Security needs on networks
Application areas for security
Cryptosystems
Secret key encryption (Symmetric algorithms)
Data Encryption Standard (DES)
Secure key distribution is critical
The basic approach
The one-way function for Diffie-Hellman
Diffie-Hellman Key Agreement
Public-key encryption (asymmetric algorithms)
Digital signatures
Digital signatures and PK encryption
Certificates and Certifying Authorities
PPT Slide
CALEA, October 1994
Clipper
Export controls
NIST meetings with industry, Fall 95
Interagency working group draft, May 96
Courting industry, Fall 96 - ...
Legislation, 1997
“Private doorbell” system
Encryption can happen at multiple levels
Industry claims and issues
Law enforcement claims and issues
National security establishment claims and issues
Civil libertarian claims and issues
Some architecture/policy issues
Some technical observations
Email: hal@mit.edu
Other information: Slides from class presentation on September 28, 1999
Download presentation source