“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding.

Slides:



Advertisements
Similar presentations
Why the Financial Privacy Law is Better than People Think Professor Peter P. Swire Ohio State University University of Minnesota Symposium February 9,
Advertisements

Telecom, Privacy & Security After September 11 Professor Peter P. Swire Ohio State University Ohio Telecommunications Industry Association October 2, 2001.
A Model for When Disclosure Helps Security: What is Different About Computer & Network Security? Peter P. Swire Ohio State University George Mason CII.
Electronic Surveillance, Security, and Privacy Professor Peter P. Swire Ohio State University InSITes -- Carnegie Mellon February 7, 2002.
Better Security and Privacy for Home Broadband Peter P. Swire Moritz College of Law The Ohio State University Morrison & Foerster LLP Privacy 2002 Conference.
Security Through Obscurity: When It Works, When It Doesnt Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Peter Swire Moritz College of Law Ohio State.
The Role of the Federal Government in Privacy Policy Professor Peter P. Swire The Ohio State University Center for American Progress The Privacy Symposium,
Reflections on the White House Privacy Office Peter P. Swire Ohio State University Center for American Progress N.C. State Privacy Day January 29, 2008.
Lessons for Biometrics from SSNs & Identity Fraud Peter P. Swire Ohio State University National Academy of Sciences March 15, 2005.
The Need for Government-Wide Privacy Policy Professor Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP DHS Privacy Advisory Committee.
The Strategy of Using Security to Protect Privacy Peter P. Swire Ohio State University Consultant, Morrison & Foerster, LLP Data Protection Commissioner.
Outbreak communication Preben Aavitsland. Your role National, regional or local public health office Responsible for outbreak response.
Privacy and Cybersecurity Law in India and the U.S. Professor Peter Swire Ohio State University National Law University, Dwarka March 31, 2011.
Lawful Access in the EU: The Pipe to the Cloud? Professor Peter Swire Ohio State University & Future of Privacy Forum Georgetown Law School Conference.
Security Through Obscurity: When It Works, When It Doesn’t Peter P. Swire The Ohio State University DIMACS, Rutgers January 18, 2007.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
Beyond “I Fought The Law” Educating Law Enforcement about Privacy Services Adam Shostack.
Encryption and Globalization Professor Peter Swire IP Scholars Conference Chicago August 11, 2011.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
A Gift of Fire, 2edChapter 3: Encryption and Interception of Communications1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical.
Chapter 21 E-Policy The debate rages. Cryptography Policy What do you think about: Who controls the keys? Public opinion with government IT, civil liberty.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
Encryption and Interception of Communications Presented by: Emmanuel Sotelo Sassja Ceballos Chapter 3.
Statement of Christopher Humphrey Section Chief, Cyber Division
Cryptography and Public Policy Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Pretty Good Privacy (PGP)
VoIP Voice over Internet Protocol or “It is not Voice over IP; it is Everything over IP…” Bob Pepper, FCC.
Encryption Export Controls in the US Preliminary Research.
Ethical Issues with Cryptography Regulation  Assistance to law enforcement AND  Threats to privacy  Unfair search of property  Obstruction of free.
Conflicting Privacy Regimes: (1) Encryption and (2) Access to Cloud Records Peter Swire Ohio State University Future of Privacy Forum IAPP Global Summit.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
“Privacy and the Future of Justice Statistics” Peter P. Swire Chief Counselor for Privacy OMB/OIRA National Conf.on Privacy, Technology & Criminal Justice.
Lecture 19 Page 1 CS 111 Online Symmetric Cryptosystems C = E(K,P) P = D(K,C) E() and D() are not necessarily the same operations.
CS 4001Mary Jean Harrold1 Class 9 ŸQuestions about term paper—list of possible topics available on line—proposal due 9/27 ŸCommunications assignment—discuss.
Security & Privacy After Snowden: The Review Group & the USA Freedom Act Gartner Security & Risk Management Summit Peter Swire Senior Counsel, Alston &
From Real-Time Intercepts to Stored Records: Why Encryption Drives the Government to Seek Access to the Cloud Professor Peter Swire The Privacy Project.
How Can We Deal with Risks from the Internet: Why Privacy Legislation Is Hot Right Now Professor Peter Swire Ohio State University/Center for American.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Legal aspects Based on Law in the Internet Age Sharon K. Black.
Reasons to Support Strong Encryption for a Globally Secure Internet Professor Peter Swire Ohio State University U.S. Technology Training Institute Washington,
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Backdoors: How Will Government Agencies Adapt to Cybersecurity on the Internet? Professor Peter Swire Ohio State University Internet Law Scholars WIP New.
Protecting Privacy “Most people have figured out by now you can’t do anything on the Web without leaving a record” - Holman W. Jenkins, Jr
Chapter 2: Anatomy of the Problem Recent terrorist attacks and the raise in cyber attacks have raised concern about the need to protect the nation’s cyber.
CS 4001Mary Jean Harrold1 Intercepting Communications Thanks to Sherry Clark for her notes.
Chapter 3 Encryption Algorithms & Systems (Part D)
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
What is “national security”?  No longer defined only by threat of arms  It really is the economy  Infrastructure not controlled by the government.
The Patriot Act Is Spying on US citizens Ethical?
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Prof. Peter Swire Georgia Tech Senior Counsel, Alston & Bird Sayers Security Conference/Curio Tech Summit Atlanta March 22, 2016 How Should Apple Balance.
Privacy Déjà Vu: Crypto, Government Surveillance and Safe Harbor, Peter Swire Georgia Tech/Alston & Bird IAPP Summit April 4, 2016.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
How Technology is Prompting US/EU Tension on Mutual Legal Assistance Peter Swire Huang Professor Law and Ethics Georgia Tech Scheller College of Business.
Peter Swire Holder Chair of Law and Ethics
Outline The basic authentication problem
“Privacy and Cybersecurity Law in India and the U.S.”
PowerPoint® Slides to Accompany
PowerPoint® Slides to Accompany
Attribution & the globalization of criminal evidence
A Brief History of the Crypto Wars
Wiretapping and Encryption
PowerPoint® Slides to Accompany
Define the Problem Constant surveillance of citizens in our country
U.S. Intelligence Oversight Reforms & the Cloud Act
Peter Swire Engage CISO Roundtable with the
Presentation transcript:

“Encryption’s Vital Role in Safeguarding the Digital Economy” Professor Peter Swire Ohio State University ASSOCHAM International Conference Safeguarding the Digital Economy New Delhi April 1, 2011

Overview My view – should have strong encryption, not weak cybersecurity Short history of wiretaps, phone & data U.S. history in 1990s and shift to strong crypto Objection: “We want the keys” Objection: “There must be a back door” Conclusion: Answers to these objections, and strong encryption essential to a usable Internet

Swire Background Professor of Law, Ohio State University – Based in Washington, D.C. Chief Counselor for Privacy to President Clinton, – Chair, WH Working Group Encryption 1999 – Part of 1999 announcement of shift to export of strong encryption 1999 Special Assistant to President Obama, – Issues included broadband, spectrum, privacy, cybersecurity Current research project on encryption policy in a globalizing world – Views here are entirely my own, not statement for administration or others

Local switch Phone call Telecom Company 3 Alice Bob

Local switch Phone call Telecom Company 3 Alice Bob

Bob ISP Alice ISP %!#&*YJ#$ Hi Bob! Internet: Many Nodes between ISPs 3 Alice Bob %!#&*YJ#$

Problems with Weak Encryption Nodes between A and B can see and copy whatever passes through Brute force attacks became more effective due to Moore’s Law; today, 40 bits very easy to break by many From a few telcos to many millions of nodes on the Internet – Hackers – Criminals – Foreign governments – Amateurs Strong encryption as feasible and correct answer – Scaled well as Internet users went over one billion

U.S. Experience 1990’s Initial inter-agency victory for law enforcement (FBI) and national security (NSA), early-mid 90’s – Fear of loss of ability to wiretap Over 5 years of debate, to change in September, 1999 – Always had strong crypto within US – Exports were controlled, on idea that crypto = munition – Change to allow strong crypto export, new global norm (except for a few countries) that strong crypto used on Internet globally Why the change to position contrary to view of law enforcement and security agencies?

Crumbling of Weak Crypto Position Futility of weak crypto rules – Meeting with Senator or Congressman – Start the clock, how long to search for “encryption download”? Get PGP or other strong crypto in less than one minute In world of weak crypto rules, effect on good guys and bad guys – Bad guys – download PGP, stop the wiretap – Good guys – follow the rules, legitimate actors get their secrets revealed Banking, medical records, retail sales The military’s communications on the Internet, government agencies, critical infrastructure

Objection – We Want the Keys The failure of the Clipper Chip – Idea was that all users of strong crypto would “escrow” their keys with law enforcement Advocates for it had various safeguards, e.g., two people in the government had to agree for the key to be revealed – Devastating technical arguments against this Some people didn’t trust the government If do this for 200 nations worldwide, more people don’t trust all the governments Single point of failure – if the databank of keys is ever revealed, most/all communications can be read

Encrypt Encrypted message – Hi Bob! 1 Alice Bob's public key Bob's private key – Alice's local ISP Decrypt Hi Bob! – Bob's local ISP – Backbone provider Bob

Encrypt Encrypted message – Hi Fred! 2 Jill at Corporation A, Tata Public key of Corporation B – Reliance Private key of Corporation B, Reliance – Corporation A's ISP Decrypt Hi Fred! – Corporation B's ISP – Backbone provider Fred at Corporation B Reliance. Lawful process: (1)Ask Tata before encryption (2)Ask Reliance after decryption Lawful process: (1)Ask Tata before encryption (2)Ask Reliance after decryption

Objection – Isn’t There a Back Door? As with Clipper Chip, law enforcement would love to have a back door Back door = designed security flaw in the system – May be that law enforcement only can read (Clipper Chip) – May be that software/service provider can read (they promise security but keep a secret way in) Goal of back door: – All the good guys can get in (and know they can ask for it) – No one else, including bad guys, get in: Criminals and their hackers Foreign governments and spy services Ph.D. computer experts White hat hackers – people who detect flaws and tell CERTs and others about them

The Likelihood of Back Doors? Let’s think through the likelihood that widely-used strong encryption actually has back doors for some law enforcement/national security agencies My view – much less likely than many people think – Swire writings on when secrecy helps/hurts security – Key point is that secrecy not likely to be successful when there are many attackers, who can attack repeatedly, and can report successful attacks A simpler way to say this: Wikileaks – What likelihood that the FBI has been pervasively using a backdoor, with knowledge of software/services companies, and it hasn’t leaked since 1999 approval of strong crypto? – What likelihood that none of the smart Ph.Ds and white hat hackers have ever found an example of this? – What brand effect on global brands if they promised security and secretly broke it? What penalties for fraud?

Conclusion In conclusion, very difficult issues about how law enforcement and national security agencies can/should have access to communications, with what legal process But a simple point – weak encryption at the heart of the Internet is weak cybersecurity The debate on this topic took several years in the U.S. – In the end, wide and stable understanding that strong crypto is essential to do serious business on the Internet – Nothing has shaken that position since the U.S. acceptance of strong encryption in 1999 I hope this perspective is helpful as India and other countries seek ways to assure both cybersecurity and national security more broadly in our Internet-dependent age