Kevin Murray - PowerPoint PPT Presentation

1 / 45
About This Presentation
Title:

Kevin Murray

Description:

Plaintext is the original document to be transmitted or stored on a computer system ... against the individual sending it (Bert sends e-mail to Osama: 'I killed Ernie! ... – PowerPoint PPT presentation

Number of Views:42
Avg rating:3.0/5.0
Slides: 46
Provided by: kmur6
Category:
Tags: ernie | kevin | murray

less

Transcript and Presenter's Notes

Title: Kevin Murray


1
  • Presented by
  • Kevin Murray
  • Lorelei Lam

2
What is encryption?
  • Plaintext is the original document to be
    transmitted or stored on a computer system
  • Ciphertext is the encrypted document
  • Encryption is the transfer of plaintext into
    ciphertext (Decryption is the reverse of
    encryption)

3
Cryptography
  • Cryptography is the practice and study of
    encryption and decryption, encoding data so that
    it can only be decoded by specific individuals. A
    system for encrypting and decrypting data is a
    cryptosystem.

4
How Does Encryption Work?
Plaintext (Original Document)
Combine with keys (numbers or strings of
characters known only to the sender and/or
recipient)
Ciphertext (Encoded Document)
Use key to convert ciphertext to plaintext
5
Types of Keys
  • Single-key systems use the same key for both
    encryption and decryption
  • Escrowed-key system is one in which a key is held
    by a third party in order to decrypt a message if
    needed
  • Public-key systems use different but compatible
    keys for encrypting and decrypting a message

6
Advantages of Encryption
7
Advantages of Encryption
PRIVACY
8
Advantages of Encryption
PRIVACY
SECURITY
9
Privacy
  • E-mails sometimes we want our mail to be
    private!
  • People have a right to a degree of privacy in
    their lives.
  • The right to privacy has been interpreted by the
    Supreme Court from the First, Fourth, and Fifth
    Amendments of the Constitution.
  • Do you want the postman reading your letters??

10
Security
  • Online Purchasing (Ebay, Amazon, Victorias
    Secret)
  • Some personal information you want kept private
    (i.e. credit card numbers, SSNs)
  • Classified Files
  • Reduce chances of hacker break-ins

11
Disadvantages of Encryption
12
Disadvantages of Encryption
Co-conspirators Osama bin Laden andBert?!
TERRORISM!
13
Disadvantages of Encryption
Co-conspirators Osama bin Laden andBert?!
TERRORISM!
HATE!
14
Terrorism
  • Private communication between terrorists (between
    Osama bin Laden and Bert)
  • More difficult for National Security Agency
  • Harder to crack down on terrorists

15
Hate
  • Hate groups could use encryption for their own
    ends
  • Encryption will make cracking down on hate groups
    more difficult

16
Illegal Activities?
  • In addition to hiding terrorism and hate groups,
    encryption could also encourage illegal
    activities
  • Insider trading, shady business practices

17
Data Encryption Standard (DES)
  • adopted in 1977
  • current government standard
  • developed by IBM and the NSA
  • uses 56-bit single-key to encrypt all sensitive
    data being stored or transmitted over computers
  • original algorithm more sophisticated but key was
    shortened for national security

18
Data Encryption Standard (DES)
  • export of DES controlled by U.S. law, but can be
    found worldwide
  • because of availability, only allowed on
    sensitive governmental data
  • classified information cannot be encrypted with
    DES

19
Since it is becoming increasingly easier to break
DESs encryption scheme, the U.S. government has
been looking for a new encryption scheme to
replace DES.
20
Case StudyClipper Chips
21
What is a Clipper Chip?
  • The Clipper Chip is a device intended to protect
    private communications but it allows government
    agents to obtain the keys upon legal
    authorization
  • Keys held by two government agents, would allow
    government to access private communications
  • The underlying algorithm, Skipjack, developed by
    NSA

22
Types of Chips
  • Clipper used to encrypt voice transmissions
  • Capstone used to encrypt data

23
The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
24
The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
Should the government have unlimited access to
encrypted data transmissions?
25
The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
Should the government have unlimited access to
encrypted data transmissions?
Should we even use Clipper Chips?
26
Professional Issues
  • Does government have right to information
    transmitted by e-commerce?

27
Legal/Policy Issues
  • National security (in light of WTC attacks)
  • Warrants (does the government need a warrant to
    decrypt encrypted private transmissions?)
  • Bill of Rights (first, fourth, and fifth
    amendments)

28
Amendment Rights
  • First Amendment forced disclosure of documents
    providing government with key to encryption
    forces individual to disclose document they do
    not want to share
  • Fourth Amendment any search of citizens must be
    conducted with a warrant by providing key,
    government free to monitor data sent by
    individuals

29
Amendment Rights
  • Fifth Amendment no person compelled to be
    witness against himself with keys, government
    can access transmissions with incriminating
    content against the individual sending it (Bert
    sends e-mail to Osama I killed Ernie! Sincerely
    Yours, Bert.)

30
Ethical Issues
  • Privacy how much personal privacy should be
    sacrificed for national security?
  • Government Corruption what if the government
    decides to snoop?

31
Stakeholders
  • The Individual
  • Government (especially NSA)
  • Companies (especially e-commerce)
  • Terrorists

32
Possible Actions
  • Not use Clipper Chips
  • Use Clipper Chips
  • Use Clipper Chips, but apply restrictions

33
Not Using Clipper Chips
  • Cons
  • Easier for anyone to decrypt secure data
  • Less privacy
  • Pros
  • Easier for NSA to monitor terrorists
  • Since government does not hold keys, less chance
    of government corruption

34
Not Using Clipper Chips
  • Individual Rights
  • Amendment rights not violated
  • Government has less control over individual
    privacy

35
Not Using Clipper Chips
  • Common Good
  • Peace of mind NSA can monitor terrorists more
    easily
  • Government not intruding in personal life

36
Using Clipper Chips
  • Cons
  • Government will hold key, could lead to
    unauthorized or shady monitoring of individuals
  • Pros
  • More privacy
  • Less chance of hacker break-in

37
Using Clipper Chips
  • Individual Rights
  • More secure against hackers

38
Using Clipper Chips
  • Common Good
  • Sacrifice individual privacy for security of the
    greater community

39
Clipper Chips with Restrictions
  • Possible Restrictions
  • Warrant or other authorization before decrypting
    secure data
  • Check and balance system for chips
  • Sharing decryption keys is optional

40
Clipper Chips with Restrictions
  • Cons
  • Still possibility of governmental corruption
  • Pros
  • Reduced chance of government corruption
  • Still can monitor terrorists

41
Clipper Chips with Restrictions
  • Individual Rights
  • Individual has more of a say over privacy
    (options)
  • Amendment Rights still protected under
    Constitution
  • Less chance of hacker intrusion

42
Clipper Chips with Restrictions
  • Common Good
  • Greater individual and community privacy
  • Satisfaction among the community as a whole ?

43
Final Decision
  • Clipper Chips with restrictions best choice
  • Individual rights still protected
  • Some degree of check and balance with the
    government
  • Greater security without sacrificing too much
    privacy

44
but we cannot stop
  • .the evil of Bert!!

45
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com