5G Technology World

  • 5G Technology and Engineering
  • FAQs
  • Apps
  • Devices
  • IoT
  • RF
  • Radar
  • Wireless Design
  • Learn
    • 5G Videos
    • Ebooks
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Handbooks
    • 2024
    • 2023
    • 2022
    • 2021
  • Resources
    • Design Guide Library
    • EE World Digital Issues
    • Engineering Diversity & Inclusion
    • Engineering Training Days
    • LEAP Awards
  • Advertise
  • Subscribe

New Technology and Cooperation is the Solution to the Encryption Debate

By Joel Bollö, CEO, Micro Systemation | April 20, 2016

There are now more mobile devices in the world than people. In our mobile devices we keep the most intimate details of our lives—our financial information, our medical history, our family memories. Consumers demand, and rightfully expect, that their personal information on their devices is protected.

At the same time there is a growing demand that law enforcement keep our society safe. We want to be sure that law enforcement can secure our airports, our train stations and that our families and friends are safe. Therein lies the fundamental tension within the encryption debate – a debate which continues to intensify.

Since the emergence of Edward Snowden, the pendulum has swung in a direction that has created an important debate about privacy and yet, recent events appear to be causing things to swing back. A recent survey from Morning Consult found that 71 percent of registered U.S. voters now support requiring that companies give the government access to their personal data to support national security interests, and 76 percent think those companies should help the government in investigations related to terrorism.

However, what has been largely lost in a debate cast in black and white terms is the presence of a third way to satisfy the concerns of both security and privacy.

Very few, if any, people disagree with the notion that law enforcement should be able to access a device it has in its possession where they have a legal reason for doing so. The debate is over whether solutions that may be needed to overcome the current encryption will cause more harm than good. This dilemma demands a new solution which would enable access while not eroding the personal security of devices globally. Fortunately, there is a new proposal which has been circulating in Congress which would use Asymmetric encryption and common sense, to do just that.

Asymmetric encryption is a common cryptographic method that uses different keys to encrypt and decrypt data. It consists in this case of two keys and the phone itself. The encryption key is public, while the decryption key is kept private. The only way to reach the content in the phone is to physically have the cell phone and the two encrypted keys in the same place.

To achieve maximum security, the government could distribute the private key in a smart card. The government could then also ask for a smart card is returned within a certain time. The card contains the key in a non-extractable form and performs decryption internally. The smart card can contain additional security measures such as an individual PIN that must be entered for activation. One would need both key pairs to extract data from the mobile device. Hacking into this type of system to obtain a key would be of no use. Since one would need to have physical possession of the phone to enable the system, there is no conceivable way this system could be used for mass surveillance or Internet hacker attacks.

The lesson to take from the FBI’s hack of the San Bernardino iPhone is that the latest exploits can be short lived. As more exploits are found and as manufacturers race to patch them, we now find ourselves in digital forensics “arms race– whereby mountains of financial and intellectual capital will be spent on both sides. The value of the exploit from San Bernardino, and the importance of the new legislation, is that they can serve as leverage to bring the parties to the table to create a strategic, technology-driven solution that empowers the privacy and the security of our citizens.

The problem we face is not a Constitutional one – it is a technical one. As such it can be solved using a technological solution. Law enforcement, the digital forensics industry, Apple and its’ allies should come together to make this common-sense, easy to implement, secure solution a reality for the common good.

 

Joel Bollö is the CEO for Micro Systemation, MSAB, a provider of forensic technology for mobile device examination. MSAB’s software is used by the law enforcement, military and government agencies in more than 100 countries worldwide.


Filed Under: Devices

 

Next Article

← Previous Article
Next Article →

Related Articles Read More >

High-directivity couplers optimized for 225 – 750 MHz applications
Integrated into IoT devices, iSIM poised to make inroads
Triple-radio and multiprotocol MCUs add application processors
5G vectors
How RedCap fits into 5G and IoT

Featured Contributions

  • Overcome Open RAN test and certification challenges
  • Wireless engineers need AI to build networks
  • Why AI chips need PCIe 7.0 IP interconnects
  • circuit board timing How timing and synchronization improve 5G spectrum efficiency
  • Wi-Fi 7 and 5G for FWA need testing
More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Internet of Things
Explore practical strategies for minimizing attack surfaces, managing memory efficiently, and securing firmware. Download now to ensure your IoT implementations remain secure, efficient, and future-ready.

EE LEARNING CENTER

EE Learning Center
“5g
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Engineering Training Days

engineering
“bills
5G Technology World
  • Enews Signup
  • EE World Online
  • DesignFast
  • EDABoard Forums
  • Electro-Tech-Online Forums
  • Microcontroller Tips
  • Analogic Tips
  • Connector Tips
  • Engineer’s Garage
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips
  • About Us
  • Contact Us
  • Advertise

Copyright © 2025 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy

Search 5G Technology World