Schneier on Security
A blog covering security and security technology.
« NSA Acronyms |
| Demands from Law Enforcement for Google Data »
October 25, 2011
Twofish Mentioned in Thriller Novel
I've been told that the Twofish encryption algorithm is mentioned in the book Abuse of Power, in the first paragraph of Chapter 3. Did the terrorists use it? Did our hero break it? I am unlikely to read it; can someone scan the page for me.
EDITED TO ADD (10/25): Google Books has it:
The line was picked up after three rings. The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange.
No one would be listening in.
Posted on October 25, 2011 at 12:58 PM
• 27 Comments
To receive these entries once a month by e-mail, sign up for the Crypto-Gram Newsletter.
In case at some point in the future, those links aren't available, the referenced text is: "The line was picked up after three rings. The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange. No one would be listening in."
Actually the link you gave (at amazon) shows a preview - up to where it is mentioned... click the "look inside" (the book image) and scroll.
I can send a screen capture if you want.
Encrypting a physical object sounds like a neat trick.
I suppose someday when matter transmission is invented, it's going to be a necessity...
@Petréa Mitchell: I've developed a thermite-based physical device hashing function...
"No one would be listening in"
One of these days someone will invent a device that can pick up audible communications.
"I've developed a thermite-based physical device hashing function..."
Sounds like a hot pick product...
But how big was the symmetric key?
"The cell phones were encrypted using a Twofish algorithm and a 4096-bit Diffie-Hellman key exchange. No one would be listening in."
If only a similar process were applied to Michael Savage's radio program...
Unfortunately, if Michael Savage's program were encrypted with ten different twofish keys, I'm afraid the hate will still leak out of the ciphertext.
Regarding encrypting a physical product, I'm sure we'll see that happen soon, in the form of copy protection against 3D printers. You will probably see a DRM path between PC and printer, and of course, scrambling of physical objects to make them harder to scan a 3D model.
I wonder what an encrypted cell phone would look like. Maybe whe should tip off the TSA that anyone observed at an airport holding a banana to his ear may actually be a high-tech terrorist. As most of them should be familiar with the legendary Sesame Street Bert and Ernie banana scenes, I have little doubt they'll buy it immediately.
And is that easily repeatable?
Can you verify my passthing?
No one would be listening in. Or so they thought. Unknown to them, all their communication was being recorded and analyzed using a simple Man-in-the-middle attack, thanks to the stupid fact that they forgot to implement any kind of authentication for the Diffie-Hellman exchange.
Wouldn't that be steganography? An encrypted cell phone...maybe one that opens like a Chinese puzzle-box?
Since we are on the topic of Michael Savage, does anyone know what his take on encryption is? Does he demonize it as a tool to enable drug dealers and terrorists to hide their evil deeds from law enforcement? Or does he understand how it is important for privacy and security?
@W Ricker: Isn't that the one that was thought to be jibberish?
"No one would be listening in."
Ah, but if you put the two fish in your ears, everything is translated perfectly.
"[A] Twofish algorithm"?
Indeed. Surely it should be The Twofish algorithm.
That's the trouble with putting crypto in a thriller. You have to know what you're talking about.
Case in point: Digital Fortress by Dan Brown. One or two teensy-weensy mistakes! Although I did enjoy it when hyper-intelligent Susan Fletcher almost fell out of her chair with surprise.
@Dave: Digital Fortress was a nice turn-your-brain-off read for me the first time through, but I couldn't even get past the first few pages when trying to re-read it. Other websites have pointed out all the factual and even logical errors in it so I won't bother summarizing them but it was just painful.
He also has a fistfight with a terrorist trying to detonate a nuclear device at the very top of one of the Golden Gate Bridge's towers. One of the better unintentional comedies since Beck's "don't tease the panther" snoozefest.
It was a dark and stormy night...
That's a one-way hash function, right :)
Schneier.com is a personal website. Opinions expressed are not necessarily those of Co3 Systems, Inc.