2,843 research outputs found
Code wars: steganography, signals intelligence, and terrorism
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead
Recommended from our members
'Secure, anonymous, unregulated': 'Cryptonomicon' and the transnational data haven
This essay considers how Neal Stephenson’s 1999 epic novel Cryptonomicon engages with the long-standing and complex relationship between cryptology and national/transnational identity. Cryptonomicon's layered and disjointed structure allows it to explore the impact of cryptography and cryptanalysis in the Second World War (as well as their impact on the consequent rewriting of the international political stage), to reflect on the place of technology in the recent history of cryptology, and to consider how emergent (and supposedly secure) data storage technologies not only open up planetary-wide communication traffic but also unsettle the agreed protocols of national and international law. Stephenson provides a sense of technology's global effects by offering not a straightforward narrative of the demise of the nation-state but by showing how technologies are in a process of constant negotiation with the institutions of the nation-state, drawing upon the economic, material, and intellectual resources of the nation state, while at the same time challenging notions of a bordered and coherent national identity and working to disestablish nations of their regulatory authority. The essay is informed by recent work on cryptology, data havens, globalization, transnationalism, and postcoloniality, as well as Derrida's work on archives and technology
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
With the growing number of heterogeneous resource-constrained devices connected to the Internet, it becomes increasingly challenging to secure the privacy and protection of data. Strong but efficient cryptography solutions must be employed to deal with this problem, along with methods to standardize secure communications between these devices. The PRISEC module of the UbiPri middleware has this goal. In this work, we present the performance of the AES (Advanced Encryption Standard), RC6 (Rivest Cipher 6), Twofish, SPECK128, LEA, and ChaCha20-Poly1305 algorithms in Internet of Things (IoT) devices, measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. We verify that ChaCha20-Poly1305 is a very good option for resource constrained devices, along with the lightweight block ciphers SPECK128 and LEA.info:eu-repo/semantics/publishedVersio
QUIC on the Highway: Evaluating Performance on High-rate Links
QUIC is a new protocol standardized in 2021 designed to improve on the widely
used TCP / TLS stack. The main goal is to speed up web traffic via HTTP, but it
is also used in other areas like tunneling. Based on UDP it offers features
like reliable in-order delivery, flow and congestion control, streambased
multiplexing, and always-on encryption using TLS 1.3. Other than with TCP, QUIC
implements all these features in user space, only requiring kernel interaction
for UDP. While running in user space provides more flexibility, it profits less
from efficiency and optimization within the kernel. Multiple implementations
exist, differing in programming language, architecture, and design choices.
This paper presents an extension to the QUIC Interop Runner, a framework for
testing interoperability of QUIC implementations. Our contribution enables
reproducible QUIC benchmarks on dedicated hardware. We provide baseline results
on 10G links, including multiple implementations, evaluate how OS features like
buffer sizes and NIC offloading impact QUIC performance, and show which data
rates can be achieved with QUIC compared to TCP. Our results show that QUIC
performance varies widely between client and server implementations from 90
Mbit/s to 4900 Mbit/s. We show that the OS generally sets the default buffer
size too small, which should be increased by at least an order of magnitude
based on our findings. Furthermore, QUIC benefits less from NIC offloading and
AES NI hardware acceleration while both features improve the goodput of TCP to
around 8000 Mbit/s. Our framework can be applied to evaluate the effects of
future improvements to the protocol or the OS.Comment: Presented at the 2023 IFIP Networking Conference (IFIP Networking
- …