Bertrand du Castel
 
 
 Timothy M. Jurgensen
                    
MIDORI
PRESS
Cover
Prelude
a b c d e f g
Contents
i ii iii iv
Dieu et mon droit
1 2 3 4 5 6
1 Tat Tvam Asi
7 8 9 10 1 2 3 4 5 6 7 8 9 20 1 2 3 4 5 6 7 8 9 30 1 2 3 4 5 6 7 8
2 Mechanics of Evolution
9 40 1 2 3 4 5 6 7 8 9 50 1 2 3 4 5 6 7 8 9 60 1 2 3 4 5 6 7 8 9 70 1 2
3 Environment
3 4 5 6 7 8 9 80 1 2 3 4 5 6 7 8 9 90 1 2 3 4 5 6 7 8 9 100 1 2
4 Physiology of the Individual
3 4 5 6 7 8 9 110 1 2 3 4 5 6 7 8 9 120 1 2 3 4 5 6 7 8 9 130 1 2 3 4 5 6 7 8 9 140
5 Fabric of Society
1 2 3 4 5 6 7 8 9 150 1 2 3 4 5 6 7 8 9 160 1 2 3 4 5 6 7 8 9 170 1 2 3 4 5 6 7 8 9 180 1 2 3 4 5 6
6 The Shrine of Content
7 8 9 190 1 2 3 4 5 6 7 8 9 200 1 2 3 4 5 6 7 8 9 210 1 2 3 4 5 6
7 In His Own Image
7 8 9 220 1 2 3 4 5 6 7 8 9 230 1 2 3 4 5 6 7 8 9 240 1 2 3 4 5 6 7 8
8 In Search of Enlightenment
9 250 1 2 3 4 5 6 7 8 9 260 1 2 3 4 5 6 7 8 9 270 1 2 3 4 5 6 7 8 9 280 1 2 3 4 5 6 7 8 9 290 1 2
9 Mutation
3 4 5 6 7 8 9 300 1 2 3 4 5 6 7 8 9 310 1 2 3 4 5 6 7 8 9 320 1 2 3 4 5 6 7 8 9 330 1 2 3 4 5 6 7 8 9 340
10 Power of Prayer
1 2 3 4 5 6 7 8 9 350 1 2 3 4 5 6 7 8 9 360 1 2 3 4 5 6 7 8 9 370 1 2 3 4 5 6 7 8 9 380
11 Revelation
1 2 3 4 5 6 7 8 9 390 1 2 3 4 5 6 7 8 9 400 1 2 3 4
Bibliograpy
5 6 7 8 9 410 1 2 3 4 5 6 7 8 9 420
Index
1 2 3 4 5 6 7 8 9 430 1 2 3 4 5 6 7 8 9 440 1 2 3 4 5 6 7 8 9 450 1 2 3 4 5 6

COMPUTER THEOLOGY

Satisfying the phone owner with the trust in her or his ability to keep the phone book active, even in bad circumstances, was a good selling argument for operators. But other functions would also be of interest, this time to operators themselves. One issue that operators have to contend with is the multiplicity of personal electronic devices used by their subscribers. While Subscriber Identity Modules are governed by strict standards, personal electronic devices can be extremely varied. There are simple phones, smart phones, personal assistant with calling capabilities and the list keeps growing. There is no way for operators to inquire all of those multiple devices about their nature and capabilities. However, such information can be very useful. It allows operators not only to know their customers better, but also in some cases to exchange information with the personal electronic devices once they know their type. So, operators went to their central standard organization, the European Telecommunications Standards Institute, and established information standards that any personal electronic device wishing to use cellular communications should communicate to the Subscriber Identity Module. This way, the phone operators could simply ask the SIM about the type of personal electronic device used. Once again, the trust they have in the SIM extends to trusting further information than was originally thought about. Incidentally, this example illustrates again the fact that the trust in a secure core is bounded, since there is no way for the Subscriber Identity Module to know if the information that the personal electronic device communicated is indeed correct. Fortunately, the phone operator is able to put some trust in that information if it is used to communicate with the personal electronic device; either it can answer or not.

These two examples are only two of many applications that can extend the trust put in the Subscriber Identity Module even further. In many countries, cellular phones can be used for gaming, the lottery, betting and many other activities involving fiduciary value. The operator trusts the SIM enough to vouch to the racetrack that the bet will be paid. Causality is a vector of trust extension. And, as trust networks grow, they build their own dynamics so that going outside of the network becomes difficult. For example, we gave the example of the phone book. The trust between the operator and the client provides good service to the owner of the phone. However, it also makes it more painful for the phone owner to switch operators. This is a vivid example of how trust cements networks.

Unfortunately, causality also applies to a flawed assertion of trust. Let us consider a personal electronic device that does not have a trusted core, but might still attempt to provide a digital signature to obtain goods on the Web. To spare the reader flipping back a few pages, we’ll repeat here how a digital signature works. Essentially, if follows the vault model. If only you and I have the key of the vault, any information I put in it, you trust comes from me, since no one else could have deposited it. In the same way, if only my personal electronic device has a key to encrypt my signature, you know that it indeed comes from me. Unfortunately, if my device doesn’t have a secure core, there is no way to strongly trust such an assertion. The way a personal electronic device encodes a digital signature is by loading the key in its memory together with signature information, and by mixing them up mathematically using a cryptographic algorithm. The critical attack point in this process is the period during which the processor of the personal electronic device accesses the key. The reason for this is that there are ways to get to the value of the key in a computer without a trusted core. For example, the memory is typically accessible to more computing entities than the processor. In order to be able to move data between the short-term memory used by the processor and the long-term memory of the device, there is typically a mechanism that allows doing that without needing to ask the processor. This allows increased efficiency of the overall system, but it presents a threat to the signature operation. Another way to access the key information is to trick the processor into revealing data it is currently handling.

244

7 In His Own Image

 

© Midori Press, LLC, 2008. All rights reserved for all countries. (Inquiries)

The contents of ComputerTheology: Intelligent Design of the World Wide Web are presented for the sole purpose of on-line reading to allow the reader to determine whether to purchase the book. Reproduction and other derivative works are expressly forbidden without the written consent of Midori Press. Legal deposit with the US Library of Congress 1-33735636, 2007.

 

ComputerTheology
Intelligent Design of the World Wide Web
Bertrand du Castel and Timothy M. Jurgensen
Midori Press, Austin Texas
1st Edition 2008 (468 pp)
ISBN 0-9801821-1-5

Book available at Midori Press (regular)
Book available at Midori Press (signed)
Book available at Amazon (regular)