You are on page 1of 14

INSTITUTE FOR PHILOSOPHICAL RESEARCH

BULGARIAN ACADEMY OF SCIENCES


THE PHILOSOPHY
OF SECURITY
IN AN INSECURE WORLD
Proceedings of XXV Varna International
Philosophical School
June, 1 st_3rd 2008
IPhR-BAS
Sofia
2010
ACKNOWLEDGEMENTS
The publication in this volume is a result of the 25th Session of the Var-
na International Philosophical School discussions and would have been
impossible without the support and sponsorship of the North Atlantic
Treaty Organisation and and the co-organisational support of the Yarns
Municipality Council.
Profs. DSc. Vassil Prodanov
Chairman of the Organizing Committee
Varna International Philosophical Schools
Director of Institute for Philosophical Research
Bulgarian Academy of Sciences
THE PHILOSOPHY OF SECURITY IN AN INSECURE WORLD
Proceedings of XXV Varna International Philosophical School
June, 01'
1
- 03' d 2008
' Editor- Vesselin Petrov, 2010
IPhR-BAS, 2010
ISBN 978-954-92549-2-1
TABLE OF CONTENTS
INTRODUCTION ................................................................................. 11
THE CONCEPT OF SECURITY
Vassil Prodanov ........................................................................... ............. 11
Chapter 1.
SOCIAL, POLITICAL, LEGAL
AND ENVIRONMENTAL ASPECT OF SECURITY .... ...... 21
SECURITY IN COLD WAR EUROPE
Antony Kemp- Welch ................................................................................. 23
THE CHANCES OF REASON IN AN EPOCH
OF GLOBAL INFANTILE BEHAVIOUR
Alexander Stoychev .... .............. ............. .......... .. ..... ................... ...... ........ 30
DEMOCRACY IN THE INSECURE WORLD
Stilian Yotov .... .......... : ..... ... ... ..... .. ..... .. .. ..... ........... ... .. .... .. ....... ...... ... ... .. ... 35
PUBLIC POLICY WITHIN FRAMEWORK OF SECURITY
ANALYSIS
Larissa Nikovskaya ...................... .... ..... .. ......................... .... .. .. ....... ... ..... .... . 43
SECURITY, LAW ENFORCEMENT AND HUMAN RIGHTS:
RISKS AND CAVEATS- THE CASE OF ETHNIC PROFILING
INSERTING THE "EFFICIENCY" ELEMENT IN TO THE
"LIBERTY VS. SECURITY" DILEMMA
Andras L. Pap .. .. ...................... ... ..... .. .. ..... ... .. .. ......... ...... ........... ........... ..... 46
THE NEW DIMENSIONS OF HUMAN RIGHTS IN
THE "BIG BROTHER" AGE
Borislav Gradinarov ..... , ........................................................................... 52
THE RHETORIC OF SECURITY: GLOBAL AND LOCAL
ASPECTS
Evgeni Mitev ..... .. ........... .. .............. .. .. .. ...... .... ........ ... , .... ........................... 57
FREEDOM AND/OR SECURITY
Ivelina Ivanova, Todor Hristov ....................... ............ ....................... .. .. .. 63
4
OPEN-SOURCE PRINCIPLES IN THE SOCIAL SCIENCES?
Ina Dimitrova ........................................................................................... 73
UNCERTANTY IS MY BUSINESSS. Precautionary principle
Stanka Hristova ........................................................................................ 78
PHILOSOPHY OF INFORMATION SAFETY
Anatoly Lazarevich ... ............................ .. ....... .............. ........... ......... ......... 84
A DEVELOPMENTAL APPROACH TO TERRORISM
Diana Danova .......... .... ....... ... ..... ........... ............. ...... .. .... ......... ...... ......... . 93
SECURITY AND GLOBAL CLIMATE CHANGES
Kamen Lozev ............................................................................................. 98
THE SELF ORGANIZING SOCIETY:
A SYNERGISTIC PARADIGM
Dimitar Dimitrov .. .......................................... .... .. .................................. 104
PHILOSOPHICAL ASPECTS OF THE DECISION-MAKING
IN THE SECURITY
Ivan Tsanov ............ ............ ........ .................................................. .. .. ....... 113
KNOWLEDGE AS APT MENTAL STATE
Marina Bakalova ................. ..... .. .... .. ..... .................... .. ................. .. .. ...... 117
BRUTE FORCE: ON THE STRATEGIC ORIGINS
OF MEANING AND SPEECH ACTS
Mitchell Green .. .... ... .... ...... ..... .. ..... ... .. ... ... ........... .................. .. ....... ....... .. 125
NAMING AND UNCERTAINTY: THE HISTORICAL-CHAIN
THEORY REVISED
Zs6jia Zvolenszky .......... ...... .... ................................................................ 132
COMRADES AGAINST PEACOCKE
Nenad Miscevic ....................................................................................... 142
Chapter 2.
EPISTEMIC, ONTOLOGICAL AND LOGICAL
ASPECTS OF SECURITY ................................................................ l57
SECURE KNOWLEDGE IN AN INSECURE WORLD?
Anguel S. Stefanov, Nina Atanasova ................... .......... .......... ............. . 159
THE VARIOUS DIMENSIONS OF TRUSTWORTHY
KNOWLEDGE: WHY IS IT IMPORTANT TO MAKE
DIFFERENCE BETWEEN THE STRENGTH AND
THE SECURITY OF EVIDENCE CLAIMS?
Lilia Gurova ....... .... ................. .. ................. .................. ....... ............. .... ... 165
TRUTH WITHOUT CERTAINTY?
Lu DeVos ................................................................................................ 171
ON COGNITIVE INSECURITY
Aneta Karageorgieva, Dimitar Ivanov .................................................. 178
SCIENTIFIC CERTAINTY AND SECURITY
Constantin Yanakiev ...... ................................ .................. .................. .... 185
CULTURES OF INSECURITY AND THE EPISTEMOLOGY
OF (RE)PRODUCTION
Ivaylo Dimitrov ....................................................................................... 190
ANTICIPATION AND DECISION-MAKING
Roberto Poli ............................................................................................. 199
RUDOLF RUMMEL AND JOHN SEARLE: TWO NOTIONS OF
INTENTIONAL ACTS AND THEIR IMPORTANCE
FOR ONTOLOGY OF SECURITY
Tsena Zhelyazkova ................................................................................. 213
ANTICIPATION AND SECURITY: ONTOLOGICAL ASPECTS
Vesselin Petrov ......................................................................................... 222
SECURITY AND RATIONALITY- INTER- SUBJECTIVE
MODES IN THE LOGIC OF CONFLICTS WITH CONNECTION
TO DEONTIC LOGIC AND THEORY OF DIAGNOSIS
Nikolay Obreshkov .......... ............... ......... ....................... ... .... ............. ..... 231
5
6
HOW I LEARNED TO STOP WORRYING AND LOVE
THE BOMB
Rosen Lutskanov ..................................................................................... 237
LOGICAL AND SEMANTIC ASPECTS OF INFORMATION
SECURED SYSTEMS
Doroteya Angelova ................................................................................. 242
MASS MEDIA MANIPULATIONS AS SOCIETY'S
DESTABILIZATION FACTOR
Valeri Lichev ............................................................................................ 251
CONSUMER CONFORMISM AS A MEANS
OF SOCIAL STABILITY
Veronika Ratseeva ........ .......... ........................................................... ... .. 260
SOME ASPECTS OF THE ANTROPOLOGICAL AREA.
THE MEDITERRANEAN
Polya Tarkoleva ....................................................................................... 265
SECURITY AND NON-PRIMARY QUALITIES.
PERCEPTUAL SECURITY
julia Vasseva ........................................................................................... 275
THE PLAIN EMPIRICISM AND SCIENTIFIC KNOWLEDGE -
RISKS AND TROUBLES
Engelsina Tasseva ................................ ....... ............. ....... ............... ......... 281
SCIENCE AND SECURE KNOWLEDGE
Daniela Ivanova ............................... ........ .. .. ... .............. ................... ....... 287
LOGIC, MANIPULATION, SECURITY
Martin Tabakov ............... ...... ...................... .............. ... .......... .... .... ........ 294
THE SECURITY OF QUANTUM CRYPTOGRAPHY
Vasil Penchev .... ............ ... ...... ... .. ................................. .. .. ...... .................. 300
apter 3
ITHICAL, CULTURAL AND RELIGIOUS
1JES OF SECURITY ..................................................................... 305
- ov ARD A VALUE SYSTEM OF THE MORAL INDIVIDUAL:
" HE ESCAPE TO A CERTAINITY
filan TASIC .......................................................................................... 307
: OWARDS A PHENOMENOLOGY OF (IN)SECURITY:
E-It;SSERL, BLANCHOT AND DERRIDA
Peter Costello ........................................................................................... 321
- HE SECURITY OF HUMAN EXISTENCE FACING
THE NEW ANTHROPOTECHNIQUES
7.adimir Stoychev ................................................................................... 335
:::- A.RS IN LITERARY ANTI-UTOPIAS OF THE XX CENTURY:
. llli THEY BECOMING REALITY IN THE XXI?
Pra cia Spasova .......... ............. ..... ....... ...... ....... .. .................. ............. .... .. 341
RELIGIOUS CERTAINTY AND THE QUEST FOR SECURITY:
_ PHILOSOPHICAL/THEOLOGICAL VIEW
Oiristian Enchev .................. ................. ................................. ........ ........ 348
- LA.i\11- A SECURE OR AN INSECURE IMAGE
Or RELIGIOUS "OTHER" IN BULGARIA
3ogdana Todorova ...................... .................... ...................................... 355
INTERRELIGIOUS DIALOGUE AS A PRECONDITION
?OR THE FREEDOM OF BELIEF AND AS A PREREQUISITE
::-oR THE SECURITY IN THE BULGARIAN SOCIETY. THE
EXPERIENCE OF THE BULGARIAN ORTHODOX PRIESTS
1989.
Petar Kanev ...... ............................................... .. ..................................... . 363
ELIGION IN BULGARIA AND NATIONAL SECURITY
-THE CONTEXT OF EUROPEAN INTEGRATION
.-.;umen Mudrov ............................... ...... ......... ......................................... 374
7
RELIGION AND NATIONAL SECURITY
Stoycho Yotov .................................................................................... ...... 380
TIME CONSCIOUSNESS; ITS UNITY AND CONTINUITY
Martin Jankovic ............................ ........... ...................................... ......... 385
FEAR OF THE OTHER (Problems and Challenges
before Human Identity)
Ivanka Stapova ... ................................................................................ .... 394
THE VISION OF DYNAMICS AND THE PRINCIPLE
OF SYNCHRONICITY IN EASTERN CULTURES
Antoaneta Nikolova .................................................................. .............. 399
VIDEOART - FEAR AND VIDEO FEAR
Anna Tzolovska ..................................................... .. ................................ 407
ONCE UPON A THEME
Rositsa Dikova .............................................................................. ..... ..... 415
Chapter4
THE PHILOSOPHY OF SECURITY:
RUSSIA AND THE REST OF WORLD .................. ................. .421
8
CHALLENGES FOR THE RUSSIXS SUSTAINABLE
AND SECURE DEVELOPMENT
Vladimir Yakimets ......... .......................... ... .... .. ............. ......................... 423
THE POLITICAL SECURITY IN MODERN RUSSIA:
THE REGIONAL ASPECT
Yury Golovin ........................ ..................... .............................................. 432
LABOUR CONFLICTOLOGY AS A THEORETICAL BASIS
OF SOCIAL AND ECONOMIC SAFETY OF MANUFACTURE
UNDER GLOBALIZATION OF THE RUSSIAN SOCIETY
Valentin Shalenko ........... ...... .. ... ... ... ................................ ....................... 441
CONFLICTOLOGY AS THE WAY OF CONNECTION THE
PHILOSOPHICAL THEORY OF SOCIAL DIALECTICS WITH
PUBLIC PRACTICE IN RUSSIA AND THE WORLD AS A WHOLE
Evgeny Stepanov ..................................................................................... 452
CONFLICTS BETWEEN EMPLOYERS AND EMPLOYEES:
DYNAMIC, FUNCTIONS, CONSEQUENCES
Boris Maximov .............. ..................................................................... ..... 463
-HE RUSSIAN SCIENCE- IN EMBRACES OF THE GLOBALISM
.-.natoly Samarin ................ ...................................................... ............... 468
9
THE SECURITY
OF QUANTUM CRYPTOGRAPHY
Vasil Penchev
Quantum cryptography (or QKD) offers an automated procedure for
distributing secret keys utilizing generally used communication fibres. The
revolutionary characteristic of Q KD is that it is intrinsically secure: the key
cannot be acquired by an eavesdropper without the sender and addressee's
knowledge. Moreover, QKD permits the key to be changed often.
The philosophical meaning if quantum cryptography consists of
existing an absolute secure communication which guarantees on pri-
vate inviolability from Big Brother's infringement.
Cryptographers frequently depict code scenarios in terms of a trio of
characters called Alice, Bob and Eve. While Alice is endeavouring to send
a message to Bob, Eve is attempting to eavesdrop. To preserve her message
secret, Alice must encrypt it, and for this she employs a code known as a
"one-time pad': The one-time pad method should be logically uncrack-
able. The encryption wants for separating of three stages. ( 1) Alice changes
her message into a sequence of ls and Os. (2) Alice sets up a key- a ran-
dom series of ls and Os that is as large as the dispatch. (3) Alice affixes
each element of the clue to the corresponding component of the message,
to compose an encrypted text also built up of 1s and Os, at that 1 + 1 = 0.
This type of cipher is impracticable to solve because any element of Alice's
key is desultory. Bob possesses a duplicate of the key, and can decode the
string by simply subtracting the key from the encrypted text. After Alice
has manufactured a causal key, encrypted her message, and sent the en-
crypted text, she transmits the key to Bob so that he will be able to decrypt
the message. The key-distribution problem is usually solved by reliable
couriers to deliver the keys in safe hands.
In the early 1980s, Charles Bennett, a fellow from the IBM research,
and Gilles Brassard, a computer scientist at the University of Montreal,
300
proposed that Alice and Bob should use single photons polarised in dif-
ferent directions to represent 1 or 0 to interchange their key (Bennett,
Brassard, Breidbart, Wiesner 1983 ) .. If Eve }ried to intercept the key, she
would have to gauge the photons, which would virtually mean absorbing
them. To elude being identified, Eve would have to retransmit the pho-
ton to Bob. However Eve does not always measure the same polarization
that Alice sent. That in turn means that she cannot be certain that she is
forwarding the proper orientation. Thus Eve's interception will inevitably
affect the transmission of the key, and Alice and Bob should be able to
spot this, discard the key, and attempt again with a new one. The Bennett-
Brassard communications protocol (BB84) requires the use of four polar-
ising filters for Alice and four for Bob, but it was superseded in 1992 by a
simpler system that needs only two filters each:
Alice needs to send a key to Bob, which he can then use to decode
a future enciphered message (Bennett, Brassard, Mermin 1992). For do-
ing that, Alice begins with two polarising filters oriented at 0 degrees and
45, representing 0 and 1 respectively. Bob has two similar polarising filters
oriented at 90 and- 45. For the key, Alice dispatches Bob a string of ran-
domly polarised photons representing Is and Os. Bob then tries to measure
the polarisation of each photon by haphazardly switching between his two
filters. A photon striking a filter oriented in the same direction will always
pass through. Oppositely, a photon striking a filter adjusted perpendicularly
will never pass through. But a photon hitting a filter that is diagonal to its
own orientation is in a quantum uncertainty, with an equal chance both
of passing through and being blockaded. Suppose Bob picks his -45 filter
to measure a photon from Alice, and no photon passes through. He can-
not know whether Alice sent a +45 photon (meaning 1), which is always
barred, or if she sent a 0 photon (meaning 0), which is only sometimes
stopped. If a photon does pass through his filter, he can be sure that Alice
sent a 0 photon. This means that Bob knows that if a photon passes through
his -45 filter, Alice must be sending him a 0. Similarly, if he uses his 90 filter
and the photon passes through, then Alice must have sent a +45 photon.
So when Alice sends polarised photons to Bob, he will be able to ascertain
with assurance the bit value of a portion of them Alice could send a se-
quence of many photons, each one polarised at random, while Bob causally
switched between both of the filters. As a rule, three-quarters of them would
301
be stopped, however Bob would recognize the bit value for the minority
that got through. Bob could then call Alice anyway and recount her exactly
which 25 photons he received. These would form the key for enciphering a
subsequent message. Although Bob tells Alice which photons he correctly
measured, he does not say which filter he used to measure them. So even
if Eve overhears their conversation, she acquires no information about the
composition of the key. Also and crucially, if Eve attempts to mediate at an
earlier stage by intercepting the photons on their way to Bob, then her pres-
ence becomes evident. Imagine that Alice emits a oo photon, representing a
0 bit, and Eve measures it applying a -45 filter. If the photon is blockaded,
Eve does not know if this is because the photon was +45, and so stood no
chance of passing through, or because it was at 0. Eve might take a guess
that it was a +45 photon, and create and forward such a photon to Bob. If
Bob measured it using his 90 filter, the photon might pass through-and
if it did he would incorrectly interpret Alice's photon as representing a 1
bit. Bob's error can be used to expose Eve's interception. To see if Eve has
been listening, Alice and Bob check for misinterpretations. After sharing
a provisional key, they pick some of the bits at haphazard and declare their
values over their whatever open channel to see whether they agree. If there
is any inconsistency, they suppose that Eve has been eavesdropping and they
forsake the key and begin afresh. If there is no discrepancy, they assume that
it is trustworthy to utilize the key for encrypting an information. There is
always the probability that Eve intercepts a photon and guesses exactly when
she forwards it. If such a photon is used as part of the error-checking proce-
dure, then no mistake seems to appear, and Eve's presence is hidden. But by
Bob and Alice's checking more and more bits, her chances to elude revealing
become smaller and smalerl. Once the key has been delivered successfully,
Alice uses it for ciphering her information. She can then send the message
by whatever open channel. Safely encoded, it cannot be decrypted by any-
body but Bob, even if it's there for all to see. The critical technical problem is
the constant polarization of the photons. If this changes during transit, Alice
and Bob's error-checking procedure will locate inconsistency even if Eve has
not overheard, so no true key will produce.
In the original BB84 protocol, the sender (Alice) directs photons to
the recipient (Bob) in one not of two but of four different polarization
states: horizontal, vertical, diagonal ( 45) and anti-diagonal ( -45).
302
A better approach pioneered by Paul Townsend (1994) is to alter the
phase of the photon. In this method, weak laser pulses are injected into an
interferometer by Alice. By applying different voltages to a "phase modu-
lator" in one arm of the interferometer, Alice can encode bits as a phase
difference between the two emergent pulses sent to Bob - for example
with 0 representing "0" and 180 representing "1':
Furthermore, in 1991 Artur Ekert, while a PhD student at the Univer-
sity of Oxford, reported an alternative to the BB84 protocol that utilizes
another phenomenon of quantum mechanics and information: entangle-
ment. Pairs of entangled photons have quantum states that are correlated
more intensely than any coupled classical particles, such that measuring
one photon exert influence on the measurement of the other. If Alice and
Bob each have one of the pair, they can consequently exploit their meas-
urements for interchanging information.
Outcome:
1. The quantum states of individual subatomic particles (most fre-
quently photons) can be exploited to encipher messages, opening up ap-
plications in communication and computing.
2. The most experienced application of quantum mechanics to infor-
mation processing is quantum cryptography, with devices already on the
market.
3. Quantum cryptography, or quantum key distribution (QKD), per-
mits transfering encrypted messages with security. Their secrecy can be
warranted by revealing of any eavesdropper.
4. Secure messages have been sent over distances longer than hun-
dreds kilometers using quantum cryptography with photons transmited
by optical fibres.
5. The next stage (Townsend 1997) would be to set up a "quantum
World-Wide Web" that would allow quantum cryptography to cover cit-
ies, regions, countries and perhaps the planet. '
"The Code Book'' by Simon Singh proposes that quantum cryptog-
raphy could be the end point of the evolution of cryptography with the
ultimate and final triumph of the cipher-makers. A different viewpoint is
also and maybe not less possible: quantum cryptography will complement
and aid conventional cryptography, rather than superseding it completely.
In order to be sure that a practical QKD system is secure and safe, it is all-
303
important to confirm that the postulates taken for granted in the security
proofs actually hold in its technical implementation. QKD really possesses
a primary advantage over classical cryptography due to the fact that, af-
ter a quantum transmission, unlike the standard procedure of encrypting,
there are no remains to be sent then.
In a philosophical plan, quantum cryptography means an absolute
security of communication between individuals keeping their private in-
violability.
Literature
1. Bennett, C., G. Brassard, S. Breidbart, S. Wiesner. (1983). "Quantum
cryptography, or unforgeable subway tokens': in D. Chaum, R.L. Rivest,
R. L., and A.T. Sherman (Eds.). Advances in Cryptology: Proceedings of
Crypto '82. New York: Plenum, 267-275.
(http:/ I dsns. csie. nctu. edu. tw/research! crypto!HTML!PDFI C82/267.
PDF)
2. Bennett, C., G. Brassard, D. Mermin. (1992) "Quantum cryptogra-
phy without Bell's theorem:' Physical Review Letters, 68, 557-559.
3. Ekert, A. (1991). "Quantum cryptography based on Bell's theorem:'
Physical Review Letters, 67,661-663.
4. Townsend, P. (1994). "Secure key distribution system based on
quantum cryptographY:' Electronics Letters 30, 809-811.
5. Townsend, P. (1997). "Quantum cryptography on multiuser optical
fibre networks." Nature 385,47-49.
304

You might also like