Opinion
Computing Applications

The Strength of Encryption

Posted
  1. Article
  2. Author
Eugene H. Spafford
Eugene H. Spafford is an at-large member of ACM Council.

Some of the most perplexing and frustrating experiences that technologists have are with politics and social policy. There are issues that have overwhelming data and scientific analyses to support a position, but value systems based on economics, religion, and/or misinformation are relied upon instead—usually to the consternation of the scientists and engineers. Examples abound, from issues such as the anthropogenic contributions to climate change, the safety of childhood inoculations, and the nature of evolution. Amazing to most of us, there are even those who are certain the Earth is flat! Furthermore, to hold some of these positions requires also believing that scientists are either ignorant or corrupt.

Computing is not immune to these conflicts. One that is currently playing out involves encryption, and what (if anything) should be done to regulate it. Some officials involved in law enforcement and in government are concerned about the potential impact of encryption and wish to restrict how and where it can be used. Many computing professionals have a different set of views, and stress that restrictions to weaken encryption will be much more harmful than helpful.

Conflicts over encryption are not new, with historical examples stretching back many centuries. What has made it a more pressing issue in recent decades is the strength of encryption used with computers, and the immediacy and scope of digital communication. Some 20 years ago, the U.S. had an active controversy over the role of allowing encryption in commercial products. Elements of law enforcement were concerned about the potential for criminals—particularly child pornographers and drug traffickers—to hide evidence of their activities from authorized investigations. Some in the national intelligence community were also worried that export of strong encryption technology might harm national intelligence capabilities.

Efforts by technologists and civil libertarians (including ACM’s U.S. Public Policy Committee) helped shape the discussion in the U.S., as did an extensive study by the National Academies. The outcome was a Presidential decision to not interfere with use of encryption, with some limits on the strength of exported technologies. There was considerable grumbling by some in the law enforcement community, but the decision proved to be sound—in the decades since then we have not been overrun by criminals using encryption (although some exist). Meanwhile, organizations around the globe have had the benefit of strong encryption to protect their information resources.

The evolution of the technology we use regularly has incorporated stronger, built-in encryption. This is especially the case in personal devices such as smartphones and tablets, and in systems supported by some ISPs. The encryption that is present is there to protect the user community from information theft and abuse. However, these same mechanisms may prevent law enforcement from accessing information during their authorized investigations. Globally, we have seen increasing instances of sophisticated crime involving computer-based resources. Terrorism is effective when it induces fear, and unfortunately, recent terrorist events (and political opportunism around them) have generated heightened public concern. In response, law enforcement officials in several countries have felt greater urgency to investigate and forestall any new such activity. To accomplish this, they wish to be able to intercept and monitor communications of suspects, and to be able to capture and analyze their stored data. As such, they are seeking to mandate products incorporating some authorized encryption circumvention technique, colloquially called a "backdoor."

Here is where the conflict with technologists comes about. Those of us who have studied encryption know that inclusions of "backdoors" weaken encryption schemes, and do not know of any practical way of enabling any such circumvention in a manner that is itself sufficiently robust. Having any sort of alternate key mechanism often makes the encryption weaker. It would also highlight the holders of that key as targets to attack, as well as enable insider abuse. Furthermore, once compromised everyone would be endangered—and there is little doubt such a scheme would be compromised or leaked eventually. Unfortunately, some policymakers, perhaps conditioned by TV shows and movies with unrealistic portrayals of computing, do not believe the warnings. A few national governments, such as the Netherlands, have taken the position that encryption should not be weakened. However, others—including the U.S. and the U.K.—appear to be on paths toward legislating weakening of commercially available encryption sold within their borders.

Ironically, the results of the "crypto wars" of 20 years ago means anyone who really wants strong encryption can obtain it and layer it on their regular platforms (superencryption). The Daesh (ISIL) already has crypto applications they provide to some of their operatives that do exactly that. Thus, any restrictions will only weaken the protections for the rest of us against criminal activities, economic espionage, and overly intrusive governments. Once lost, it may take a long time to regain the privacy and security afforded by strong encryption.

What will it take to resolve this conflict? To start, it would help if all sides accepted that their counterparts are neither fundamentally venal nor oblivious to the issues involved. There are genuine concerns all around, but education and exploration of issues is required. ACM, as the preeminent computing association globally, has the potential to have a strong voice in mediating this discussion. As ACM members, we should seek to help clarify the issues with our political representatives in such a way as to define a workable way forward … and that won’t need to be revisited in another two decades.

Back to Top

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More