5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers 11-14 due date Moved to Wednesday.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Using Cryptography to Secure Information. Overview Introduction to Cryptography Using Symmetric Encryption Using Hash Functions Using Public Key Encryption.
Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
Intro 1 Introduction Intro 2 Good Guys and Bad Guys  Alice and Bob are the good guys  Trudy is the bad guy  Trudy is our generic “intruder”
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890.
Principles of Information Security, 2nd edition1 Cryptography.
“zone of inaccessibility” Edmund Byrne, 1998 “The right to be alone” Warren and Brandeis, 1890 COMP 381.
 Discrete data: do the lines between mean anything?  When do you use area charts: does the area mean anything or is it for visual effect?  Stacked charts:
CS 555Topic 11 Cryptography CS 555 Topic 1: Overview of the Course & Introduction to Encryption.
Creating Secret Messages. 2 Why do we need to keep things secret? Historically, secret messages were used in wars and battles For example, the Enigma.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
6 December Privacy. Presentations News: Tega Scott Peterson trial: Stephen.
1 December Security and Privacy. Information Systems Security Systems Operating system, files, databases, accounting information, logs,... Issue if someone.
Lecture 23 Symmetric Encryption
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
ENCRYPTION Jo Cromwell Cornelia Bradford. History of Encryption Encryption has been around since antiquity Cryptography began around 2,000 B.C in Egypt.
Encryption Methods By: Michael A. Scott
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
Chapter 2 – Classical Encryption Techniques
Chapter 12 Cryptography (slides edited by Erin Chambers)
Cryptography Week-6.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Fubswrorjb Teri Schmidt Matt Rose K-12 Outreach Center for Education and Research in Information Assurance and Security, Purdue University.
Linux Networking and Security Chapter 8 Making Data Secure.
Network Security (Course Details) By ASIM SHAHZAD Assistant Professor University Of Engineering And Technology Taxila.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Based on Applied Cryptography by Schneier Chapter 1: Foundations Dulal C. Kar.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
1 Chapter 2-1 Conventional Encryption Message Confidentiality.
Network Security Lecture 11 Presented by: Dr. Munam Ali Shah.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
Data Security and Encryption (CSE348) 1. Lecture # 3 2.
17 April Reverse Engineering Ethics Privacy Introduction.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Lecture 23 Symmetric Encryption
Exam 1 Review CS461/ECE422 Fall Exam guidelines A single page of supplementary notes is allowed  8.5x11. Both sides. Write as small as you like.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Introduction to Cryptology Fall Definitions Digital encryption techniques are used to protect data in two ways: to maintain privacy and to prove.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Intro to Cryptography Lesson Introduction
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
1.1 Introduction to Cryptography. 1.2 Basic Cryptography Cryptography is a deep mathematical subject. Cryptographic protocols provide a cornerstone for.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
Mekanisme security & Crytography. Cryptography ≠Security Cryptography may be a component of a secure system Adding cryptography may not make.
CSCI-235 Micro-Computers in Science Privacy & Security.
Lecture 2 (Chapter 2) Classical Encryption Techniques Prepared by Dr. Lamiaa M. Elshenawy 1.
Computer Security (CS4800)
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
 Cryptography Melissa Pollis. What is Cryptography?  the science or study of the techniques of secret writing, especially code and cipher systems 
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Introduction (Pendahuluan)  Information Security  Criptography.
Privacy and Security.
Privacy & Security.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CSCI-235 Micro-Computer Applications
Outline Desirable characteristics of ciphers Uses of cryptography
Lecture 3: Symmetric Key Encryption
Security through Encryption
Unit 2: Cryptography & Cryptographic Algorithm
Basics Of Symmetric Encryption
Symmetric Encryption or conventional / private-key / single-key
Presentation transcript:

5 December Introduction to Privacy

Term Project Changes Feedback on outlines is on its way Change: not being graded Papers due date Moved to Wednesday after break First Meetings (not dress rehearsals) Must meet before presentation Papers first: either before first draft or between drafts

Other Assignments Privacy Assignment Will be posted later today Learn all you can about me from the Internet Fact sheet Essay Gattaca On your own or Monday after break Assignment will be posted before end of week Second Life Technical issues: stay tuned

Security What is encryption?

Encryption All encryption algorithms from BCE till 1976 were secret key algorithms Also called classical cryptography or symmetric key algorithms Julius Caesar used a substitution cipher Widespread use in World War II (enigma) Public key algorithms were introduced in 1976 by Whitfield Diffie and Martin Hellman

Caesar Cipher Substitute the letter 3 ahead for each one Example: Et tu, Brute Hw wx, Euxwh Quite sufficient for its time High illiteracy New idea

Enigma Machine Simple Caesar cipher through each rotor But rotors shifted at different rates Roller 1 rotated one position after every encryption Roller 2 rotated every 26 times… Used by Germany in WW II Allies broke the code Major benefit to the war effort

Security Level of Encrypted Data Unconditionally Secure Unlimited resources + unlimited time Still the original text CANNOT be recovered from the encrypted text Computationally Secure Cost of breaking encryption exceeds value of hidden information Time taken to break the encryption exceeds useful lifetime of the information

Advanced Encryption Standard (AES) Government adopted in 2001 A block cipher: encrypts blocks of 128 bits using at least a 128 bit key outputs 64 bits of ciphertext A product cipher performs both substitution and transposition (permutation) on the bits Computationally secure: no known successful attacks

Summary Two main types of cryptosystems: classical and public key Classical cryptosystems encipher and decipher using the same key Public key cryptosystems encipher and decipher using different keys

Authentication Assurance of the identity of the party that you’re talking to Methods Digital Signature Kerberos

Privacy

Privacy Discussion Introductory lecture Privacy Assignment Gattaca (Movie and Assignment) Team Topics Other topics

What is privacy? The right to have information that you don’t expect to be available to others remain that way On many sites, you give up your right to privacy

Some Views on Privacy “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, former head of BT (British Telecom) Research “You have zero privacy anyway.” Scott McNealy, CEO Sun Microsystems “By 2010, privacy will become a meaningless concept in western society” Gartner report, 2000

Historical Basis of Privacy Justice of Peace Act (England 1361) Provides for arrest of Peeping Toms and eavesdroppers Universal Declaration of Human Rights (1948) Universal Declaration of Human Rights European Convention on Human Rights

Legal Realities of Privacy Self-regulation approach in US, Japan Comprehensive laws in Europe, Canada, Australia European Union Limits data collection Requires comprehensive disclosures Prohibits data export to unsafe countries Or any country for some types of data

Aspects of Privacy Anonymity Security Transparency and Control: knowing what is being collected

Impediments to Privacy Surveillance Data collection and sharing Cookies Web site last year was discovered capturing cookies that it retained for 5 years Sniffing, Snarfing, Snorting All are forms of capturing packets as they pass through the network Differ by how much information is captured and what is done with it

Privacy in the Digital Age What does informational privacy mean? Why do I care?

Two areas Non-governmental Governmental

Non-Governmental Pizza Parlor knows all Pizza Parlor

Class Exercise 1.Who are the “fact collectors”? (make a list—be specific) 2.What KINDS of ‘facts’ are stored about you/us? (make a list—be specific)