Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human...

19
Computers in Society Encryption
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    217
  • download

    3

Transcript of Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human...

Page 1: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Computers in Society

Encryption

Page 2: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Representing Sensory Experience

Some objects correspond to human sensory experience – these representations are created to all these experiences to be replicated.

This ALWAYS involves the conversion from analog (continuous time and value) to digital (discrete time and value)

Page 3: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

From Analog to Digital

Media is recorded by turning an analog signal in the real world into a digital signal in a computer.

The sampled signal is on a grid: the X direction determines the sampling interval (rate), the Y direction the sampling values. The precision of the sampling determines how closely the digitized signal matches the original.

Page 4: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Approximating Sensation

When representing pictures, sounds, or movies there is always a trade-off between size and precision.

For example, sound can be represented as .wav or .mp3; pictures as .bmp or .jpg

Media formats such as mp3 and jpg degrade the media quality, usually in ways that are not detectable to human senses.

Page 5: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

The Next Level

So far, we've ignored "meaning".

That is, a picture is just a bunch of pixels

A sound is just a waveform

A book is just a string of characters

The hard problem is assigning a deeper meaning to these objects.

Go to the seminar of Friday for a good look at this problem!

Page 6: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Ontology

Why is ontology important?

How do Ontologies relate to object-oriented programming?

What is a partition?

What are some common relationships?

What is the difference between a domain ontology and upper ontology?

What is OWL? Why is it important?

Page 7: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Privacy and Security

• Encryption

• Anonymity

• Trust

Page 8: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Encryption

The problem: private communication on public channels

Is the Internet a public or private channel? Why?

Page 9: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

History of Encryption

This is a classic example of a problem that has been around for thousands of years that can be addressed directly by computation!

Two basic ideas: a computational mechanism to perform encryption and a shared secret between the parties

Page 10: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Encryption

Our basic encryption scenario:

Alice and Bob are trying to communicate

A third party, Trudy, is trying to understand what Bob and Alice are saying. Any message from Alice to Bob is also seen by Trudy

Page 11: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Shared Secret Encryption

Until recently, all encryption has been based on a “shared secret”. The classic example is the “One Time Pad” – a sequence of random 0’s and 1’s.

Use a key (the pad) to scramble every bit in a message (1 = change, 0 = don’t change)

• Receiver must have same pad• Pad has to be “truly random”• Can only use pad once!• Code is mathematically unbreakable• Pad must have the same length as the message

Page 12: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Using “Keys”

The problem with a one time pad is that it gets used up.

Instead of a pad, we would rather use a “key”.A key is a piece of information (0’s and 1’s) that is

reused continuously to encrypt an arbitrary amount of data

Keys are measured by their length (128 bit encryption, for example)

Note that “cracking” the key opens up lots of potential information.

How hard is it to guess an N-bit key?

Page 13: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Encryption Standards

There are many “standard” encryption algorithms (DES, AES, …).

We generally rely on public standards rather than private ones – why???

Shared key (symmetric) encryption is computationally efficient – encrypting a long message is no problem at all.

Page 14: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Public Key Encryption

This is somewhat like the “invention of the wheel” in the crypto world. A truly world-changing feat that is not much recognized by the public.

This was first published publicly by Whitfield Diffie and Martin Hellman in 1976

Malcolm J. Williamson actually developed this stuff first but it was not

published

Page 15: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Public Key Encryption

Basic idea: you need two keys, a public key that everyone knows and a private key only you know.

Sender uses public key of receiver to encode message

Only receiver has private key. No need to trust the sender with your secret!

Page 16: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

The Lockbox

I want to be able to receive something from a friend without worrying about anybody peeking in.

My solution: use an unbreakable lockbox with a lock that can't be picked.

I'll give my friend the lockbox and one key, I'll keep the other key. He can mail me the locked box and only I can open it.

What sort of encryption is this?

Page 17: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

The Key Problem

I don't want to meet my friend in

private to hand him the key but I can't mail him the key either (why?).

So what if instead I put a diagram of the key on my website so he can build it himself?

Will that work?

Page 18: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Locks

Since anyone can build a key, anyone can pick locks on my private message.

Instead of keys, let's talk about locks.Think of a combination lock – if it's open,

you can lock something with it even if you don't know the combination.

You only need the combination to unlock!Now instead of sharing keys, I give an

unlocked lock to my friend.

Page 19: Computers in Society Encryption. Representing Sensory Experience Some objects correspond to human sensory experience – these representations are created.

Building Locks

Instead of telling everyone in the world how to build my key, I'll tell everyone how to build an open lock than only I can unlock.

Wouldn't seeing the plans for this lock make it possible for others to deduce the combination?