Abstract

Encryption has become an integral part of modern life. It is without a doubt of great importance for the realization of some of the basic human rights in the ubiquitous technical environment, for the daily use of numerous online services, as well as for the functioning of the Internet in general. On the other hand, the authorities in charge of detecting and proving crime are increasingly facing obstacles when accessing encrypted content. Namely, encryption represents a kind of challenge in the implementation of both general and special evidentiary actions. This paper is dedicated to understanding the technical aspects of this challenge. The author explains the basic principles on which encryption technology is based, pointing out the difference between symmetric and asymmetric encryption, between encryption of stored data and data encryption in transit, and between server-based and user-based encryption, and its implication for investigation of crime.

Highlights

  • Уко­ли­ко ко­ри­сник не­ма по­ве­ре­ња у на­чин на ко­ји се по­да­ци „у обла­ку“ чу­ва­ју и ко­ри­сте, па по­ дат­ке чу­ва са­мо ло­кал­но, од­но­сно на уре­ђа­ју, мо­гућ­ност де­крип­ци­је за­ви­си од софт­ве­ра и ала­та за ен­крип­ци­ју ко­је је при­ме­нио

  • Mic­ro­soft.com­/en-us/help/246071/de­scrip­tion-of­-symme­tric-an­dasymme­tricen­cryption; Mil­ler, Joe, “Go­o­gle and Ap­ple to in­tro­du­ce de­fa­ult en­cryption“, BBC, 19.9.2014, https://www.bbc.com/news/tec­hno­logy-29276955; Na­ti­o­nal In­sti­tu­te of Stan­dards and Tec­hno­logy, Re­com­men­da­tion for Pas­sword-Ba­sed Key De­ri­va­tion, 2010, http://nvlpubs.nist.gov/nist­pubs/Le­gacy/SP­/nistspe­ci­al­pu­ bli­ca­tion800-132.pdf; OECD Co­un­cil Re­com­men­da­tion Con­cer­ning Gu­i­de­li­nes for Crypto­graphy Po­licy, C(97)62/FI­NAL, 27.3.1997, https://www.oecd.org/sti/ie­co­nomy/gu­i­de­li­nes­for­ crypto­graphypo­licy.ht­m; Пи­са­рић, Ми­ла­на, Елек­трон­ски до­ка­зи у кри­вич­ном по­ступ­ку, Но­ви Сад 2019; Pro­ton­Mail, What is en­crypted?, https://pro­ton­mail.com­/sup­port/know­led­ge-ba­se/

Read more

Summary

Introduction

Cli­ent-si­de en­cryption).[23] Сер­вер­ску ен­крип­ци­ју при­ме­њу­је тре­ћа стра­на, од­но­сно пру­жа­лац услу­га, на свом сер­ве­ру, на по­дат­ке ко­ји за ра­чун ко­ри­ сни­ка скла­ди­шти „у обла­ку“ или пре­но­се кроз ра­чу­нар­ску мре­жу. У окви­ру трен­да да про­из­во­ђа­чи уре­ђа­ја ин­те­гри­шу ен­крип­ци­ју це­лог ди­ска у уре­ђа­је као фа­брич­ку поствку, чи­ме су ен­крип­то­ва­ни сви по­ да­ци по­хра­ње­ни у уре­ђа­ју, ко­ри­сни­ци­ма се ну­ди мо­гућ­ност да по­хра­ње­не по­дат­ке син­хро­ни­зу­ју са сер­ве­ром, од­но­сно да их исто­вре­ме­но чу­ва­ју и „у обла­ку“

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.