ODU CS 300 - Wiretapping and Encryption

Unformatted text preview:

Wiretapping and EncryptionEarly Forms of WiretappingWiretapping TodayCellular PhonesStandard PhonesLegal MandatesCryptography - Making and breaking of ciphersEncryption Includes:ExamplesVariations - SymmetricVariation - AsymmetricWho Uses Encryption?Industrial EspionageProfessionalsCriminalsReliabilityAlgorithms availableRSA algorithmPGP - Pretty Good PrivacyNew ControversiesBenefits of Government InterventionProblemsCommunications Assistance for Law Enforcement Act 1994Arguments for...NEED?COST?Innovation and global competitivenessProtection from Dossier SocietyE-CashE-Cash continuedHistory of EncryptionGovernment InterceptionClipper ChipWiretapping and EncryptionMore Week 5 cont.Early Forms of WiretappingParty LinesHuman OperatorsWiretapping TodayFederal and state law enforcementBusinessesPrivate DetectivesPolitical Candidates......Cellular PhonesCan be tapped with over-the-counter devicesStandard PhonesEasily tapped if signal travels by microwave or satelliteGovernment has secured phonesLegal Mandates1937 - Supreme Court rules that wiretapping is illegal1968 - Congress explicitly allowed it by law enforcement agenciesneeds court orderElectronic Communications Privacy Act include new technologiesCryptography - Making and breaking of ciphersTranslation of the original message into a new incomprehensible one by a mathematical algorithm using a specific KEYPlaintext - a message or dataCiphertext - coded textDecryption - decoding back to plaintextEncryption Includes:Coding scheme or cryptographic algorithmSpecific sequence of characters key used by the algorithmExamplesCereal box codesSubstitute cipherCryptoquip in newspaperVariations - SymmetricUse the same key to encrypt and decrypt (secret key)Requires a more secure system to send the key than the system itselfVariation - AsymmetricUse a key (public key) to encrypt a messageAnother (private key) to decrypt itRequires both keysWho Uses Encryption?BanksIndustryProfessionalsNational ID cardsCriminals.....Industrial EspionageKnowledge of a company’s cost and price structureMarket researchStrategic plansOrder and customer listsInsider informationProfessionalsCellular telephones and electronic mailunencrypted data on machinesCriminalsCryptography allows criminals to keep their identities a secretProvides security to law breakersAllows anonymityDon’t use systems that leave trailsReliabilityThe longer the key has remained unbroken, the stronger it is likely to beThe longer the key is in use, the more likely someone will be able to discover itlarger amount of info will be compromisedchange key frequentlyAlgorithms availableDES - Data Encryption Standard Developed by IBMAdopted as a Federal Information Processing StandardUses a 56 bit keyHas been brokenTo extend life - extend key to 128 bitsor triple DESRSA algorithmUsed in public key cryptography Patented in USBased on multiplication of large prime numbersPGP - Pretty Good PrivacyBased on RSAUsed for protecting E-MailNew Controversies1991 - Senate Bill - Government wants to be able to intercept any message and be able to decode it as well - not passedFBI and wiretapping - Telephony billsFBI and Clipper ChipBenefits of Government InterventionAid law enforcement in protecting us from criminals and terroristsProblemsThreats to privacyglobal competitivenesscivil libertiesCommunications Assistance for Law Enforcement Act 1994to and from Requires that telecommunications equipment be designed so govt. can:intercept all wire and electronic communic.Intercept commun. from mobile usersObtain call-identifying infophone numbers Have info transmitted to a specific locationGovernment will help foot the billArguments for...Protection from terrorists and criminalsFBI wants no new privilegesBUTNecessity has not been justifiedExpense and other problems outweigh the benefitsThere has never been a guarantee of interception of private messages beforeNEED?Wiretaps are less useful than informants, witnesses, etc.BUT90% of terrorist cases used wiretapsIndustry claims full compliance with FBIBUTContinued cooperation is not guaranteedCOST?A lot more than government is givingWill save money infines, forfeitures, prevented economic lossUsed only in a subset of investigationsCould use the money on other technologiesInnovation and global competitivenessStifle or delay new technologieseconomic costsprevent new technologies’ implementationDamage to US competitiveness in global markets due to reduced security and privacyProtection from Dossier SocietyDigital cash made possible by public key encryptionSecure financial transactions without a credit card or checking account numberE-CashNo link between payer and recipientConvenience of credit cardAnonymity of cashUse on Internet for ordinary shoppingCan transfer credentialsCan prevent duplicate cash filesBack up at home incase card is lost or stolenE-Cash continuedNot easy to form a consumer profile or dossierPrevent fraud and forgeryProtect privacy from mailing listsMore control over personal informationHistory of EncryptionSecret - NSANational Security Agencycan do anythinghas powerful computers - break ciphers and create ciphersmonitors all communications between US and other countriesGovernment InterceptionNSA censored researchcontrolled researchersExport restrictionsmunitionscan’t export secure systemsClipper ChipWhy?need for strong encryption for businessDesire for privacy of many AmericansProvide a government back doorWhat?Skipjack algorithmTelephones and computerfield ID to tell government the


View Full Document

ODU CS 300 - Wiretapping and Encryption

Download Wiretapping and Encryption
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Wiretapping and Encryption and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Wiretapping and Encryption 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?