User:Brian McNeil/Project INDECT/Crypto

Kick off: New crypto for INDECT

edit

Apparent intention is to deliver the final working INDECT system in such a way that it is cryptographically secure. Access to 'content' in the database is to be secured even when sent to mobile devices such as PDAs. Due to integration with CCTV footage it is possible video would have to be streamed to such devices over an encrypted connection.

Janusz Stokłosa of the Poznan University of Technology is the Chair of IT Security. In the January 22 - 23 Project INDECT kick-off meeting in Cracow his team was presented; Krzysztof Bucholc, Krzysztof Chmiel, Anna Grocholewska-Czuryło, Ewa Idzikowska, Izabela Janicka-Lipska, Michał Apolinarski, and Przemysław Rodwald who is responsible for coordinating with other project participants. Their activities in Project INDECT are intended to design a new block cipher, stream cipher, and hash function.

  • Are these respected and credible cryptographers?
  • Is 'inventing' brand-new crypto for INDECT a good idea?


  • Why is this mentioned as part of INDECT?

From the Technical University of Košice (TUKE), the Laboratory of Multimedia Technologies presents itself as expert in "Multimedia Content Security", with focus on talking points including "watermarking in video" and "Image Steganography". Various other departments from TUKE are also involved with INDECT, their specialities being in speech recognition, automatic transcription, 'pervasive' mobile/wireless networks, and the Quality of Service and security requirements where access must be provided over an ad-hoc, or "mesh" network.

  • Why would significant effort be invested in areas like steganography and digital watermarking?
  • If one were to suppose this is for the security of content delivered over their crime fighting network, possibly to pinpoint leaks, how realistically do watermarks and 'hidden messages' survive transition to a medium like YouTube? Does this cast a 'chilling' shadow on would-be whistleblowers?
  • Assuming, as academic research, the results from this work are released publicly, what are some of the alternative uses, who profits the most from deploying any technology developments?
  • oj@alternet.org