I crypt, You crypt Budi Rahardjo Institut Teknologi Bandung – Invited.

Slides:



Advertisements
Similar presentations
No ICT Without ICT Integrated Circuit Technology (ICT) as the basis for leading edge Information & Communication Technology (ICT) Budi Rahardjo
Advertisements

Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
PAR for P Title: Standard for Pairing based Cryptographic Techniques June 4, 2005 PAR for IEEE P
CS4032 Presentation SMS, SIM, MMS and Barcodes Richard Drysdale.
IMPS Information Management and Policy Services Information Services Directorate A briefing for all University staff November 2004 New Information Legislation.
Installation & User Guide
IT Security Assurance Management of Network and User Behavior Budi Rahardjo INDOCISC - ID-CERT -
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
OPEN SOURCE vs. COMMERCIAL SOFTWARE an academic view Budi Rahardjo Presented at Business Software Alliance.
Domain Name Management Budi Rahardjo Indonesia Network Information Center (IDNIC)
Security in Electronic Commerce The need for Public Key Infrastructure Budi Rahardjo Presented at BPPT, Jakarta, Indonesia 10 February 2000.
A Bridge Between Engineering and Mathematics Budi Rahardjo Sekolah Teknik Elektro dan Informatika 2007.
Novelties On The Internet Technology and Services Budi Rahardjo Institut Teknologi Bandung
Keeping digital advertising within the law EFCCE Conference May, Paris LHC Building Blocks - Media Law Training.
The Role of Academic in Narrowing Digital Divide Budi Rahardjo Director of Research & Development Center on Industry and Information Technology Institut.
Cryptography 2 / Cryptographic Protocols 1 Spring Semester 2014 Berry Schoenmakers Coding & Crypto group Department of Mathematics & Computer Science Where’s.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Digital Certificate Installation & User Guide For Class-2 Certificates.
INFORMATION TECHNOLOGY & TELECOMMUNICATION: ISSUES IN INDONESIA Budi Rahardjo Bana G. Kartasasmita Institut Teknologi Bandung Presented at “New Vision.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
The Road Ahead Budi Rahardjo Teknik Elektro ITB Bandung Presented – 18 August 2001 before the new ITB EE students 16 March 2002 – Kapita Selekta.
Net security - budi rahardjo Overview of Network Security Budi Rahardjo CISCO seminar 13 March 2002.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Security & Encryption Thomas Fenske & Joseph Minter.
Next Generation Two Factor Authentication. Laptop Home / Other Business PC Hotel / Cyber Café / Airport Smart Phone / Blackberry 21 st Century Remote.
Secure communication Informatics for economists II Jan Přichystal
Computers and Society Lecture 1: administrative details and an introduction to the class Professor: Evan Korth New York University.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
Trusting the Trust Budi Rahardjo Inixindo Security Day Seminar The Executive Club, Jakarta, 19 March 2009.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
FIT3105 Smart card based authentication and identity management Lecture 4.
Online Security Tuesday April 8, 2003 Maxence Crossley.
Chapter 5 Cryptography Protecting principals communication in systems.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
CSI 400/500 Operating Systems Spring 2009 Lecture #20 – Security Measures Wednesday, April 29 th.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
12 th XBRL International Conference National Tax Agency JAPAN.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Encryption Objective 1: Explain data encryption procedures.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
An Overview of Cryptography Ying Wang-Suorsa Helsinki University of Technology.
Unit 10 Communication Services
Review of basic cryptographically algorithm Asymmetric encoding (Private and Public Keys), Hash Function, Digital Signatures and Certification.
PGP ENCRYPTION Prepared by Noel Kigaraba. Introduction This presentation explains the basic information about PGP encryption software. It discusses the.
I NTRODUCTION TO C RYPTOLOGY Cryptoanalysts, Encryption, and Decryption.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Chapter 17 Security. Information Systems Cryptography Key Exchange Protocols Password Combinatorics Other Security Issues 12-2.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Public Key Encryption  Illustration  Uses  Importance  RSA  Cryptcard.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
The Role of Academic in Narrowing Digital Divide Budi Rahardjo Director of Research & Development Center on Industry and Information Technology Institut.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
1 Thuy, Le Huu | Pentalog VN Web Services Security.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
CSCI-235 Micro-Computers in Science Privacy & Security.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Wel come –Prepared by: BHAVIN TANK MILAN VEGAD. What is the.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
To the ETS – Accounts Setup and Preferences Online Training Course
Unit 8 Network Security.
Presentation transcript:

I crypt, You crypt Budi Rahardjo Institut Teknologi Bandung – Invited Talk at Indonesian Cryptology and Information Security Conference Jakarta, March 2005

2005Budi Rahardjo - I crypt, you crypt2 Gur Pelcg Fbat V pelcg, lbh pelcg Jr nyy pelcg, sbe V pelcg Yn, yn, yn …

2005Budi Rahardjo - I crypt, you crypt3 ROT13 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z n o p q r s t u v w x y z a b c d e f g h i j k l m Characters are shifted 13 places Commonly used during the Usenet newsgroup era to post puzzles or offensive messages There are many tools to perform rot13 –Usenet news readers –Text editors: vi, emacs –Now, web-based:

2005Budi Rahardjo - I crypt, you crypt4 The Crypt Song I crypt, you crypt We all crypt, for I crypt La, la, la … Adapted from “The I scream ice cream” song I scream, you scream We all scream for ice cream La, la, la Monday, Tuesday We all scream for sundae La, la, la

2005Budi Rahardjo - I crypt, you crypt5 Daily-crypto-live Cryptography is part of our (digital?) live –GSM communication (with A5) –Bank ATM (PIN, encrypted communication) –Microsoft Office files can be saved with password (RC4) –Access control (password, token, smartcard) –SSL in e-commerce –If that’s not enough, roll your own coding scheme for puzzles, quizzes, … secret SMS messages ! –Many more … What does it mean?

2005Budi Rahardjo - I crypt, you crypt6

2005Budi Rahardjo - I crypt, you crypt7 GSM Source:

2005Budi Rahardjo - I crypt, you crypt8 Microsoft Office Password

2005Budi Rahardjo - I crypt, you crypt9 What does it mean? It means that we already dependent on crypto for –Commercial environment –Government –Military –and … personal (home)

2005Budi Rahardjo - I crypt, you crypt10 Impact To Government Should the government come up with regulation? Over protected/regulated –Privacy on the line –Bad for business Under protected –False sense of security –National security issues? How to strike balance? There will be more debates in the future

2005Budi Rahardjo - I crypt, you crypt11 Crypto problems in Indonesia The problems –Lack of understanding crypto. A difficult subject. Not much interest. Don’t care… –Lack of expertise in Indonesia(?) –How to build and keep talented human resources in Indonesia? That is why we need the Society of Indonesian Cryptology and Information Security

2005Budi Rahardjo - I crypt, you crypt12 Resulting in … As a result –Technology dependencies are high –We are at the mercy of vendors and other governments –We were given a sub-standard products (e.g. shorter key length, which results in less secure system)

2005Budi Rahardjo - I crypt, you crypt13 International Surveilance Source: IEEE Spectrum April 2003

2005Budi Rahardjo - I crypt, you crypt14 Listen, Filter, Store Source: IEEE Spectrum April 2003

2005Budi Rahardjo - I crypt, you crypt15 Road from Crypto to Security Some would think that encryption can solve all security problems. Wrong! Crypto alone cannot solve all security problems –e.g. availability problems All of this lead to information security

2005Budi Rahardjo - I crypt, you crypt16 Initiatives There has to be security initiative(s) to solve this problem, by –Research –Product development –Applications –Standards (for military, commercial, and personal/home use) –Certification –Education [crypto for kids?] Indonesia’s National Strategy to Secure Cyberspace

2005Budi Rahardjo - I crypt, you crypt17 Security Initiative Drivers Who is the driver? –Government –Academia –Commercial entities –Special interest groups (such as our society?)

2005Budi Rahardjo - I crypt, you crypt18

2005Budi Rahardjo - I crypt, you crypt19

2005Budi Rahardjo - I crypt, you crypt20 What to do next? Let’s hope that this is conference continues (annually?) Let’s discuss this in this forum …

2005Budi Rahardjo - I crypt, you crypt21 Gunax Lbh