Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.

Similar presentations


Presentation on theme: "CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss."— Presentation transcript:

1 CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss ŸFinish communications discussion

2 CS 4001Mary Jean Harrold2 Intercepting Communications (cont’d)

3 CS 4001Mary Jean Harrold3 Outline ŸOverview of the Controversies ŸIntercepting Communications ŸCryptography and Its Uses ŸEncryption Policy: Access to Software, Keys, and Plaintext ŸFundamental Issues

4 CS 4001Mary Jean Harrold4 Q1: Are there other ways to hide a message in plain sight? Cryptography and Its Uses (1) ŸCryptography ŸDefinition: ŸHiding data in plain sight. ŸTerms: ŸPlaintext: Original, readable message or data. ŸCyphertext: Modified, unreadable message or data. ŸEncryption: The act of converting plaintext into cyphertext. ŸDecryption: The act of reverting cyphertext back to readable, plaintext.

5 CS 4001Mary Jean Harrold5 Cryptography and Its Uses (2) ŸPublic Key Cryptography ŸHow it works: ŸUser creates a mathematically-related key pair (public and private keys). ŸPublic keys are shared publicly; private keys are kept secret. ŸPublic keys are used to encrypt message or data. ŸPrivate keys are used to decrypt message or data. ŸBenefits: ŸNo secret keys need be shared or transmitted. ŸVery secure. Q2 : How does key-size affect the ‘strength’ of encryption?

6 CS 4001Mary Jean Harrold6 Q3 : Why are strong encryption tools needed by human- rights activists? Cryptography and Its Uses (3) ŸEncryption ŸUsed by: ŸMilitary personnel. ŸFinancial institutions. ŸHuman-rights activists. ŸGovernment agencies. ŸAnyone wanting to keep messages or data private.

7 CS 4001Mary Jean Harrold7 Cryptography and Its Uses (4) ŸSteganography ŸDefinition: ŸHiding data so that its existence is not known. ŸExamples: ŸDigital watermarks. ŸHiding text in image files. ŸUsed by: ŸMilitary, ŸPublishers, ŸAnyone wishing to hide messages or data. Q4 : How might steganography be incorporated into textbooks? Why?

8 CS 4001Mary Jean Harrold8 Encryption Policy: Access to Software, Keys, and Plaintext ŸSecrecy and Export Controls ŸControl of Secrecy ŸThe NSA designs unbreakable codes for the U.S. government. ŸThe NSA attempts to break codes used by other governments. ŸIn the past, the NSA also controlled the funding for and publishing of cryptographic research. ŸControl of Exportation ŸEarly U.S. policy prevented the exportation of strong encryption. ŸMeanwhile, foreign production and use of strong encryption negatively impacted U.S. competition in the world market. ŸCryptographic researchers, privacy advocates, and others successfully challenged exportation restrictions. Q5 : Why did the U.S. government insist on controlling export of strong crypto?

9 CS 4001Mary Jean Harrold9 Encryption Policy: Access to Software, Keys, and Plaintext (2) ŸDomestic Encryption ŸKey Escrow ŸThird-party entrusted with non-public encryption keys. ŸReal-time Access to Plaintext ŸImmediate decryption of encrypted data. ŸLong-time goal of the FBI. ŸKey Recovery ŸThe ability to recover encrypted files if necessary. ŸUsed by some businesses. Q6 : Should key recovery systems be voluntary or compulsory?

10 CS 4001Mary Jean Harrold10 Fundamental Issues (1) ŸRole of Secrecy ŸU.S. Policy Keeps Secret: ŸCryptographic research. ŸWiretap ease or difficulty. ŸEncryption algorithms. ŸSoftware (e.g. Carnivore). ŸGlobal endeavors (e.g. Echelon). ŸProblems: ŸSecret algorithms cannot be tested by experts. Ÿ‘Backdoors’ might exist. ŸNSA-influenced wiretap and encryption exportation bills

11 CS 4001Mary Jean Harrold11 Q7: Today, do coders or decoders have the upper hand? Fundamental Issues (2) ŸThe Ever-changing Status Quo ŸPast: ŸSimple codes and cyphers. ŸPresent: Ÿ512-bit RSA encryption. ŸAES (Advanced Encryption Standard). ŸFuture: ŸQuantum computing. ŸQuantum cryptography.

12 CS 4001Mary Jean Harrold12 ŸTrust in Government ŸAppropriate or Abusive? ŸWiretapping by FBI and local police. ŸWiretapping by NSA. ŸStrong encryption restrictions. ŸRoving wiretaps. ŸCell-phone tracking (and E-911). ŸDevelopment of a nationwide standard for surveillance. ŸImmediate decryption technology built in to the Internet. Fundamental Issues (3)


Download ppt "CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss."

Similar presentations


Ads by Google