Download presentation
Presentation is loading. Please wait.
1
Encryption, Cryptography, and Steganography:
An introduction to coded communications 11/24/2018
2
Agenda Introduction to Encryption Cryptography Steganography
Surveillance Summary 11/24/2018
3
Encryption The translation of information into a secret code
Typically utilizes secret keys or passwords Security that is exercised heavily in E-Commerce transactions and authentication 11/24/2018
4
Cryptography The science of information security
Includes analog methods: ex. microdots, merging words with images Scrambling plaintext into ciphertext 11/24/2018
5
Example of microdots... From this . To this... Example magnified 300X
11/24/2018
6
Cryptography encryption ---------> decryption --------->
Plaintext Plaintext ciphertext 11/24/2018
7
Types of Cryptography Hash Functions: no key, “digital fingerprint” of a larger document Secret Key Cryptography (symmetric encryption): one key Public Key Cryptography: two keys - public & private 11/24/2018
8
Use of Cryptography Security for corporate and government information.
Privacy Digital signatures and authentication Currently no restrictions on use in the United States Possible criminal use: impede investigation Rumored to be used in recent terrorist attacks 11/24/2018
9
Steganography Steganography is the art of hiding a secret message inside another message. Digital watermarking and fingerprinting of audio and video. Not intended to replace cryptography, but supplement it. 11/24/2018
10
Steganography: an example...
Computer files contain unused or insignificant areas of data Hard to detect Special software to read 11/24/2018
11
Steganography: Other Examples
11/24/2018
12
FBI Methods of Policing Encryption
Carnivore (DCS1000) “Magic Lantern” 11/24/2018
13
Carnivore File “sniffer” Detects IP Packets
Imperfect against many encryption methods Controversial 11/24/2018
14
“Magic Lantern” Based on Carnivore Trojan Horse program
Installs on a suspect’s machine and obtains encryption keys Reads keystrokes Ethics and implementation debated 11/24/2018
15
Conclusion Encryption currently has many legitimate and necessary uses
Government has become more concerned about its applications Future…? 11/24/2018
16
This presentation is also on the Web at: Turbokinetic.com/files.html
Questions & Answers This presentation is also on the Web at: Turbokinetic.com/files.html 11/24/2018
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.