Lesk-security_privacy.ppt

advertisement
Security & privacy
Security: downstream (keep users from accessing things)
Privacy: upstream (keep systems from finding out about users)
authentication: know who the users are
cryptography: protect content from being changed
digital rights management: bill people
know what should be online (changed 9/11)
marketing vs. privacy
applets, cookies, sniffers, worms, registration
library circulation records, web browsing records, email ...
data mining: medicine, counter-terrorism, fraud detection, ...
Asymmetric cryptography
Traditional cryptography: same key for encoding and decoding
In 1976 public learned that you could use different keys in each
direction. This enables
digital signatures: publish decoding key
receiving secret mail: publish encoding key
Cryptography also provides for message integrity, digital cash,
non-repudiation, and other desirable properties.
Traditional associated with Rivest, Shamir, Adelman, and with
Diffie & Hellman; now known to have been invented earlier by
the UK intelligence services.
Irreversible functions
Hash functions: keep someone from changing a file,
detect duplicates, provide for random indexing.
It is possible to get truly non-reversible hash functions:
you can't find another file with the same hash value.
Non-reversible hashes (and asymmetric cryptography)
may be slower than traditional methods.
Digital time-stamping
Can you be sure when a message was sent?
Could route message through a trusted organization,
which applies a date stamp; but what if organization can
be corrupted?
Stornetta & Haber: encrypt together a sequence of
messages, so that unless the whole sequence is fake no
individual element can be a fake. Then, once a week,
publish one hash value in the New York Times.
Watermarking
Invisible watermarks
MIT Patchwork project
Authentication
Passwords which are used repeatedly are vulnerable.
SecurId fobs: generate random number, paired generator back at
computer checks match.
S/Key: produce a list of pass phrases, used one at a time.
SecurID has won in real world.
Digital rights management
Still lots of argument. Somehow, publishers want a system
where a given user will be restricted in exactly what they can do
with an object: view or print, download or not, copy to CD or not,
and so on. Can this be encoded in the object and then enforced
in the computer?
Historically, the equipment makers want simple & easy copying,
the publishers want the most detailed possible control.
Microsoft has lined up with the publishers in the current dispute.
Past failures: notch filter in DAT
Very complex: eg record companies want you to be able to buy
a record and then give it away.
What should be online?
This came up after 9/11. Power plants, trash dumps, various public
facilities might be of interest to terrorists. How much should be
described online?
Much material that had been declassified was reclassified after 9/11.
Fear of "cyberterrorism" - attacks on public utilities and/or economy by
disrupting computer networks.
No one will discuss this, but there is a history of hackers breaking into
bank computer systems and demanding money to go away.
International issues
US Government has restricted the export of cryptographic
technology; many pieces of software come in US and non-US
versions. Other countries have different rules: eg France
prohibits non-governmental use of cryptography (although this is
not enforced).
In practice the whole system is breaking down: excellent
cryptography is available from Finland, Switzerland, Israel and
Australia (non-NATO countries). US allows export to NATO and
the Netherlands, which is in NATO, allow free export of crypto.
Much suspicion of US government role in cipher technology (eg
the Clipper chip for key sequestration, or DES details).
Privacy threats
Marketing. Identify people who might buy something and
send them ads. Typically perceived as a nuisance.
Law enforcement. Search for culprits or possible culprits; big
boost here after 9/11. Not yet clear how important this is.
Constant rumors about "echelon" and "magic lantern".
Pricing. Identify people who might buy something but should
be charged more, eg airlines distinguishing business and
leisure travelers. Medical insurance raises bigger issues.
Public records: Megan's law type issues, snooping on your
neighbors. Public cameras, etc.
Users in libraries
Traditionally, book borrowing records confidential (after
disputes in McCarthy era).
Video tape rentals confidential (after Robert Bork hearings)
But: Ken Starr went after Kramerbooks records of Monica
Lewinsky purchases.
Should libraries track users? Should they aggressively keep
the portals they use from doing so?
Is the "alexa" portal (previous viewers of your page went to
the following pages next) an invasion of privacy or a service?
Mechanisms
Cookies: supposedly site-specific information
Registration forms: asking people their names and/or data
Applets (Java or Active-X): can do almost anything
Viruses: could gather information as well as make trouble.
Sniffers: can listen to Internet packets, or even be installed on
your machine by viruses.
Defenses: ssh not telnet, etc.
Data mining
Mailing lists can be worth a lot: few cents and up per name. Price
depends on age, quality, how selected, etc.
Online email lists worth a lot less but much cheaper to use.
Last summer every bank and retailer mailed a privacy policy to
every cardholder: in general it said we can sell your information.
Some data mining is consumer friendly, e.g fraud detection on
credit and phone credit cards.
Europeans have stronger protection than US.
Conclusions
There is less privacy than there used to be. Is this good or
bad? What's going to happen next?
Surveillance cameras linked to central sites.
GPS sensors in all kinds of equipment, or at least the tracking
of cellphones.
Cellphone vulnerability continues; wiretap laws may change.
Not likely to be a big money-maker for libraries, but whether
they can hold to existing privacy standard in face of pressure
from law enforcement and parents is not clear.
Download