Presentation is loading. Please wait.

Presentation is loading. Please wait.

5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers 11-14 due date Moved to Wednesday.

Similar presentations


Presentation on theme: "5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers 11-14 due date Moved to Wednesday."— Presentation transcript:

1 5 December Introduction to Privacy

2 Term Project Changes Feedback on outlines is on its way Change: not being graded Papers 11-14 due date Moved to Wednesday after break First Meetings (not dress rehearsals) Must meet before presentation Papers first: either before first draft or between drafts

3 Other Assignments Privacy Assignment Will be posted later today Learn all you can about me from the Internet Fact sheet Essay Gattaca On your own or Monday after break Assignment will be posted before end of week Second Life Technical issues: stay tuned

4 Security What is encryption?

5 Encryption All encryption algorithms from BCE till 1976 were secret key algorithms Also called classical cryptography or symmetric key algorithms Julius Caesar used a substitution cipher Widespread use in World War II (enigma) Public key algorithms were introduced in 1976 by Whitfield Diffie and Martin Hellman

6 Caesar Cipher Substitute the letter 3 ahead for each one Example: Et tu, Brute Hw wx, Euxwh Quite sufficient for its time High illiteracy New idea

7 Enigma Machine Simple Caesar cipher through each rotor But rotors shifted at different rates Roller 1 rotated one position after every encryption Roller 2 rotated every 26 times… http://www.trincoll.edu/depts/cpsc/cryptography/enigma.html Used by Germany in WW II Allies broke the code Major benefit to the war effort

8 Security Level of Encrypted Data Unconditionally Secure Unlimited resources + unlimited time Still the original text CANNOT be recovered from the encrypted text Computationally Secure Cost of breaking encryption exceeds value of hidden information Time taken to break the encryption exceeds useful lifetime of the information

9 Advanced Encryption Standard (AES) Government adopted in 2001 A block cipher: encrypts blocks of 128 bits using at least a 128 bit key outputs 64 bits of ciphertext A product cipher performs both substitution and transposition (permutation) on the bits Computationally secure: no known successful attacks

10 Summary Two main types of cryptosystems: classical and public key Classical cryptosystems encipher and decipher using the same key Public key cryptosystems encipher and decipher using different keys

11 Authentication Assurance of the identity of the party that you’re talking to Methods Digital Signature Kerberos

12 Privacy

13 Privacy Discussion Introductory lecture Privacy Assignment Gattaca (Movie and Assignment) Team Topics Other topics

14 What is privacy? The right to have information that you don’t expect to be available to others remain that way On many sites, you give up your right to privacy

15 Some Views on Privacy “All this secrecy is making life harder, more expensive, dangerous …” Peter Cochran, former head of BT (British Telecom) Research “You have zero privacy anyway.” Scott McNealy, CEO Sun Microsystems “By 2010, privacy will become a meaningless concept in western society” Gartner report, 2000

16 Historical Basis of Privacy Justice of Peace Act (England 1361) Provides for arrest of Peeping Toms and eavesdroppers Universal Declaration of Human Rights (1948) Universal Declaration of Human Rights European Convention on Human Rights

17 Legal Realities of Privacy Self-regulation approach in US, Japan Comprehensive laws in Europe, Canada, Australia European Union Limits data collection Requires comprehensive disclosures Prohibits data export to unsafe countries Or any country for some types of data

18 Aspects of Privacy Anonymity Security Transparency and Control: knowing what is being collected

19 Impediments to Privacy Surveillance Data collection and sharing Cookies Web site last year was discovered capturing cookies that it retained for 5 years Sniffing, Snarfing, Snorting All are forms of capturing packets as they pass through the network Differ by how much information is captured and what is done with it

20 Privacy in the Digital Age What does informational privacy mean? Why do I care?

21 Two areas Non-governmental Governmental

22 Non-Governmental Pizza Parlor knows all Pizza Parlor

23 Class Exercise 1.Who are the “fact collectors”? (make a list—be specific) 2.What KINDS of ‘facts’ are stored about you/us? (make a list—be specific)


Download ppt "5 December Introduction to Privacy. Term Project Changes Feedback on outlines is on its way Change: not being graded Papers 11-14 due date Moved to Wednesday."

Similar presentations


Ads by Google