Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Giving Thanks for Decryption
November 26, 2013 •Walt Paley
The year was 1621. The place was Plymouth, Massachusetts.
I know what you’re thinking, but don’t worry. No, of course I wouldn’t try to draw a connection between Thanksgiving and encryption. That would be silly and far-fetched.
It’s actually about decryption. So there. Now back to the story!
The Pilgrims had suffered a great deal since the establishment of Plymouth Colony, and may have perished or given up, if not for improved relations with the Wampanoag tribe nearby. Their chieftain was Massasoit, whose greatest contribution to history was his decision to embrace an alliance with the colonists and appoint an ambassador.
Tisquantum, or Squanto, as he has been immortalized in our American lore, was the key to the survival of the Pilgrims. He was the spokesman for the Wampanoag, although he was in fact Patuxet, a traditionally allied but distinctly separate tribe. So why was Tisquantum allowed to be the liaison and represent a tribe that was not his own? Because he was the decryption key between the two ciphers. He spoke both languages, as a result of spending the bulk of his young adulthood in England and Spain.
In truth, the Wampanoag tribe’s survival depended as much on the Pilgrims as vice versa. The tribe had been threatened by attacks from the inland Narragansett, and suddenly the colonists and the Wampanoag found their goals aligned. If Tisquantum had not been able to translate and broker an alliance, both groups would surely have perished.
My point is that ciphers, such as an isolated foreign language, provide security just like a modern algorithm. As long as you don’t need to access the information, it is completely opaque and safe. Think about that for a second – if information was encrypted to the point where decryption was no longer possible, it would be infinitely secure and infinitely useless as well. To be valuable, information requires collaboration, and that requires authorized decryption and the ability to share the right keys with the proper people. Without Tisquantum acting as the decryption key, each group would have remained effectively secure – but isolated, divided, and vulnerable to attack and attrition. Encryption is only as successful as your ability to decrypt and leverage the information.
So whether you prepare the turkey roasted, or just hashed and salted, remember that Thanksgiving is really a story about decryption keys, translation, and cooperation. Be thankful for our ability to obfuscate private data, but be even more thankful for our ability to decrypt, share, and collaborate. Without the latter, we wouldn’t be able to use crypto at all. And those decryption skills are particularly useful when you’re trying to decode your in-laws’ backhanded compliments.
Happy Thanksgiving from all of us here at SafeLogic!
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (112)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (20)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- post-quantum cryptography (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- PQC (10)
- Cloud (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- OpenSSL 3.x (4)
- TLS 1.3 (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- POA&M (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)