Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.

Slides:



Advertisements
Similar presentations
Asymmetric Encryption Prof. Ravi Sandhu. 2 © Ravi Sandhu PUBLIC KEY ENCRYPTION Encryption Algorithm E Decryption Algorithm D Plain- text Plain- text Ciphertext.
Advertisements

Topic 7: Using cryptography in mobile computing. Cryptography basics: symmetric, public-key, hash function and digital signature Cryptography, describing.
Confidentiality and Privacy Controls
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Chapter 17 Controls and Security Measures
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Elias M. Awad Third Edition ELECTRONIC COMMERCE From Vision to Fulfillment 13-1© 2007 Prentice-Hall, Inc ELC 200 Day 23.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter 9 1.
Encryption Export Controls in the US Preliminary Research.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Digital Certificates. What is a Digital Certificate? A digital certificate is the equivalent of your business card in the e-commerce world. It says who.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Lecture 19 Page 1 CS 111 Online Security for Operating Systems: Cryptography, Authentication, and Protecting OS Resources CS 111 On-Line MS Program Operating.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Kittiphan Techakittiroj (24/08/58 22:49 น. 24/08/58 22:49 น. 24/08/58 22:49 น.) Digital Certification Kittiphan Techakittiroj
Supporting Technologies III: Security 11/16 Lecture Notes.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Public-key Cryptography Strengths and Weaknesses Matt Blumenthal.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
COEN 351 E-Commerce Security Essentials of Cryptography.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
1 Introduction The State of the Art in Electronic Payment Systems, IEEE Computer, September 1997.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
DIGITAL SIGNATURE.
COEN 351 E-Commerce Security
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Ch 13 Trustworthiness Myungchul Kim
1 Serbia 2003 INTRODUCTION to CRYPTOGRAPHY Fred Piper Codes & Ciphers Ltd 12 Duncan Road, Richmond Surrey, TW9 2JD ENGLAND Royal Holloway, University of.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
EE 122: Lecture 24 (Security) Ion Stoica December 4, 2001.
CIA AAA. C I A Confidentiality I A Confidentiality Integrity A.
Encryption Encryption: Transforms Message so that Interceptor Cannot Read it –Plaintext (original message) Not necessarily text; Can be graphics, etc.
Encryption Name : Maryam Mohammed Alshami ID:H
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Security Issues in Information Technology
Cryptography Why Cryptography Symmetric Encryption
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Cryptography and Security Technologies
PowerPoint® Slides to Accompany
Confidentiality and Privacy Controls
Secure Electronic Transaction (SET) University of Windsor
Security.
Presentation transcript:

Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according to an equation or algorithm into unreadable “ciphertext”” u “Decryption is the translation back to plaintext when the message is received by someone with an appropriate ‘key’” u Four main uses: data integrity, authentication, nonrepudiation, confidentiality

Types of Encryption u Length of encryption indicates strength; but not all encryption is created equally u Public Key versus Private Key (symmetric versus asymmetric)

Comments of Janet Reno u “Encryption can frustrate completely our ability to lawfully search and seize evidence and to conduct electronic surveillance, two of the most effective tools that the law and the people of this country have given law enforcement to do its work.”

Present Regulation u Department of Commerce: not military 1. Mass Marketed needs one time review 2. Data recovery type may be elegible to nonembargoed countries 3. Up to 56 bit may receive 6 month export license if promise to develop key recovery 4. The rest is considered on a case by case basis

Bernstein v. US u Major case of encryption export u As far as publishing efforts are concerned, regulations are unconstitutional because they violate the First Amendment as a violation of prior restraint u Government has appealed, and stay granted of enforcement until that time u Karn case is opposite

Methods of controlling Encryption u Escrowed Encryption Standard (Clipper Chip) u Key Management u Licensing u Third Party Trusted Intermediaries u Certification Authorities

Zeran v. AOL u November, 1997; 4th Circuit u Numerous false postings to AOL resulted in death threats and constant calls to Zeran u AOL remove postings but would not issue retraction

Circuit Court Decision u CDA provision was written to protect speech, take hands off approach to regulation of the Internet and to promote self-regulation u Applied CDA retroactively u AOL not liable u Notice to AOL had no effect