I.T.G.S.                Friday, October 05, 2007

Information Technology in a Global Society

Chapter 3 – Encryption and Interception of Communications – Pg 129

Describe at least three different kinds of uses of encryption that have social value. (Indicate why they are valuable).

  • Encryption can be used to protect personal communications – such as telephone calls or email – from unauthorized access. This is very important because it gives users the ability the ensure that their privacy is maintained and not violated by preventing unauthorized people from being able to spy on their personal communications.
  • Encryption is also useful in protecting sensitive data – such as credit numbers for internet purchases – that is in transit from unauthorized access. Without encryption, internet purchases would be highly insecure as anyone would be able to intercept the financial details of buyers. Encryption therefore prevents the financial details of internet buyers from being stolen and as a result makes secure internet purchases possible.
  • As well, encryption is used to protect personal stored data – such as financial information and medical records – from unauthorized access and alteration. This is important because it gives people the ability to protect their privacy by giving them totally control over their own personal information. Only they can they only can decide who can access their personal files.  

What is an important difference between public-key cryptography and secret-key cryptography?

The main difference between public-key cryptography and secret-key cryptography is the fact that in public-key cryptography there is no need for secure transmission of keys as it is the case in secret-key cryptography. The beauty of public-key cryptography is that knowing the public-key (which is used to encrypt the message – plaintext) provides no help whatsoever to find the private key (which used to decrypt the message – ciphertext). It is this feature that makes public-key cryptography so desirable and distinguishes it from secret key cryptography as it eliminates the need for the secure transmission of keys.

Join now!

What kinds of information does Echelon collect?

Echelon is a secret system operated by the USA and other countries that is capable of intercepting satellite communications and analyzing them in the search of specific people or subjects. The kind of information Echelon collects include telephone calls, e-mails and even internet downloads. Telephone conversions of targeted subject(s) are analyzed using voice recognition software to find ones of interest. However, the information Echelon collects is not limited to just suspects and terrorists but also includes information that is of help to the U.S. economy as well as U.S. business companies.

Give two ...

This is a preview of the whole essay