Abstract
Cryptology policy deals not only with various technological encryption methods but also with thorny political and administrative problems. It is a challenge to address these in a timely and open manner. The problems arise in law enforcement, civil liberties, and export control policy. They must be confronted if a rational cryptographic policy is to provide a framework in which technological solutions can operate.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Balenson, D. M., Ellison, C. M., Lipner, S. B., and Walker, S. T., “A New Approach to Software Key Escrow Encryption” in [Hoffman 1995].
Beth, T., Frisch, M., and Simmons, G. (Eds.), 1992, Public Key Cryptography: State of the Art and Future Directions, Lecture Notes in Computer Science 578, Springer-Verlag, 1992.
Blaze, M., “Protocol failure in the escrowed encryption standard”, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, VA, November 1994 (reprinted in [Hoffman 1995]).
Blaze, M., “My life as an international arms courier”, comp.risks, January 6, 1995.
Brassard, G., Modern Cryptology. Lecture Notes in Computer Science 325, Springer-Verlag, New York, 1989.
Brendler, B., ‘Secret’ Agency Steps Over the Line, Washington Technology, February 10, 1994 (reprinted in [Hoffman 1995]).
Brickell, E. F., Denning, D. E., Kent, S. T., Maher, D. P., and Tuchman, W., “SKIPJACK Review: Interim Report”, posted to sci.crypt, August 1, 1993 by Dorothy Denning (reprinted in [Hoffman 1995]).
Bulkeley, W. M., “Genie is Out of the Bottle”, Wall Street Journal, April 28, 1994, p. 1 (reprinted in [Hoffman 1995]).
Christensen, L. E., “Technology and Software Controls” in Law and Policy of Export Controls: Recent Essays on Key Export Issues, August 1993, pp. 3–33 (reprinted in [Hoffman 1995]).
Denning, D., “The U. S. Key Escrow Encryption Technology”, Computer Communications 17, 7 (July 1994), Butterworth-Heinemann Ltd., Linacre House, Jordan Hill, Oxford, OX2 8DP, United Kingdom (reprinted in [Hoffman 1995]).
Denning, D. and M. Smid, “Key Escrowing Today”, IEEE Communications, September 1994.
Denning, D., Testimony before the U. S. House of Representatives Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology, May 3, 1994 (reprinted in [Hoffman 1995]).
Diffie, W. and Hellman, M. E., “New Directions in Cryptography”, IEEE Transactions on Information Theory IT-22, pp. 644–654, 1976.
Diffie, W., “The Impact of a Secret Cryptographic Standard on Encryption, Privacy, Law Enforcement and Technology”, Hearings before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, U. S. House of Representatives, 103rd Congress, 1st Session, April 19 and June 9, 1993. Serial No. 103–53, pp. 111–116 (reprinted in [Hoffman 1995]).
Electronic Privacy Information Center, Statement on Wiretap Bill, October 8, 1994 (reprinted in [Hoffman 1995]).
Froomkin, A. M., “The Constitutionality of Mandatory Key Escrow - A First Look”, in [Hoffman 1995].
Gelernter, D., “Wiretaps for a Wireless Age”, The New York Times, Section 4 Op-Ed, May 8, 1994, (reprinted in [Hoffman 1995]).
Gore, A., Letter to Hon. Maria Cantwell, July 20, 1994 (reprinted in [Hoffman 1995]).
Hanson, R., “Can Wiretaps Remain Cost-Effective?”, Communications of the ACM 37, 12 (December 1994), pp. 13–15.
Harmon, J. M., “Constitutionality Under the First Amendment of ITAR Restrictions on Public Cryptography”, Memorandum to Dr. Frank Press, Science Advisor to the U. S. President, May 11, 1978 (reprinted in [Hoffman 1995]).
Harris, M., letter to Philip R. Karn, Jr., October 7, 1994 reaffirming determination on cryptographic export media (reprinted in [Hoffman 1995]).
Hesse, C., “Enlightenment Epistemology and the Laws of Authorship in Revolutionary France, 1777–1783”, Representations 30, Spring 1990, University of California, Berkeley.
Kahn, D., The Codebreakers, MacMillan Co., New York, NY, 1967.
Hoffman, L. J., “Clipping Clipper”, Communications of the ACM 36, 9 (September 1993), pp. 15–17.
Hoffman, L. J., Ali, F. A., Heckler, S. L., and Huybrechts, A., “Cryptography Policy”, Communications of the ACM 37, 9 (September 1994), p. 109ff.
Hoffman, L. J. (ed.), Building in Big Brother, Springer-Verlag, New York, NY, 1995.
H. R. 4922, “Digital Telephony and Communications Privacy Improvement Act of 1994”, (reprinted in [Hoffman 1995]).
Landau, S., Kent, S., Brooks, C., Chantey, S., Denning, D., Diffie, W., Lauck, A., Miller, D., Neumann, P., Sobel, D., Codes, Keys, and Conflicts: Issues in U. S. Crypto Policy, June 1994. Available from Association for Computing Machinery, New York. Chapter on “Cryptography in Public: A Brief History” reprinted in [Hoffman 1995 ].
Levy, S., “The Cypherpunks vs. Uncle Sam”, The New York Times Magazine, June 12, 1994 (reprinted in [Hoffman 1995]).
Markoff, J., “Flaw Discovered in Federal Plan for Wiretapping”, The New York Times, June 2, 1994, page 1.
Micali, S., Fair Cryptosystems, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass., MIT/LCS/TR579.b, November 1993 (reprinted in [Hoffman 1995]).
Miller, H., REVISED: Zimmermann Defense Fund Appeal, Article 8319 of talk.politics.crypto, December 22, 1994.
National Bureau of Standards, “Data Encryption Standard”, FIPS PUB 46, Washington, D. C., January 1977.
National Institute of Standards and Technology, Opportunity to Join a Cooperative Research and Development Consortium to Develop Secure Software Encryption with Integrated Cryptographic Key Escrowing Techniques, Federal Register, Notices, vol. 58, no. 162, August 24, 1993.
National Institute of Standards and Technology, Escrowed Encryption Standard, Federal Information Processing Standards Publication 185, U. S. Department of Commerce, 1994.
National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standards Publication XX, May 19, 1994, Gaithersburg, Md. (reprinted in [Hoffman 1995]).
National Institute of Standards and Technology, Secure Hash Standard (SHS), Federal Information Processing Standards Publication 180, May 11, 1994, Gaithersburg, Md. (reprinted in [Hoffman 1995]).
Office of Technology Assessment, U. S. Congress, Information Security and Privacy in Network Environments, 1994.
Public Cryptography Study Group, 1981, Report of the Public Cryptography Study Group, American Council on Education, February 1981.
Rivest, R. L., “Cryptography” in J. van Leeuwen (ed.), Handbook of Theoretical Computer Science, MIT Press/Elsevier, Amsterdam, 1990.
Singh, M., “Key Escrowing: How It Really Works Today and Tomorrow”, Data Security Letter 54, November 1994, Trusted Information Systems, Inc., Glenwood, Md.
Software Publishers Association, Encryption Products Database Statistics, October 1994. Available from Trusted Information Systems, Inc., Glenwood, Md. and from http://www.seas.gwu.edu/seas/instctsp/cryptosurvey.html
von Solms, S. and Naccache, D.,“On Blind Signatures and Perfect Crimes”, Computers and Security 11, 6 (1992), Elsevier Science Publishers Ltd., (reprinted in [Hoffman 1995]).
Walker, S. T., “Testimony Before the United States Senate Committee on the Judiciary Subcommittee on Technology and the Law”, May 3, 1994, reprinted in [Hoffman 1995].
Walker, S. T., Lipner, S. B., Ellison, C. M., Branstad, D. K., Balenson, D. M., “Commercial Key Escrow: Something for Everyone Now and for the Future”, Trusted Information Systems, Inc., Glenwood, M.., January 3, 1995.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Hoffman, L.J. (1995). Encryption Policy for the Global Information Infrastructure. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive