后门和加密密钥之战

Donald L. Buresh
{"title":"后门和加密密钥之战","authors":"Donald L. Buresh","doi":"10.14302/ISSN.2766-8681.JCSR-21-3789","DOIUrl":null,"url":null,"abstract":"This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.","PeriodicalId":32638,"journal":{"name":"Journal of Current Research in Scientific Medicine","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Battle for Backdoors and Encryption Keys\",\"authors\":\"Donald L. Buresh\",\"doi\":\"10.14302/ISSN.2766-8681.JCSR-21-3789\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.\",\"PeriodicalId\":32638,\"journal\":{\"name\":\"Journal of Current Research in Scientific Medicine\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Current Research in Scientific Medicine\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14302/ISSN.2766-8681.JCSR-21-3789\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Current Research in Scientific Medicine","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14302/ISSN.2766-8681.JCSR-21-3789","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文认为,在软件中使用后门本质上是适得其反的,并导致侵犯隐私,无论是联邦政府或州政府还是侵入性黑客。这篇文章概述了加密的本质,指出软件后门是一种忽略数据认证的秘密手段。文中强调了恐怖分子、犯罪分子和政府都知道的几个已知后门的例子。在苹果电脑公司与联邦调查局的争论中,提供了支持和反对后门的论据。最后,介绍了John Stuart Mill提出的危害平衡测试,文章得出结论,在平衡对立立场时,天平倾向于数据加密,因为软件后门的存在将使无辜的一方遭受最大的伤害。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Battle for Backdoors and Encryption Keys
This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
13
审稿时长
20 weeks
期刊最新文献
Prevalence of transfusion-transmitted infection and reactive donor response rate in a tertiary care hospital in South India: A retrospective observational study Corynebacterium jeikeium from exudative pharyngitis: A close mimicker of Corynebacterium diphtheriae Impact of evidence-based pedagogical approach on clinical reasoning among undergraduate physical therapy students Capnography troubleshooting: Lessons learned from laparoscopic hernia surgery A review on the crisis of antibiotic resistance and the strategies to combat resistance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1