Send Close Add comments: (status displays here)
Got it!  This site "creationpie.com" uses cookies. You consent to this by clicking on "Got it!" or by continuing to use this website.  Note: This appears on each machine/browser from which this site is accessed.
Communication security and authentication
by RS  admin@creationpie.com : 1024 x 640


1. Communication security and authentication
Alice to BobThe classic communication scenario has A sending a message to B. Usually, A is chosen as Alice who is sending a message to B who is chosen as Bob.
The primary security issues that can arise include the following.

2. Eavesdropping
Alice to Bob with Eve listeningThe eavesdropper E is usually chosen as Eve who may be listening (i.e., eavesdropping). If the message is not secure, Eve will understand the message.

3. He that hath ears
Before the "children playing music in the marketplace":
Verse routeMatthew 11:15 He that hath ears to hear, let him hear. [kjv]
Verse routeωταακουετω [gnt]

In the middle of the "kingdom parables":
Verse route13:9 Who hath ears to hear, let him hear. [kjv]
Verse routeωταακουετω [gnt]

Say and hear
Jesus sometimes uses a phrase such as "he that hath an ear ... hear" . That "hear" in Greek assumes with "understanding". Otherwise, some clarification is needed. Jesus appears to use a phrase such as this when there is some deeper meaning that needs to be uncovered - often a play-on-word meaning in Greek. Jesus wants us to "hear" with our "ears". The ancient Greek word "φωνή""voice", as in "phonograph", and comes from "φως""light" and "νους""mind". That is, the "sound" of a "voice" is "light" into the "mind".
Information sign More: He that hath ears

4. Wiretap
A traditional "wiretap" was a connection to a physical communication line, such as a telegraph or phone line, that allowed someone (e.g., authorities) to listen to conversations.
In modern times, the "wiretap" idea was extended to wireless communication.

5. Ancient wireless wiretap
Verse route2 Kings 6:11 Therefore the heart of the king of Syria was sore troubled for this thing; and he called his servants, and said unto them, Will ye not shew me which of us is for the king of Israel? [kjv]
Verse routeψυχησυριαςλογου … [lxx]

In 2 Kings 6:11 we read of one of the first "wiretaps" of the King of Syria. It is a wireless "wiretap". The king thinks that there is a spy in his headquarters.

6. 2 Kings 6:11
   2 Kings 6:11 
 All 
KJV: Therefore the heart of the king of Syria was sore troubled for this thing; and he called his servants, and said unto them, Will ye not shew me which of us is for the king of Israel?
Hebrew: ויסער לב מלך ארם על הדבר הזה ויקרא אל עבדיו ויאמר אליהם הלוא תגידו לי מי משלנו אל מלך ישראל׃
Greek: και εξεκινηθη η ψυχη βασιλεως συριας περι του λογου τουτου και εκαλεσεν τους παιδας αυτου και ειπεν προς αυτους ουκ αναγγελειτε μοι τις προδιδωσιν με βασιλει ισραηλ

7. Wireless spy
Verse route2 Kings 6:12 And one of his servants said, None, my lord, O king: but Elisha, the prophet that is in Israel, telleth the king of Israel the words that thou speakest in thy bedchamber. [kjv]
Verse routeπροφητηςλογουςλαλησηςκοιτωνος … [lxx]

The king is told that there is no spy, but that Elisha has a (wireless) "wiretap" on all his communications - even to his bedroom.

8. 2 Kings 6:12
   2 Kings 6:12 
 All 
KJV: And one of his servants said, None, my lord, O king: but Elisha, the prophet that is in Israel, telleth the king of Israel the words that thou speakest in thy bedchamber.
Hebrew: ויאמר אחד מעבדיו לוא אדני המלך כי אלישע הנביא אשר בישראל יגיד למלך ישראל את הדברים אשר תדבר בחדר משכבך׃
Greek: και ειπεν εις των παιδων αυτου ουχι κυριε μου βασιλευ οτι ελισαιε ο προφητης ο εν ισραηλ αναγγελλει τω βασιλει ισραηλ παντας τους λογους ους εαν λαλησης εν τω ταμιειω του κοιτωνος σου

9. Search and seizure
Verse route2 Kings 6:13 And he said, Go and spy where he is, that I may send and fetch him. And it was told him, saying, Behold, he is in Dothan. [kjv]
Verse routeειπεν δευτεαποστειλας λημψομαι … [lxx]

Search and seizureThe king sends troops to get Elisha. That is, "search and seize". God protects Elisha.
Future topic Details are left as a future topic.


10. 2 Kings 6:13
   2 Kings 6:13 
 All 
KJV: And he said, Go and spy where he is, that I may send and fetch him. And it was told him, saying, Behold, he is in Dothan.
Hebrew: ויאמר לכו וראו איכה הוא ואשלח ואקחהו ויגד לו לאמר הנה בדתן׃
Greek: και ειπεν δευτε ιδετε που ουτος και αποστειλας λημψομαι αυτον και ανηγγειλαν αυτω λεγοντες ιδου εν δωθαιμ

11. Man in the middle attack
Alice to Bob with Eve in the middleA MITM (Man in the Middle) attack has Eve between Alice and Bob such that the message can not only be understood, but changed.

12. Mary Queen of Scots
The historical example a MITM is that of Mary Queen of Scots in the Tower of London.
Her code was broken and a MITM attack used to determine the identity of her co-conspirators.

13. Inside attacks
Since it is hard to break secure communications, hacker attacks on computers will try to establish a MITM attack to steal passwords, credit card numbers, etc. This is usually set up by a phishing attack where the user clicks on a link that creates the MITM situation on the user's computer.

This is a form of "inside" attack since security would not allow an outside attack. However, the user can let the enemy (hacker's code) inside by a click at the computer by the user.
Information sign More: Inside security threats

14. Impersonation or spoofing
Bob with Eve impersonatingAt some point, Eve can impersonate or spoof a message from Alice without Alice doing anything.

This is the primary problem in email phishing attacks where someone pretends to be someone they are not. That is why hackers try to get personal information about people and groups. They can then send messages that appear to be from friends or fellow workers.

15. Facebook
Bob with Eve impersonating

Many times, I have heard someone tell someone else that their Facebook account was "hacked" and that they need to change their password.

What happened is that someone created a fake account using their name and then "spoofed" other accounts to make them think it was another person.

The original account of that person was not "hacked". A fake account "spoofed" that person.

16. Authentic authentication
In the security field, the authentication problem is the following. "How does one know that someone or something (e.g., a computer) is who they claim to be?". That is, are they "authentic". Are they the "real McCoy".

The phrase "real McCoy", from 1908, is a corruption of "Scots the real MacKay" from 1856. There are many other explanations or folk etymologies of this phrase.

Three common ways to authenticate are the following.

17. Authentic
The English word "authentic" is, through French, from the Latin word "authenticus""authentic, genuine" which is from the ancient Greek word "αὐθεντικός""authentic, authoritative".

The root word is the ancient Greek word "αὐθέντης""perpetrator" and was often associated with a murderer (or suicide or self-murder) or an absolute ruler. The meaning of the parts is "auto" for "self" and "prepare" or "succeed".

The modern Greek word "αυθεντικός" (av-thehn-tee-KOS) ≈ "genuine".

18. Strongs - usurp authority
Strongs definitions:

19. Strongs - quietness
Strongs definitions:

20. Usage - quietness
*G2271 *4 ἡσυχία (hay-soo-khee'-ah) : feminine of G2272; (as noun) stillness, i.e. desistance from bustle or language:--quietness, silence.
Word usage per chapter Words: ησυχια=2 ησυχιαν ησυχιας


21. 1 Timothy 2:12
Verse route1 Timothy 2:12 But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence. [kjv]
Verse routeδιδασκεινεπιτρεπωαυθεντεινησυχια [gnt]

The ancient Greek word "ἡσυχία""peace, silence, stillness, rest".
*G2271 *4 ἡσυχία (hay-soo-khee'-ah) : feminine of G2272; (as noun) stillness, i.e. desistance from bustle or language:--quietness, silence.
The ancient Greek word "αὐθεντικός""authentic, authoritative".
*G831 *1 αὐθεντέω (ow-then-teh'-o) : from a compound of G846 and an obsolete hentes (a worker); to act of oneself, i.e. (figuratively) dominate:--usurp authority over.
Word usage per chapter Words: αυθεντειν


22. 1 Timothy 2:12
 All 
KJV: But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence.
Greek: γυναικι δε διδασκειν δε γυναικι ουκ επιτρεπω ουδε αυθεντειν ανδρος αλλ ειναι εν ησυχια

23. Greek
Verse route1 Timothy 2:12 But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence. [kjv]
Verse routeδιδασκεινεπιτρεπωαυθεντεινησυχια [gnt]

Bottle
The ancient Greek word "αὐθεντικός""authentic, authoritative" word appears only here, to Timothy as Bishop of Ephesus, a Greek city which would know the history and meaning of this word.
Discussion question: Is the question of women teaching something Paul intended as a "vitamin" for this particular city and specific circumstances are is this a "vitamin" that is to be applied everywhere?
Information sign More: City: Ephesus
Information sign More: The good and bad of vitamins

24. 1 Timothy 2:12-14
Verse route1 Timothy 2:12 But I suffer not a woman to teach, nor to usurp authority over the man, but to be in silence. [kjv]
Verse routeδιδασκεινεπιτρεπωαυθεντεινησυχια [gnt]
Verse route2:13 For Adam was first formed, then Eve. [kjv]
Verse routeαδαμπρωτος επλασθη … [gnt]
Verse route2:14 And Adam was not deceived, but the woman being deceived was in the transgression. [kjv]
Verse routeηπατηθηεξαπατηθεισαπαραβασει … [gnt]

The next verses provide Paul's reasoning.

Discuss: Do you consider Paul's reasoning valid? Why or why not?

25. 1 Timothy 2:13
 All 
KJV: For Adam was first formed, then Eve.
Greek: αδαμ γαρ πρωτος επλασθη ειτα ευα

26. 1 Timothy 2:14
 All 
KJV: And Adam was not deceived, but the woman being deceived was in the transgression.
Greek: και αδαμ ουκ ηπατηθη η δε γυνη απατηθεισα εξαπατηθεισα εν παραβασει γεγονεν

27. Communication review
 ▶ 
 + 
 - 
 1 Communication 
 2 Eavesdrop 
 3 Man-in-the-middle 
 4 Spoof 

There are various ways that concepts from security authentication can be used to authenticate the Bible as true (in reality and not as a logical system).
Future topic Details are left as a future topic.


28. End of page

by RS  admin@creationpie.com : 1024 x 640