{"id":15538,"date":"2016-07-14T13:00:30","date_gmt":"2016-07-14T20:00:30","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=15538"},"modified":"2020-04-21T14:26:02","modified_gmt":"2020-04-21T21:26:02","slug":"the-cybersecurity-canon-crypto-how-the-code-rebels-beat-the-government-saving-privacy-in-the-digital-age","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/07\/the-cybersecurity-canon-crypto-how-the-code-rebels-beat-the-government-saving-privacy-in-the-digital-age\/","title":{"rendered":"The Cybersecurity Canon: Crypto: How the Code Rebels Beat the Government \u2013 Saving Privacy in the Digital Age"},"content":{"rendered":"<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2016\/07\/the-cybersecurity-canon-crypto-how-the-code-rebels-beat-the-government-saving-privacy-in-the-digital-age\/cybersec-canon-red-500x218-2\/\" rel=\"attachment wp-att-15556\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:43.6%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-15556 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-500x218.png\" alt=\"cybersec-canon-red-500x218\" width=\"500\" height=\"218\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-230x100.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/07\/cybersec-canon-red-500x218-92x40.png 92w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p><em>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/nominate-a-book.html\" target=\"_blank\" rel=\"noopener noreferrer\">Please write a review and nominate your favorite<\/a>.\u00a0<\/em><\/p>\n<p><em>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!<\/em><\/p>\n<p><strong>Book Review by\u00a0<\/strong><a href=\"https:\/\/www.paloaltonetworks.com\/threat-research\/cybercanon\/cyber-security-canon-bios.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Canon Committee Member, Jon Oltsik<\/strong><\/a><strong>:<\/strong> <i><span style=\"font-weight: 400;\">Crypto: How the Code Rebels Beat the Government \u2013 Saving Privacy in the Digital Age <\/span><\/i><span style=\"font-weight: 400;\">(2001)<\/span><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><span style=\"font-weight: 400;\">by\u00a0<\/span><span style=\"font-weight: 400;\">Steven Levy<\/span><\/p>\n<h3>Executive Summary<\/h3>\n<p><span style=\"font-weight: 400;\">The essayist and philosopher George Santayana is often attributed with the quote, \u201cThose who cannot remember the past are condemned to repeat it.\u201d Unfortunately, this is exactly what the United States is doing right now with regard to the ongoing debate between national security (surveillance) and data privacy \u2013 a political hot potato exemplified by the recent, highly visible confrontation between Apple and the Department of Justice.<\/span><\/p>\n<p><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">As Santayana would easily understand, this debate is nothing new. In the 1990s, a sundry group of visionaries, idealists and technologists took these issues head-on by tapping into esoteric mathematical formulas and developing new cryptographic methods for protecting the confidentiality and integrity of digital identities and data. These innovations led to commercial and grass-roots constituencies dedicated to spreading cryptographic technology to the masses as well as a disparate group (led by the U.S. government) focused on containing and controlling cryptography.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Steven Levy\u2019s wonderful book <\/span><i><span style=\"font-weight: 400;\">Crypto: How the Code Rebels Beat the Government \u2013 Saving Privacy in the Digital Age <\/span><\/i><span style=\"font-weight: 400;\">chronicles these opposing forces during the 1990s, an era of rapid growth in personal computing and network connectivity. <\/span><i><span style=\"font-weight: 400;\">Crypto\u2019s <\/span><\/i><span style=\"font-weight: 400;\">strength comes from its comprehensiveness. It covers a number of seminal data privacy events including the development and commercialization of PKI, early progress with digital currency, and even the now infamous U.S. government\u2019s Clipper Chip, an effort to establish monopolistic control of international cryptography. Beyond innovations and events alone, however, Levy also provides rich, detailed stories of an assortment of idiosyncratic characters like Jim Bidzos, Whitfield Diffie, and Phil Zimmermann who drove the development, commercialization and proliferation of cryptography to the mass market. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In retrospect, the 1990s seem like a prehistoric information technology era, but Levy\u2019s thoughtful description of the issues, innovations and deliberations around data privacy make <\/span><i><span style=\"font-weight: 400;\">Crypto<\/span><\/i><span style=\"font-weight: 400;\"> a timeless and worthwhile read for cybersecurity professionals circa 2016. Besides, <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">personifies data privacy by following the trials and tribulations of assorted individuals who gave us the technologies and policies (for better and worse) that we live with today. This elevates <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">from a historical review to an entertaining read. Based upon these qualities, <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">deserves a permanent home in the Cybersecurity Canon. \u00a0\u00a0<\/span><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><\/p>\n<h3>Review<\/h3>\n<p><span style=\"font-weight: 400;\">Early in 2016, a single cell phone initiated a national debate. The phone in question, an Apple iPhone 5c, was used regularly by Syed Rizwan Farook, one of the shooters in the San Bernardino terrorist attack. \u00a0Local law enforcement and the FBI wondered whether this single phone contained any data that might expedite the investigation or provide clues about other pending attacks. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like all other iPhone 5c models, Farook\u2019s phone was encrypted by default, which led to an FBI request that Apple hack into the phone and disable certain security features so it could investigate the data residing on the phone itself. Apple refused, citing its policy to avoid undermining the security features of its products. This led the FBI and U.S. Department of Justice to issue court orders and file applications to force Apple to comply with its requests. Apple steadfastly opposed these legal maneuvers and launched a public and legal fight of its own to protect its customers\u2019 privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This solitary phone highlighted on ongoing issue \u2013 the precarious balance between surveillance (i.e., national security) and data privacy. Republican presidential candidate Donald Trump called for a boycott on all Apple products while former NSA and CIA Director Michael Hayden publicly proclaimed that Apple was operating well within its rights. Several popular polls offered mixed feelings around these contentious issues. A Reuters poll indicated that Americans favored Apple\u2019s position while a Pew Research poll reported opposing results. Meanwhile, a CBS News poll conducted in March 2016 revealed a polarized population as 50 percent of Americans took the FBI\u2019s position while 45 percent sided with Apple. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the San Bernardino incident highlighted the passionate dichotomy between surveillance and personal privacy in an era of pervasive mobile devices and wireless networks, this debate is nothing new. In fact, a small group of technology visionaries not only foresaw these issues starting in the 1970s but also took it upon themselves to challenge the technology and legislative status quo in an attempt to protect binary data privacy moving forward as technology grew more and more prevalent. \u00a0<\/span><i><span style=\"font-weight: 400;\">\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">This band of privacy advocates, technologists and visionaries are highlighted in Steven Levy\u2019s timeless book <\/span><i><span style=\"font-weight: 400;\">Crypto; <\/span><\/i><span style=\"font-weight: 400;\">and, although their stories may be considered ancient history in proverbial \u201cinternet time,\u201d their combined effort is at the heart of the surveillance vs. data privacy debate that still rages today. \u00a0<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Crypto<\/span><\/i><span style=\"font-weight: 400;\"> covers some of the seminal data privacy events and technology developments from the 1970s through the end of the 1990s, so it certainly serves as a good overview for students of cybersecurity history. Nevertheless, what stands out about this book is its intriguing storytelling. Levy does a great job in capturing the times, developing characters, and journaling their data security and privacy journeys and contributions. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, the book starts by following a colorful character named Whitfield Diffie pondering the challenges and possible solutions related to data privacy in an increasingly digital world. Growing up in an era when time-sharing large computers was the rule, Diffie recognized that a central authority, like a system administrator, could abuse his or her power to discover user passwords or peruse confidential files without user permission to do so. He imagined a system of decentralized authority where all users had the power to protect their data. \u00a0He also longed for a way for two strangers to share private information without the need for a prearranged common secret, such as a symmetric encryption key. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Driven by this growing problem, Diffie proceeded on a true quest to seek out any and all information he could on the dark art known as cryptography. Much to his chagrin, however, there was very little publicly available information on cryptography in the mid-to-late 1970s. This situation would have confounded most researchers, but Whit Diffie was a different kind of guy \u2013 the kind who persevered to win over his wife after several negative encounters, or the type of person who would purchase multiple Datsun 510s in order to master the car\u2019s workings and use spare parts from one Datsun to keep another one on the road. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Diffie\u2019s persistent personality is an important component of his story. In pursuit of cryptographic truth, Diffie searched far and wide to read anything or speak to anyone who could educate him on his cryptographic quest. This led him to MIT, IBM and, eventually, chance meetings with like-minded academics, including Marty Hellman (Stanford) and Ralph Merkle (UC Berkeley). All of his pondering finally paid off one night when Diffie had an epiphany once considered as blasphemy in the world of cryptography: he would split an encryption key between a message sender and receiver in order to protect data confidentiality and integrity in an ad-hoc fashion. In this way, Diffie\u2019s doggedness and intellectual curiosity led inevitably to the now famous Diffie-Hellman algorithm and major developments in data security and privacy, including asymmetric encryption and public key infrastructure (PKI). \u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whit Diffie is just one individual in a cast of data privacy characters described within <\/span><i><span style=\"font-weight: 400;\">Crypto<\/span><\/i><span style=\"font-weight: 400;\">. The book also details:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The trio of Ron Rivest, Adi Shamir and Len Adleman (RSA) from MIT. After reading the theories posed in the Diffie-Hellman papers around 1978, Rivest obsessed about developing useable mathematical algorithms to turn PKI from concept to reality. He quickly recruited Shamir and Adleman to help him in this pursuit. Their collaboration led to an ultimate breakthrough where public and private encryption keys were derived from one-way functions and factoring of large prime numbers. \u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Phil Zimmermann, an unlikely pioneer of modern cryptography. \u00a0After learning about PKI, Zimmermann became interested in cryptography, but it was an overly zealous U.S. Senate bill that really drove him to dedicate his time to develop and distribute useable PKI software for the masses. Through a series of events, Zimmermann teamed up with assorted other programmers, mathematicians, and fellow cryptographers and released actual useable code on the nascent internet in 1999. Zimmermann first named his PKI software the \u201cbass-o-matic\u201d after an early Saturday Night Live skit, featuring Dan Aykroyd, but later settled on another name based on the radio show Prairie Home Companion, Pretty Good Privacy (PGP). \u00a0While Zimmermann\u2019s effort made him a hero with the proletarian data privacy crowd, he also faced years of industry litigation, government harassment, and threats of incarceration for his efforts.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Jim Bidzos, a brash and cocky business executive who became the CEO of RSA as well as the company\u2019s chief evangelist. It was Bidzos who made PKI a reality by convincing large customers like Lotus (now part of IBM) and Microsoft to add RSA crypto to their increasingly popular software. To commercialize cryptographic software, Bidzos was forced to fight off government interference every step of the way along with a host of software visionaries, like Ray Ozzie (Lotus) and Nathan Myhrvold (Microsoft). Bidzos\u2019s in-your-face style certainly created a number of enemies (including one NSA agent who threatened him in a meeting), but his tenacity helped make PKI and data privacy a market reality.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">The book ends by detailing the role of another group whose contribution to data privacy and PKI remained under the covers for years, but I promised a fellow Canon committee member that I wouldn\u2019t give any details about this away. You\u2019ll have to read the book yourself to uncover this surprise. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All in all, <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">does a great job of describing the idiosyncrasies of a multitude of characters while remaining true to the subject at hand: data privacy through the era of personal computing and the dawn of the internet. Yes, the individuals covered in this book have grown from impetuous visionaries to senior citizens, but the issues raised in this book remain as timely as ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, Levy does a great job describing the rise and fall of the Clipper Chip in the 1990s. Younger readers may be unfamiliar with Clipper so it is worth reviewing this episode as it presages today\u2019s surveillance\/national security vs. data privacy polarization. Clipper, the brainchild of the U.S. National Security Agency (NSA), was intended to act as a compromise solution. The chip provided strong crypto based on a government-created algorithm called Skipjack but was also designed with a built-in backdoor whereby some undefined government agency would act as an encryption key escrow service so it could use its stash of keys to decrypt messages, if need be.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just like today, the feds tried to sell Clipper with national security concerns and scare tactics. The NSA, FBI and Justice Dept. were even able to use this pitch to gain support from the newly elected Clinton administration in 1992, recruiting techno-savvy Al Gore as a Clipper cheerleader. Once again Levy does a great job of introducing characters, issues and tactics used on both sides of the aisle throughout the Clipper lifecycle from 1992 through its demise in 1996. In this way, <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">serves as a rich history lesson for cybersecurity professionals while also outlining delicate and serious issues that should be useful for today\u2019s policymakers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IT technology evolves quickly, so it would be easy to dismiss <\/span><i><span style=\"font-weight: 400;\">Crypto <\/span><\/i><span style=\"font-weight: 400;\">as ancient history; but, while the technology developments described in this book are over 20 years old, the fundamental debate between surveillance\/national security and data privacy remain as topical today as it was when Whit Diffie was pondering this conundrum while pacing in Harvard Square. Levy\u2019s book is also more than just a historical review. It is also a fanciful story about quirky, passionate and brilliant people willing to challenge established practices. Ultimately, this ragtag group of characters actually changed the world, making it a bit safer and more secure. \u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For these and a host of other reasons, I believe that <\/span><i><span style=\"font-weight: 400;\">Crypto: How the Code Rebels Beat the Government \u2013 Saving Privacy in the Digital Age <\/span><\/i><span style=\"font-weight: 400;\">would be a worthy addition to the Cybersecurity Canon. \u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We modeled the Cybersecurity Canon after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,4521],"tags":[2266,251,2272,2269],"coauthors":[1325],"class_list":["post-15538","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-canon","tag-crypto","tag-cybersecurity-canon","tag-data-privacy","tag-steven-levy"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=15538"}],"version-history":[{"count":10,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15538\/revisions"}],"predecessor-version":[{"id":109908,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/15538\/revisions\/109908"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=15538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=15538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=15538"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=15538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}