[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Crypto Conference from Hell



The attached message was originally posted in comp.dcom.telecom. I haven't
contacted these people, but some 'punk in the DC area might be able to
weasel in.

Consider the list of speakers:
	- well-known (notorious) - Denning, Bidzos, Clint Brooks from
	  NSA, Kammer from NIST
	- people we should be talking to - the mgr of AT&T's Secure
	  Comm Systems division, that same division's chief scientist
	- Big Wheels - Rosenthal (chief counsel for SPA), Willis Ware,
	  Jerry Berman.

Fun for the whole family!

-Paul



Path: infonode!uunet!spool.mu.edu!telecom-request
Date: Mon, 12 Jul 1993 16:26:13 -0500
From: Matthew Lucas <[email protected]>
Newsgroups: comp.dcom.telecom
Subject: Conference With Dorothy Denning: Encrypting Voice and Data
Message-ID: <[email protected]>
Organization: TELECOM Digest
Sender: [email protected]
Approved: [email protected]
X-Submissions-To: [email protected]
X-Administrivia-To: [email protected]
X-Telecom-Digest: Volume 13, Issue 468, Message 1 of 9
Lines: 151

Conference Announcement:

         A TeleStrategies Conference with Dr. Dorothy Denning
            
         Encrypting Voice and Data: Strategies for the Future
                      
                          Aug. 3-4, 1993
                          Washington, DC
                   
Tuesday, August 3, 1993

8:30-9:00 Registration

9:00-10:30 
CRYPTOGRAPHY OVERVIEW 

The basic concepts of cryptography and encryption, including
single-key and publickey, authentication, digital signatures, key
negotiation or distribution, and cryptanalysis (code breaking) will be
introduced along with the Data Encryption Standard (DES), the RSA
public-key system, and the Digital Signature Standard (DSS). The
speaker will also discuss the need for encryption and the role of
encryption in telephony and communications networks.

Dr. Dorothy E. Denning, Professor and Chair of Computer Science,
    Georgetown University

10:30-10:45 Coffee Break

10:45-11:45
SURVEY OF ENCRYPTION PRODUCTS 

The speaker will survey commercial hardware and software products that
contain encryption capabilities, including the types of products that
are available, their relative strengths and weaknesses, and the major
vendors.

Jim Bidzos, President, RSA Data Security, Inc.

11:45-12:30
CELLULAR ENCRYPTION

Cellular calls are especially vulnerable to eavesdropping. PrivaFone's
approach, which is interoperable on cellular and land lines, will be
described. Digital cellular standards that provide voice privacy and
authentication for TDMA or CDMA technologies also will be discussed.

Dr. Ming Lee, President, Synacomm Technology
Charles Wistar, President, PrivaFone Corp.

12:30-1:45 Hosted Lunch

1:45-2:30 
THE CLIPPER AND CAPSTONE CHIPS 

The Clipper and Capstone Chips are part of a new U.S. technology
initiative to provide secure communications and legitimate law
enforcement access through a key escrow system. The speakers will
describe the initiative, the security functions provided by the chips,
and the use of the Clipper Chip in the AT&T Telephone Security Device.

William M. Agee, Manager, Secure Communication Systems - Government, AT&T
Raymond G. Kammer, Acting Director, National Institute of Standards 
     and Technology

2:30-3:00
BUSINESS CONCERNS WITH ENCRYPTION 

The speaker will give a snapshot of one computer security program and
discuss business concerns with encryption, including practical needs
and requirements, organizational constraints, operational concerns,
security of the process, and balancing concerns and practical use.

Randolph N. Sanovic, Manager of Computer Security Planning, Mobil Corp.

3:00-3:15 Coffee Break

3:15-4:00
USING CRYPTOGRAPHY TO ARCHITECT DISTRIBUTED OPEN SYSTEMS
SECURITY: A CASE STUDY 

Securing networks and computers in a distributed environment presents
several new challenges. The speaker will describe Bell Atlantic's
enterprise-wide approach to architecting security in such an
environment, showing how encryption fits into the design.

Ravi Ganesan, Specialist, Security Research and Planning, Bell Atlantic

4:00-5:00
ENCRYPTION IN ELECTRONIC COMMERCE AND ELECTRONIC MAIL 

Encryption is becoming an integral tool for building secure
applications.  The speakers will discuss the use of encryption and
digital signatures in Electronic Data Interchange (EDI) and Internet
Privacy Enhanced Mail (PEM).

Michael S. Baum J.D., Principal, Independent Monitoring
Dr. Stephen D. Crocker, Vice President, Trusted Information Systems, Inc.

5:00-6:00 Reception


Wednesday, August 4, 1993

8:30-10:30
CRYPTOGRAPHY POLICY IN THE U.S. 

The speakers will discuss the Clipper and Capstone chips, law
enforcement needs and the Digital Telephony proposal, export and
import of encryption products, international markets, industry growth
and competitiveness, and individual privacy. They will also report on
the national policy review in progress.
 
Dr. Willis H. Ware, Chair, Computer Systems Security and Privacy 
     Advisory Board (Moderator)
Jerry Berman, Executive Director, Electronic Frontier Foundation    
Clinton C. Brooks, Special Assistant to Director, National Security Agency 
Alan R. McDonald, Special Assistant (Legal) to the Assistant Director, 
     Technical Services Division, Federal Bureau of Investigation
Ilene Rosenthal, General Counsel, Software Publishers Association

10:30-10:45 Coffee Break

10:45-11:30 CRYPTOGRAPHY IN THE EUROPEAN COMMUNITY 

In the European Community, government controls on cryptography differ
across countries and affect achievement of secure open systems and,
consequently, achievement of the Open Market and transborder
electronic trading. The speaker will summarize the current situation
in Europe, describe some of the initiatives to address the issues, and
comment on the recent initiatives in the US.

Christopher E. Sundt, Business Strategy Manager, ICL Secure Systems

11:30-12:15
THE FUTURE OF CRYPTOGRAPHY IN TELECOMMUNICATIONS 

Several fast-moving trends in telecommunications demand cryptographic
solutions, including wireless transmission, multi-media conferencing,
and electronic commerce.  As broadcast and multiple access
technologies are used increasingly for information transmission, and
everyday business is carried out in "cyberspace," structures that
ensure privacy, authenticity, and (often) anonymity must become part
of the natural landscape.

Dr. David P. Maher, Chief Scientist for AT&T Secure Communications 
     Systems, AT&T

For complete information call TeleStrategies Inc. at (703) 734-7050.