A Brief History of the Crypto Wars

Slides:



Advertisements
Similar presentations
Conventional Encryption: Algorithms
Advertisements

“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Security & Encryption Thomas Fenske & Joseph Minter.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
CMSC 456 Introduction to Cryptography
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Cryptography and Network Security (CS435) Part Ten (Hash and MAC algorithms)
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
Cryptography and Network Security Chapter 12 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Crypto Bro Rigby. History
Cryptography By, Anthony Lonigro & Valentine Mbah.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Cryptography and Network Security Chapter 12 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 3 Encryption Algorithms & Systems (Part D)
Cracking the DES Encryption
Lecture 5 Page 1 CS 236 Online Key Management Choosing long, random keys doesn’t do you any good if your clerk is selling them for $10 a pop at the back.
Lecture 2 Page 1 CS 236, Spring 2008 More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
CS201 Tech-Talk Two: Cryptography Michael Hsu CSULA.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Public-Key Cryptography ElGamal Public-Key Crypto-System
Chapter 12 – Hash Algorithms
Lightweight Cryptography for IoT
Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017
Cracking Encrypted Systems
Outline Properties of keys Key management Key servers Certificates.
Symmetric Cryptography
IT443 – Network Security Administration Instructor: Bo Sheng
Challenge/Response Authentication
Cryptography Much of computer security is about keeping secrets
Information Security and Management (Abstract) 5
Privacy & Security.
Cryptography & Security
PowerPoint® Slides to Accompany
Encryption. Encryption Basics • Plaintext - the original message ABCDEFG • Ciphertext - the coded message DFDFSDFSD • Cipher - algorithm for.
PowerPoint® Slides to Accompany
Hardware Cryptographic Coprocessor
Outline Desirable characteristics of ciphers Uses of cryptography
12. Encryption on the Internet
Basic Network Encryption
STRATEGIC ENCRYPTION
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Wiretapping and Encryption
Symmetric Key Block Ciphers
Public-Key Cryptography
Cryptography Basics and Symmetric Cryptography
ICS 454 Principles of Cryptography
Cryptography Lecture 19.
PowerPoint® Slides to Accompany
CAS CS 538 Cryptography.
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Security through Encryption
Security in Network Communications
Introduction to Symmetric-key and Public-key Cryptography
ICS 454 Principles of Cryptography
MSIT 543 Cryptography Concepts and Techniques Symmetric Key Encryption
Security.
Public Key Infrastructure
Cryptography a Presentation Prepared by Vytautas Kondratas.
DISSERTATION ON CRYPTOGRAPHY.
Basic Network Encryption
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
DATA ENCRYPTION STANDARD (DES)
Cryptography Lecture 17.
Cryptography and Network Security
Presentation transcript:

A Brief History of the Crypto Wars Steven M. Bellovin, Jason Healey, Matt Waxman Fall 2017

The Underlying Tension Strong cryptography is necessary (though not sufficient) for computer and data security But… Law enforcement and intelligence agencies need access to data, access that can be thwarted by strong encryption This tension has existed since the dawn of modern, open sector cryptography, in 1974 cybersec

The 1970s NIST issued a call for, and ultimately adopted, the Data Encryption Standard (DES) for sensitive-but-unclassified data IBM and/or NSA strengthened the design against cryptanalytic attacks The NSA shortened the DES key size to 56 bits so that they could build a brute-force cracking machine An NSA employee (on his own time) tried to block academic presentations about public key cryptography A push by the NSA for voluntary censorship of academic research cybersec

The 1980s Nothing much happened— except that this is when academic research in crypto really took off DES was one of the catalysts—it was the only public example of a modern, NSA-approved cipher Few academics were interested in the voluntary censorship scheme NIST and the NSA battled for which agency would set standards for civilian cryptography cybersec

The 1990s AT&T announced a simple-to-use voice encryptor, the TSD 3600 Because of the Internet, tremendous pressure for strong, exportable, ubiquitous crypto; plans and standards for encryption became commonplace NSA introduced—and then improved—a secure hash function The improvement taught the open sector a lot about hash functions The government introduced the “Clipper Chip”, which featured a government access key It was a marketplace failure, partly because it required extra hardware The NSA introduced a digital signature algorithm that couldn’t be used for secrecy cybersec

The 2000s The US government (mostly) dropped its export restrictions on crypto under intense industry pressure and foreign competition NIST standardizes a strong, foreign- developed encryption algorithm (AES) Mainstream operating systems start including built-in crypto Many Internet connections are encrypted, for web site logins and credit cards, and for road warriors calling home NSA introduces the “Suite B” standards The FBI starts worrying about encryption and starts using NITs cybersec

The 2010s Apple introduces strong, always- on, invisible encryption for iPhone memory An encrypted device, rather than encrypted communication Google and Apple start encouraging encrypted network traffic This is a reaction to the Snowden revelations The NSA is found to have persuaded NIST to standardize a pseudo-random number generator with a “nobody but us” (NOBUS) trap door (Random numbers are necessary for crypto, e.g., for keys) cybersec