Defence 

mechanisms index network pirates Questions and Answers

Privacy problems?

It has to be admitted that information technology (computers and networks, a domain completely intertwined with telecommunications in this day and age) can, in some cases, cause privacy problems.  For example, the simple sending of an e-mail is as public as sending a postcard.  So the question is: is there a safe way to communicate, away from the prying eyes of interceptors or hackers who get into our computers to install who knows what and look at all our files?  There are some solutions, even though they are not yet in common use.

Cryptography is a technique which allows you to hide the content of any message; it has been around for thousands of years and has often been used for military purposes.  One of the simplest methods is attributed to Julius Caesar, who used it for his private correspondence.

 

The technique consists in replacing every single letter of the original message with the letter that comes 3 places further along in the alphabet (so all the As are replaced with Ds, the Bs with Es, the Cs with Fs, etc), so as to make the message unintelligible.  Obviously, techniques have developed over the centuries. One of the techniques used is DES (Data Encryption Standard) which foresees the use of the same key, which is secret and known only to the sender and the receiver, to cypher and decypher the message.  This is called "symetric key" cryptology.  The problem is how to agree on the same secret code, which must somehow be transmitted safely.

To get round this problem, a different type of algorithm has been developed, called RSA (after its inventors’ initials) This technique is called "public key" and uses two keys – one for crypting and the other for decrypting, but only one of the two keys must be kept secret.  RSA makes use of the particular mathematical properties of prime numbers which make decyphering the message almost impossible because there are no known algorithms capable of easily factorising a number (this operation is necessary in order to make the message comprehensible again). Often, DES and RSA are used together.

These methods can be used to solve problems of authentication (confirmation of the other party’s identity during on-line communication) and message integrity (the guarantee that what you have received has not been tampered with during transmission), using "digital fingerprinting and certification", i.e. the equivalent in the electronic world of our signatures and ID cards.

 

Thanks to the use of these techniques we can safeguard communications established with electronic commercial sites when we buy on-line; we can also make electronic mail safer by using  PGP ("Pretty Good Privacy"), a widely-used programme available on-line, which makes use of RSA.