Title: Kevin Murray
1 - Presented by
- Kevin Murray
- Lorelei Lam
2What is encryption?
- Plaintext is the original document to be
transmitted or stored on a computer system - Ciphertext is the encrypted document
- Encryption is the transfer of plaintext into
ciphertext (Decryption is the reverse of
encryption)
3Cryptography
- Cryptography is the practice and study of
encryption and decryption, encoding data so that
it can only be decoded by specific individuals. A
system for encrypting and decrypting data is a
cryptosystem.
4How Does Encryption Work?
Plaintext (Original Document)
Combine with keys (numbers or strings of
characters known only to the sender and/or
recipient)
Ciphertext (Encoded Document)
Use key to convert ciphertext to plaintext
5Types of Keys
- Single-key systems use the same key for both
encryption and decryption - Escrowed-key system is one in which a key is held
by a third party in order to decrypt a message if
needed
- Public-key systems use different but compatible
keys for encrypting and decrypting a message
6Advantages of Encryption
7Advantages of Encryption
PRIVACY
8Advantages of Encryption
PRIVACY
SECURITY
9Privacy
- E-mails sometimes we want our mail to be
private! - People have a right to a degree of privacy in
their lives. - The right to privacy has been interpreted by the
Supreme Court from the First, Fourth, and Fifth
Amendments of the Constitution. - Do you want the postman reading your letters??
10Security
- Online Purchasing (Ebay, Amazon, Victorias
Secret) - Some personal information you want kept private
(i.e. credit card numbers, SSNs) - Classified Files
- Reduce chances of hacker break-ins
11Disadvantages of Encryption
12Disadvantages of Encryption
Co-conspirators Osama bin Laden andBert?!
TERRORISM!
13Disadvantages of Encryption
Co-conspirators Osama bin Laden andBert?!
TERRORISM!
HATE!
14Terrorism
- Private communication between terrorists (between
Osama bin Laden and Bert) - More difficult for National Security Agency
- Harder to crack down on terrorists
15Hate
- Hate groups could use encryption for their own
ends - Encryption will make cracking down on hate groups
more difficult
16Illegal Activities?
- In addition to hiding terrorism and hate groups,
encryption could also encourage illegal
activities - Insider trading, shady business practices
17Data Encryption Standard (DES)
- adopted in 1977
- current government standard
- developed by IBM and the NSA
- uses 56-bit single-key to encrypt all sensitive
data being stored or transmitted over computers - original algorithm more sophisticated but key was
shortened for national security
18Data Encryption Standard (DES)
- export of DES controlled by U.S. law, but can be
found worldwide - because of availability, only allowed on
sensitive governmental data - classified information cannot be encrypted with
DES
19Since it is becoming increasingly easier to break
DESs encryption scheme, the U.S. government has
been looking for a new encryption scheme to
replace DES.
20Case StudyClipper Chips
21What is a Clipper Chip?
- The Clipper Chip is a device intended to protect
private communications but it allows government
agents to obtain the keys upon legal
authorization - Keys held by two government agents, would allow
government to access private communications - The underlying algorithm, Skipjack, developed by
NSA
22Types of Chips
- Clipper used to encrypt voice transmissions
- Capstone used to encrypt data
23The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
24The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
Should the government have unlimited access to
encrypted data transmissions?
25The Dilemma
If the government is given authorization, they
can obtain encrypted data transmissions.
Should the government have unlimited access to
encrypted data transmissions?
Should we even use Clipper Chips?
26Professional Issues
- Does government have right to information
transmitted by e-commerce?
27Legal/Policy Issues
- National security (in light of WTC attacks)
- Warrants (does the government need a warrant to
decrypt encrypted private transmissions?) - Bill of Rights (first, fourth, and fifth
amendments)
28Amendment Rights
- First Amendment forced disclosure of documents
providing government with key to encryption
forces individual to disclose document they do
not want to share - Fourth Amendment any search of citizens must be
conducted with a warrant by providing key,
government free to monitor data sent by
individuals
29Amendment Rights
- Fifth Amendment no person compelled to be
witness against himself with keys, government
can access transmissions with incriminating
content against the individual sending it (Bert
sends e-mail to Osama I killed Ernie! Sincerely
Yours, Bert.)
30Ethical Issues
- Privacy how much personal privacy should be
sacrificed for national security? - Government Corruption what if the government
decides to snoop?
31Stakeholders
- The Individual
- Government (especially NSA)
- Companies (especially e-commerce)
- Terrorists
32Possible Actions
- Not use Clipper Chips
- Use Clipper Chips
- Use Clipper Chips, but apply restrictions
33Not Using Clipper Chips
- Cons
- Easier for anyone to decrypt secure data
- Less privacy
- Pros
- Easier for NSA to monitor terrorists
- Since government does not hold keys, less chance
of government corruption
34Not Using Clipper Chips
- Individual Rights
- Amendment rights not violated
- Government has less control over individual
privacy
35Not Using Clipper Chips
- Common Good
- Peace of mind NSA can monitor terrorists more
easily - Government not intruding in personal life
36Using Clipper Chips
- Cons
- Government will hold key, could lead to
unauthorized or shady monitoring of individuals
- Pros
- More privacy
- Less chance of hacker break-in
37Using Clipper Chips
- Individual Rights
- More secure against hackers
38Using Clipper Chips
- Common Good
- Sacrifice individual privacy for security of the
greater community
39Clipper Chips with Restrictions
- Possible Restrictions
- Warrant or other authorization before decrypting
secure data - Check and balance system for chips
- Sharing decryption keys is optional
40Clipper Chips with Restrictions
- Cons
- Still possibility of governmental corruption
- Pros
- Reduced chance of government corruption
- Still can monitor terrorists
41Clipper Chips with Restrictions
- Individual Rights
- Individual has more of a say over privacy
(options) - Amendment Rights still protected under
Constitution - Less chance of hacker intrusion
42Clipper Chips with Restrictions
- Common Good
- Greater individual and community privacy
- Satisfaction among the community as a whole ?
43Final Decision
- Clipper Chips with restrictions best choice
- Individual rights still protected
- Some degree of check and balance with the
government - Greater security without sacrificing too much
privacy
44but we cannot stop
45(No Transcript)