Alice and Bob in love (transcript of discussion)

Joseph Bonneau

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

I'm Joseph Bonneau for those of you who don't know me. I'll talk about this natural entropy concept that I want to use to do encryption, I'll propose a pretty short and simple crypto protocol. I actually did this experimentally since writing the pre-proceedings paper, so I'll talk about how that went, it was kind of interesting. Hopefully I'll have a lot of time left over for discussion, because there's a lot here that is pretty hard. I guess cryptographers are in the habit of saying that human memory is bad. It's actually really good for a lot of things, it's just not good for things that are very high entropy, like crypto keys, but my theory is that people remember things that have actually happened and experiences of other people quite well. So my guiding idea here is that there's all these people in the world who you actually share a lot of entropy with naturally without having to put it explicitly in a form of a crypto key. So these are people like people you've dated, people in your family, the really close friends in your life. So my question is, can we use this huge amount of shared experience that you have with these people to do cryptography.

Original languageEnglish (US)
Title of host publicationSecurity Protocols XVII - 17th International Workshop, Revised Selected Papers
Pages199-212
Number of pages14
Volume7028 LNCS
DOIs
StatePublished - 2013
Event17th International Security Protocols Workshop - Cambridge, United Kingdom
Duration: Apr 1 2009Apr 3 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7028 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other17th International Security Protocols Workshop
CountryUnited Kingdom
CityCambridge
Period4/1/094/3/09

Fingerprint

Thing
Entropy
Cryptography
Guess
Encryption
Data storage equipment
Experience
Human
Concepts
Family
Form
Life

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Bonneau, J. (2013). Alice and Bob in love (transcript of discussion). In Security Protocols XVII - 17th International Workshop, Revised Selected Papers (Vol. 7028 LNCS, pp. 199-212). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7028 LNCS). https://doi.org/10.1007/978-3-642-36213-2-24

Alice and Bob in love (transcript of discussion). / Bonneau, Joseph.

Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Vol. 7028 LNCS 2013. p. 199-212 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7028 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bonneau, J 2013, Alice and Bob in love (transcript of discussion). in Security Protocols XVII - 17th International Workshop, Revised Selected Papers. vol. 7028 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7028 LNCS, pp. 199-212, 17th International Security Protocols Workshop, Cambridge, United Kingdom, 4/1/09. https://doi.org/10.1007/978-3-642-36213-2-24
Bonneau J. Alice and Bob in love (transcript of discussion). In Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Vol. 7028 LNCS. 2013. p. 199-212. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-36213-2-24
Bonneau, Joseph. / Alice and Bob in love (transcript of discussion). Security Protocols XVII - 17th International Workshop, Revised Selected Papers. Vol. 7028 LNCS 2013. pp. 199-212 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{cedbd7ff3e004f7fb16b03fa3cd4928c,
title = "Alice and Bob in love (transcript of discussion)",
abstract = "I'm Joseph Bonneau for those of you who don't know me. I'll talk about this natural entropy concept that I want to use to do encryption, I'll propose a pretty short and simple crypto protocol. I actually did this experimentally since writing the pre-proceedings paper, so I'll talk about how that went, it was kind of interesting. Hopefully I'll have a lot of time left over for discussion, because there's a lot here that is pretty hard. I guess cryptographers are in the habit of saying that human memory is bad. It's actually really good for a lot of things, it's just not good for things that are very high entropy, like crypto keys, but my theory is that people remember things that have actually happened and experiences of other people quite well. So my guiding idea here is that there's all these people in the world who you actually share a lot of entropy with naturally without having to put it explicitly in a form of a crypto key. So these are people like people you've dated, people in your family, the really close friends in your life. So my question is, can we use this huge amount of shared experience that you have with these people to do cryptography.",
author = "Joseph Bonneau",
year = "2013",
doi = "10.1007/978-3-642-36213-2-24",
language = "English (US)",
isbn = "9783642362125",
volume = "7028 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "199--212",
booktitle = "Security Protocols XVII - 17th International Workshop, Revised Selected Papers",

}

TY - GEN

T1 - Alice and Bob in love (transcript of discussion)

AU - Bonneau, Joseph

PY - 2013

Y1 - 2013

N2 - I'm Joseph Bonneau for those of you who don't know me. I'll talk about this natural entropy concept that I want to use to do encryption, I'll propose a pretty short and simple crypto protocol. I actually did this experimentally since writing the pre-proceedings paper, so I'll talk about how that went, it was kind of interesting. Hopefully I'll have a lot of time left over for discussion, because there's a lot here that is pretty hard. I guess cryptographers are in the habit of saying that human memory is bad. It's actually really good for a lot of things, it's just not good for things that are very high entropy, like crypto keys, but my theory is that people remember things that have actually happened and experiences of other people quite well. So my guiding idea here is that there's all these people in the world who you actually share a lot of entropy with naturally without having to put it explicitly in a form of a crypto key. So these are people like people you've dated, people in your family, the really close friends in your life. So my question is, can we use this huge amount of shared experience that you have with these people to do cryptography.

AB - I'm Joseph Bonneau for those of you who don't know me. I'll talk about this natural entropy concept that I want to use to do encryption, I'll propose a pretty short and simple crypto protocol. I actually did this experimentally since writing the pre-proceedings paper, so I'll talk about how that went, it was kind of interesting. Hopefully I'll have a lot of time left over for discussion, because there's a lot here that is pretty hard. I guess cryptographers are in the habit of saying that human memory is bad. It's actually really good for a lot of things, it's just not good for things that are very high entropy, like crypto keys, but my theory is that people remember things that have actually happened and experiences of other people quite well. So my guiding idea here is that there's all these people in the world who you actually share a lot of entropy with naturally without having to put it explicitly in a form of a crypto key. So these are people like people you've dated, people in your family, the really close friends in your life. So my question is, can we use this huge amount of shared experience that you have with these people to do cryptography.

UR - http://www.scopus.com/inward/record.url?scp=84872472026&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872472026&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-36213-2-24

DO - 10.1007/978-3-642-36213-2-24

M3 - Conference contribution

AN - SCOPUS:84872472026

SN - 9783642362125

VL - 7028 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 199

EP - 212

BT - Security Protocols XVII - 17th International Workshop, Revised Selected Papers

ER -