Joseph Menn on encryption collusion

Harvard University

September 21, 2017

In the article "Distrustful U.S. allies force spy agency to back down in encryption fight" Mr Menn examines (thankfully) the push back against a questionable process.

The following articles examine the Boren Factorization process and examine the red herring we have been presented that ECC is more secure than RSA with less processing.

http://www.wnlabs.com/pdf/ECC_is_easier_to_break.pdf

http://www.wnlabs.com/news/ECC_collusion_or_blindness.php

The article from Menn is a recent version of the red herring - an iteration. The article examines the attempt to standardize dual elliptical curver algorithms through the ISO and US allies fighting this. "Elliptic-curve cryptography ( ECC ) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields . ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields ) to provide equivalent security." wikipedia The red herring is that for security it is misdirection. Public key cryptography requires private and public keys. Their interaction creates the modulii necessary for the asymmetric framework to function. The factoring of these modulii is a separate problem that doesn't require elliptical curve mathematics while the use of ECC in either flavor is to choose primes that are components (factors) of the modulii.

The following papers were presented to IEEE Smart World Cyber Trust Workshop August 4, 2017 and published by the IEEE Advanced Trusted Computing.

http://www.wnlabs.com/news/IEEE_copyright_WN_papers.php

IEEE paper - Rapid Factorization of Composite Primes An Alternative to the Sieve Method. This is a technique that can be used to factor ECC.

http://www.wnlabs.com/pdf/IEEE-ATC-R-CyberTrust-27.pdf