you're in any of the security
fields today, you might want to burn a little incense to the Gods of Fast
Factorization. Because just about the only safe prediction, if fast factoring
becomes a reality, is that you're going to be rich. Nobody, after all, makes more money than someone who promises to try to sell you what no one can deliver.