The technology we use, and even rely on, in our everyday lives –computers, radios, video, cell phones – is enabled by signal processing. Learn More »
1. IEEE Signal Processing Magazine
2. Signal Processing Digital Library*
3. Inside Signal Processing Newsletter
4. SPS Resource Center
5. Career advancement & recognition
6. Discounts on conferences and publications
7. Professional networking
8. Communities for students, young professionals, and women
9. Volunteer opportunities
10. Coming soon! PDH/CEU credits
Click here to learn more.
News and Resources for Members of the IEEE Signal Processing Society
On July 6 a technical study titled: Keys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications has been published. The scientists behind this work are more than domain experts. Among the others: Steven M. Bellovin known for his work in the encrypted keys exchange; Josh Benaloh who invented the Benaloh cryptosystem; Matt Blaze who worked on cryptographic files systems; Whitfield Diffie universally known as one the pioneers of public key cryptography; Peter G. Neumann who worked on Provably Secure Operative Systems; Ronald L. Rivest who is “R” in RSA; Jeffrey I. Schiller known for being one of the creator of Kerberos and Bruce Schneier one the biggest expert in security and cryptography.
The paper investigates several aspects related to the present requests by some Governments about providing backdoors (exceptional accesses) in the cryptographic systems. Starting from the NSA’s Clipper Chip the athors dissect the implications of creating backdoored cryptosystem considering also the ethical and legal behind it. The paper focuses on three main problems that the exceptional access would create:
the break of the current best practises that have been deployed in the last years;
a system that would provide some backdoor mechanism, will be more complex and “complexity is the enemy of security” because prone to vulnerability;
“exceptional access would create concentrated targets that could attract bad actors” attacks will be focussed on the keystores that stores the keys for such exceptional access.
As the authors states in the conclusions the problem is still open and there are several questions to be discussed. “If law enforcement wishes to prioritize exceptional access, we suggest that they need to provide evidence to document their requirements and then develop genuine, detailed specifications for what they expect exceptional access mechanisms to do.”
References:
Abelson, H., Anderson, R., Bellovin, S. M., Benaloh, J., Blaze, M., Diffie, W., ... & Weitzner, D. J. (2015). Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications.
Nomination/Position | Deadline |
---|---|
Call for Proposals: 2025 Cycle 1 Seasonal Schools & Member Driven Initiatives in Signal Processing | 17 November 2024 |
Call for Nominations: IEEE Technical Field Awards | 15 January 2025 |
Nominate an IEEE Fellow Today! | 7 February 2025 |
Call for Nominations for IEEE SPS Editors-in-Chief | 10 February 2025 |
Home | Sitemap | Contact | Accessibility | Nondiscrimination Policy | IEEE Ethics Reporting | IEEE Privacy Policy | Terms | Feedback
© Copyright 2024 IEEE - All rights reserved. Use of this website signifies your agreement to the IEEE Terms and Conditions.
A public charity, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity.