The Clipper Chip - PowerPoint PPT Presentation

1 / 23
About This Presentation
Title:

The Clipper Chip

Description:

Public Key encryption is credited to Diffie and Hellman. ... The Clipper Chip is based on an 80bit public key system. ... Invasion of Privacy ... – PowerPoint PPT presentation

Number of Views:213
Avg rating:3.0/5.0
Slides: 24
Provided by: jesseb
Category:

less

Transcript and Presenter's Notes

Title: The Clipper Chip


1
The Clipper Chip
  • The Technology,
  • The Opportunities,
  • The Threats, and
  • The Future

2
Group Members
  • Jesse Baynard
  • Ayana
  • Ana Ramos
  • Paul Davis

3
The Technology
  • What is the clipper chip and how does it work?

4
The Clipper Chip
  • A technology proposed in 1993 by the Clinton
    administration.
  • Intended to be a standardized method of
    encryption.
  • A key escrow technology.

5
What is Key Encryption
  • Public Key encryption is based on public and
    private algorithms (also known as keys).
  • Public Key encryption is credited to Diffie and
    Hellman.
  • It works by encrypting the message with the
    information stored in the destinations public key
    information and then decrypted by the
    destinations private key.

6
What is Key Escrow?
  • Key Escrow is a method of Public-Key encryption
    where all private keys are entrusted to third
    parties.
  • Typically the key is split into several parts and
    distributed to several parties in order to
    prevent abuse.
  • The keys are kept in escrow so that lost keys can
    be recovered or authorized groups can get access
    to those keys.

7
How the Clipper Chip Fits In
  • The Clipper Chip is based on an 80bit public key
    system.
  • The clipper chip uses key escrow (where keys are
    kept in the trust of a 3rd party until conditions
    of its release are met).
  • The clipper chip mandate indicates that
    independent two agencies or parties should split
    each key into two 40bit segments.

8
The Opportunities
  • "This new technology will help companies protect
    proprietary information, protect the privacy of
    personal phone conversations and prevent
    unauthorized release of data transmitted
    electronically."

9
Purpose of Key Escrow EncryptionThe
Comprehensive Policy
  • Privacy of citizens
  • Ability of unauthorized officials to access
    telephone calls and data under proper legal order
  • Build the National Information Infrastructure
  • Allow US companies to manufacture and export
    height technology products

10
Key Escrow EncryptionEffects of Encryption
  • Why do we need wiretaps?
  • Is encryption a threat to lawful surveillance?
  • Do we reserve the right to privacy from the
    government?
  • Will criminals abandon this method and use
    another encryption method?
  • Is there an international problem?

11
Legality How is your information kept secure
with the Clipper Chip?
  • Written request for authorization
  • This request has to be approved by the National
    Institute of Standards and Technology (NIST) and
    the Automated Systems Division
  • Request identifies responsible agencies and
    individuals involved.
  • Certify agency is involved in lawfully authorized
    wiretap.
  • Specify source of authorization and wiretaps
    duration.
  • Specify serial number of the key escrow
    encryption being used.
  • After duration of request is over, ability to
    decrypt using the key will also end

12
The Clipper ChipOverview of Pros
  • Relatively inexpensive
  • Accessibility
  • Mykotronx programs
  • ATT
  • ex. Telephone Security Device (1993)

13
The Threats
  • Why the Clipper Chip is a Bad Idea

14
Government Control
  • The administration wants to control the whole
    process, that is control of all the keys for
    decoding and encoding and this could be a real
    problem
  • The government says it alone can hold the keys
    that can break the Clippers private scrambling
    code.
  • Private agencies or individuals could not
    eavesdrop
  • FBI could routinely request codes that would
    scramble computers and telephones
  • Government believes that security holes are
    needed for criminal investigations

15
Invasion of Privacy
  • The danger that a computerized record of nearly
    all of our activities will be constantly
    accumulating.
  • Possession of information which is private and
    who gets to hear it.
  • The Clipper Chip can give the government instant
    access to every detail of your private life.
  • Unbreakable Code.

16
Invasion of Privacy(continued)
  • Clippers unbreakable code would make it more
    difficult for police or FBI to do illegal
    wiretaps.
  • Has never been tested by outside sources.
  • Computer experts had a chance to examine the
    Clipper Chip and try to break its code.
  • The government has allowed cryptography experts
    to examine and test the chip in private.

17
Security Risks
  • Decoding keys could fall into the wrong hands.
  • What will keep individuals from buying their own
    software and encrypting their message before they
    send it out through clipper.
  • Mandating only one certain type of chip will
    bring foreign governments to create their own
    unbreakable technology, and many wont have qualms
    about giving it to persons willing to meet their
    price.

18
Security Risks(continued)
  • The encryption technology has been used for years
    to protect electronic fund transfer, this same
    technology can be used by terrorists, drug
    dealers, and other criminals.
  • The Skipjack algorithm employed by the Clipper
    Chip will remain classified by unveiling the
    algorithm to the general public will compromise
    the security of the escrow system.
  • Many people fear the government could misuse
    Clipper to harm innocent people and businesses

19
The Future
  • Whats next for key escrow and government
    regulated encryption?

20
Next Generation of Encryption Technologies
  • DES encryption, a 56bit key, has been cracked.
    The first time it was 1000s of computers for 5
    months, second time it took 39 days, and the most
    recent crack was 1 computer in 56 hours.
  • Clipper proponents compared the security of it to
    the DES saying it would be 39 years before the
    technology to crack DES caught up to Clipper.
    They were a little off.

21
Next Generation of Encryption Technologies(contin
ued)
  • Clipper is an 80bit key encryption, already
    determined to be insufficient for good security.
  • Clipper chips were made in a few consumer
    products, but the clipper is no longer being
    made.
  • Software technology is up to 128bit.

22
Government Position on Encryption
  • Government has relaxed the export requirements on
    encryption technology
  • Government has also relaxed the requirement for a
    double key with encryption technologies.
  • Some elements of the congress wish to introduce
    another bill concerning encryption in 1999.
  • Government still wants to be able to snoop in
    your email.

23
Thank you,foryour time!
Write a Comment
User Comments (0)
About PowerShow.com