Encryption, Cryptography, and Steganography: An introduction to coded communications 11/24/2018
Agenda Introduction to Encryption Cryptography Steganography Surveillance Summary 11/24/2018
Encryption The translation of information into a secret code Typically utilizes secret keys or passwords Security that is exercised heavily in E-Commerce transactions and authentication 11/24/2018
Cryptography The science of information security Includes analog methods: ex. microdots, merging words with images Scrambling plaintext into ciphertext 11/24/2018
Example of microdots... From this . To this... Example magnified 300X 11/24/2018
Cryptography encryption ---------> decryption ---------> Plaintext Plaintext ciphertext 11/24/2018
Types of Cryptography Hash Functions: no key, “digital fingerprint” of a larger document Secret Key Cryptography (symmetric encryption): one key Public Key Cryptography: two keys - public & private 11/24/2018
Use of Cryptography Security for corporate and government information. Privacy Digital signatures and authentication Currently no restrictions on use in the United States Possible criminal use: impede investigation Rumored to be used in recent terrorist attacks 11/24/2018
Steganography Steganography is the art of hiding a secret message inside another message. Digital watermarking and fingerprinting of audio and video. Not intended to replace cryptography, but supplement it. 11/24/2018
Steganography: an example... Computer files contain unused or insignificant areas of data Hard to detect Special software to read 11/24/2018
Steganography: Other Examples 11/24/2018
FBI Methods of Policing Encryption Carnivore (DCS1000) “Magic Lantern” 11/24/2018
Carnivore File “sniffer” Detects IP Packets Imperfect against many encryption methods Controversial 11/24/2018
“Magic Lantern” Based on Carnivore Trojan Horse program Installs on a suspect’s machine and obtains encryption keys Reads keystrokes Ethics and implementation debated 11/24/2018
Conclusion Encryption currently has many legitimate and necessary uses Government has become more concerned about its applications Future…? 11/24/2018
This presentation is also on the Web at: Turbokinetic.com/files.html Questions & Answers This presentation is also on the Web at: Turbokinetic.com/files.html 11/24/2018