CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.

Slides:



Advertisements
Similar presentations
“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.
Advertisements

Packet sniffing What is it? Why would an ISP be interested? Internet traffic. Illegal downloads so that they avoid litigation. Slowing down big users for.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
PowerPoint® Slides to Accompany
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
CS426Fall 2010/Lecture 21 Computer Security CS 426 Lecture 2 Cryptography: Terminology & Classic Ciphers.
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Encryption Export Controls in the US Preliminary Research.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
ITIS 1210 Introduction to Web-Based Information Systems Chapter 51 How Government and Workplace Surveillance Work.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
CS 4001Mary Jean Harrold1 Class 8 ŸQuestions about term paper—list of possible topics available later today ŸCommunications discussion ŸCommunications.
Reasons to Support Strong Encryption for a Globally Secure Internet Professor Peter Swire Ohio State University U.S. Technology Training Institute Washington,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
Dr. Susan Al Naqshbandi The word “Cryptography” is derived from Greek words κρυπτός kryptós meaning “hidden” and γράφω gráfo meaning.
``Chaffing and Winnowing’’ & Crypto Policy Comments Ronald L. Rivest Cryptography and Information Security Group MIT Lab for Computer Science April 1998.
Network Security Lecture 10 Presented by: Dr. Munam Ali Shah.
Government, Cryptography and the Right To Privacy Jenny Shearer and Peter Gutmann Presented by Paul Conti 4/3/00.
Cryptography Lynn Ackler Southern Oregon University.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Lecture 2: Introduction to Cryptography
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Chapter 3 Encryption Algorithms & Systems (Part D)
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Impact of Computers on Society 3. Encryption and Interception of Communication.
Encryption CS110: Computer Science and the Internet.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
CRYPTOGRAPHY PRESENTED BY : NILAY JAYSWAL BRANCH : COMPUTER SCIENCE & ENGINEERING ENTRY NO. : 14BCS033 1.
CSI-09 COMMUNICATION TECHNOLOGY SECURITY MECHANISMS IN A NETWORK AUTHOR - V. V. SUBRAHMANYAM.
Lecture 3 Page 1 CS 236 Online Introduction to Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lisa Fujii Cole, E. (2003). Hiding in Plain Sight: Steganography and the Art of Covert Communication. Indianapolis, Indiana: Wiley Publishing, Inc.
Intro to Cryptography ICS 6D Sandy Irani. Cryptography Intro Alice wants to send a message to Bob so that even if Eve can see the transmitted information,
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Encryption u “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according.
COEN 350 Network Security Introduction. Computer Networks OSI Reference Model Application Layer Presentation Layer Session Layer Transport Layer Network.
Symmetric Cryptography
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cryptography & Security
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
COEN 350 Network Security Introduction.
Intercepting Communications
Confidentiality October 14, 2005.
Wiretapping and Encryption
Cryptography Basics and Symmetric Cryptography
PowerPoint® Slides to Accompany
Encryption, Cryptography, and Steganography:
Security through Encryption
Computer Security Social Legal and Ethical issues
Presentation transcript:

CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes

CS 4001Mary Jean Harrold2 Outline ŸOverview of the Controversies ŸIntercepting Communications ŸCryptography and Its Uses ŸEncryption Policy: Access to Software, Keys, and Plaintext ŸFundamental Issues

CS 4001Mary Jean Harrold3 Overview of Controversies ŸCommunications’ privacy is affected by what?

CS 4001Mary Jean Harrold4 Q: Can law enforcement intercept communications without a court order? Intercepting Communications (1) ŸWiretapping ŸWhat is history of restrictions on telephones?

CS 4001Mary Jean Harrold5 Intercepting Communications (2) ŸWiretapping ŸHow have laws changed with new technologies and events? Q : Does the USA Patriot Act supersede ECPAs restrictions?

CS 4001Mary Jean Harrold6 Intercepting Communications (3) ŸDesigning Communications Systems for Interception and Tracking ŸWhat is CALEA? ŸWhat obstacles is it designed to overcome? Ÿ Why did privacy advocates object to CALEA? ŸCALEA allows for the interception of PINs. Do you support this use?

CS 4001Mary Jean Harrold7 Intercepting Communications (4) ŸCarnivore ŸWhat is Carnivore? ŸWhy do proponents say it’s needed? ŸWhy do opponents say it violates rights? ŸDoes Carnivore violate the 4 th Amendment? ŸWhat is the current status of Carnivore?

CS 4001Mary Jean Harrold8 Q : Should the NSA be permitted to intercept all entering and leaving the U.S.? Intercepting Communications (5) ŸNSA and Echelon ŸNSA (National Security Agency): ŸCollects and analyzes communications to find threats to national security. ŸEchelon: ŸWhat is it?

CS 4001Mary Jean Harrold9 Q: Are there other ways to hide a message in plain sight? Cryptography and Its Uses (1) ŸCryptography ŸDefinition: ŸHiding data in plain sight. ŸTerms: ŸPlaintext: Original, readable message or data. ŸCyphertext: Modified, unreadable message or data. ŸEncryption: The act of converting plaintext into cyphertext. ŸDecryption: The act of reverting cyphertext back to readable, plaintext.

CS 4001Mary Jean Harrold10 Cryptography and Its Uses (2) ŸPublic Key Cryptography ŸHow does it work? ŸWhat are the benefits? ŸHow does key-size affect the “strength” of encryption?

CS 4001Mary Jean Harrold11 Q : Why are strong encryption tools needed by human- rights activists? Cryptography and Its Uses (3) ŸEncryption ŸUsed by: ŸMilitary personnel. ŸFinancial institutions. ŸHuman-rights activists. ŸGovernment agencies. ŸAnyone wanting to keep messages or data private.

CS 4001Mary Jean Harrold12 Cryptography and Its Uses (4) ŸSteganography ŸDefinition: ŸHiding data so that its existence is not known. ŸExamples: ŸDigital watermarks. ŸHiding text in image files. ŸUsed by: ŸMilitary, ŸPublishers, ŸAnyone wishing to hide messages or data. Q : How might steganography be incorporated into textbooks? Why?

CS 4001Mary Jean Harrold13 Encryption Policy: Access to Software, Keys, and Plaintext (1) ŸSecrecy and Export Controls ŸControl of Secrecy ŸThe NSA designs unbreakable codes for the U.S. government. ŸThe NSA attempts to break codes used by other governments. ŸIn the past, the NSA also controlled the funding for and publishing of cryptographic research. ŸControl of Exportation ŸEarly U.S. policy prevented the exportation of strong encryption. ŸMeanwhile, foreign production and use of strong encryption negatively impacted U.S. competition in the world market. ŸCryptographic researchers, privacy advocates, and others successfully challenged exportation restrictions. Q : Why did the U.S. government insist on controlling export of strong crypto?

CS 4001Mary Jean Harrold14 Fundamental Issues (1) ŸRole of Secrecy ŸU.S. Policy Keeps Secret: ŸCryptographic research. ŸWiretap ease or difficulty. ŸEncryption algorithms. ŸSoftware (e.g. Carnivore). ŸGlobal endeavors (e.g. Echelon). ŸProblems: ŸSecret algorithms cannot be tested by experts. Ÿ‘Backdoors’ might exist. ŸNSA-influenced wiretap and encryption exportation bills Q : What factors affect the strength of an encryption algorithm?

CS 4001Mary Jean Harrold15 Q: Today, do coders or decoders have the upper hand? Fundamental Issues (2) ŸThe Ever-changing Status Quo ŸPast: ŸSimple codes and cyphers. ŸPresent: Ÿ512-bit RSA encryption. ŸAES (Advanced Encryption Standard). ŸFuture: ŸQuantum computing. ŸQuantum cryptography.

CS 4001Mary Jean Harrold16 Fundamental Issues (3) ŸTrust in Government ŸAppropriate or Abusive? ŸWiretapping by FBI and local police. ŸWiretapping by NSA. ŸStrong encryption restrictions. ŸClipper Chip and Key Escrow. ŸRoving wiretaps. ŸCell-phone tracking (and E-911). ŸKey logger systems. ŸDevelopment of a nationwide standard for surveillance. ŸImmediate decryption technology built in to the Internet.