1 / 8

Encryption

Encryption. “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according to an equation or algorithm into unreadable “ciphertext””

Download Presentation

Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Encryption • “Encryption basically involves running a readable message known as “plaintext” through a computer program that translates the message according to an equation or algorithm into unreadable “ciphertext”” • “Decryption is the translation back to plaintext when the message is received by someone with an appropriate ‘key’” • Four main uses: data integrity, authentication, nonrepudiation, confidentiality

  2. Types of Encryption • Length of encryption indicates strength; but not all encryption is created equally • Public Key versus Private Key (symmetric versus asymmetric)

  3. Comments of Janet Reno • “Encryption can frustrate completely our ability to lawfully search and seize evidence and to conduct electronic surveillance, two of the most effective tools that the law and the people of this country have given law enforcement to do its work.”

  4. Present Regulation • Department of Commerce: not military 1. Mass Marketed needs one time review 2. Data recovery type may be elegible to nonembargoed countries 3. Up to 56 bit may receive 6 month export license if promise to develop key recovery 4. The rest is considered on a case by case basis

  5. Bernstein v. US • Major case of encryption export • As far as publishing efforts are concerned, regulations are unconstitutional because they violate the First Amendment as a violation of prior restraint • Government has appealed, and stay granted of enforcement until that time • Karn case is opposite

  6. Methods of controlling Encryption • Escrowed Encryption Standard (Clipper Chip) • Key Management • Licensing • Third Party Trusted Intermediaries • Certification Authorities

  7. Zeran v. AOL • November, 1997; 4th Circuit • Numerous false postings to AOL resulted in death threats and constant calls to Zeran • AOL remove postings but would not issue retraction

  8. Circuit Court Decision • CDA provision was written to protect speech, take hands off approach to regulation of the Internet and to promote self-regulation • Applied CDA retroactively • AOL not liable • Notice to AOL had no effect

More Related