Before Recitation

Read "Keys Under Doormats: Mandating Insecurity by Requiring Government Access to all Data and Communications" by Abelson et al. This paper is different from many of the papers that we've read in 6.1800 in that it's largegly about policy, not specific technical content.

In parts of the paper, you'll see references to public-key cryptography. In Lecture 23, you saw public-key cryptography used for signatures, where Alice signs a message with her secret key, which Bob can then verify with Alice's public key. In this paper, most of the references are about using public-key cryptography for encryption, not signatures.

If we're using public keys for encryption, we use different public/secret key pairs than we use for signing, and it works as follows: if Alice wants to send a message to Bob, she encrypts the message with Bob's public key, and Bob will be able to decrypt with his secret key. Notice, then, that anyone can encrypt a message to Bob, because everyone knows his public key. But only Bob can reverse the operation (by decrypting). This is the same way you saw public-key cryptography used in Lecture 24, as part of Tor.

Question for Recitation: Before you come to this recitation, you'll turn in a brief answer to the following questions (really—we don't need more than a sentence or so for each question). Your TA will be in touch about exactly how to turn that in.

Your answers to these questions should be in your own words, not direct quotations from the paper.

As always, there are multiple correct answers for each of these questions.

During Recitation

We expect you to be engaged and participate in recitation, and there are many ways to do that! Check out our participation FAQ for more information.

After Recitation

Outline for this recitation.