The near futility of encryption key management

Contrary to popular belief, encryption [1] per se isn't all that difficult. The algorithms are well known and hardened, and typically, the actual encryption APIs (the bits of the program that do the actual munging of the bits) are pretty easy to use.

It's the encryption key management that's near impossible to handle correctly. Key [2] authorities [3] are [4] a [5] joke [6]. And even if the authorities in charge of encryption keys weren't a joke, it's still hard to exchange keys with random people [7] and know your communications aren't being monitored, never mind obtaining your encryption keys via literal eavesdropping [8] or through power consumption of your laptop [9] (previous two links via tedu [10]).

[1] https://en.wikipedia.org/wiki/Encryption

[2] http://www.csoonline.com/article/2857659/disaster-recovery/destover-variant-signed-with-stolen-sony-certificate-was-part-of-a-joke.html

[3] http://jurinnov.com/the-threat-of-rogue-certificate-authorities/

[4] http://darkmatters.norsecorp.com/2014/12/10/destover-malware-signed-by-sony-digital-certificates-just-a-joke/

[5] http://googleonlinesecurity.blogspot.com/2015/09/improved-digital-certificate-security.html?m=1

[6] http://www.kimmoa.se/The_CA_system_is_a_joke/

[7] http://www.veracode.com/security/man-middle-attack

[8] http://www.cs.tau.ac.il/~tromer/acoustic/

[9] http://www.tau.ac.il/~tromer/handsoff/

[10] http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things

Gemini Mention this post

Contact the author