Elon University
The prediction, in brief:

If a system has security holes, an intruder might be able to penetrate the system, circumventing encryption and authentication mechanisms. They might then be able to obtain access to cryptographic keys or put a Trojan horse in encryption software. Encryption also cannot prevent insiders from misusing their access privileges.

Predictor: Denning, Dorothy

Prediction, in context:

In a 1994 article for the Journal of Criminal Justice Education, Dorothy Denning writes about a growing Internet marketplace and the risk of emerging computer criminals: ”Cryptography supplements and helps enforce access controls, authentication mechanisms, and operational controls. However, it is not a complete ‘security solution.’ If a system has security holes, an intruder might be able to penetrate the system, circumventing encryption and authentication mechanisms. They might then be able to obtain access to cryptographic keys or put a Trojan horse in encryption software. Encryption also cannot prevent insiders from misusing their access privileges.”

Biography:

Dorothy Denning was a professor and chair of Computer Science at Georgetown University in the 1990s, by which time she had been in the field of computer security and cryptography for two decades. Previous to her arrival at GU, she worked at Digital Equipment Corporation, SRI International and Purdue University. Her books include “Cryptography and Data Security” and “Information Warfare and Security.” She authored many Internet research studies. She was the first president of the International Association for Cryptologic Research. (Research Scientist/Illuminator.)

Date of prediction: December 13, 1994

Topic of prediction: Communication

Subtopic: Security/Encryption

Name of publication: Journal of Criminal Justice Education

Title, headline, chapter name: Crime and Crypto on the Information Superhighway

Quote Type: Direct quote

Page number or URL of document at time of study:
http://www.cs.georgetown.edu/~dennning/crypto/Crime-and-Crypto.txt

This data was logged into the Elon/Pew Predictions Database by: Anderson, Janna Quitney