Presentation is loading. Please wait.

Presentation is loading. Please wait.

NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved.

Similar presentations


Presentation on theme: "NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved."— Presentation transcript:

1 NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved from http://gcn.com/Articles/2013/11/04/NIST-crypto-review.aspx?Page=1. on 6 November 2013.

2 Ethical Issue NIST has begun formal review of its process for developing crypto standards. Caused by “recent news reports about leaked classified documents.” (i.e. Reports of NSA backdoor into cryptography generation) Concern about NIST leaving back doors for NSA Dual EC_DRBG, the Dual Elliptic Curve Deterministic Random Bit Generator

3 Eight Step Process 1.Issue: Should the NSA be removed from the collaborative process of developing crypto standards? 2.Stakeholders and Desired Outcomes: i.NIST - Preservation of public image and respect ii.NSA - Consideration when developing crypto standards iii.Public - Security standards that are representative of actually security, and transparency of standards development process.

4 3.Possible Solutions a.Allow NSA collaboration at current level i.Best Case: NSA continues collaboration but never again violates public interest. ii.Worst Case: NSA maintains policy of secret access to private or encrypted data b.Remove NSA from process completely i.Best Case: NSA bows out and allows process to continue without them. ii.Worst Case: NSA uses vast connections to create new standards that no longer involve any public involvement

5 3.Possible Solutions c.Reduce NSA involvement in process i.Best Case: NSA understandingly allows their involvement to be reduced, while respecting outcomes of the process. ii.Worst Case: NSA publicly allows involvement to reduce, while secretly continuing policy of secret access to private and encrypted data 4.Idealist a.Can Everyone Use This Solution? Yes b.Are People Ends rather than Means? Yes

6 5.Realist a.Is the Solution in accord with what is Natural? Yes b.Is the Solution a balance? No 6.Pragmatist a.Would the Majority agree? yes b.Will it promote the greatest good? yes 7.Existentialist a.Solution most commit to conscience? Yes b.Is the Solution free of influence by other? No

7 8.Which Philosophy was most Influential? a.Pragmatist

8 ACM Code: 1.3 Be honest and trustworthy. “A computer professional has a duty to be honest about […] any circumstances that might lead to conflicts of interest.”


Download ppt "NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved."

Similar presentations


Ads by Google