For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct.
Note
Electronic updates of this book may be found at : http://www.steptoe.com/crypto.nsf;. For the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct.
Formatted Contents Note
Ch. 1. Introducing Confidentiality and Authentication Pt. I. Confidentiality. Ch. 2. Overview of the United States Policy Debate. Ch. 3. United States' Policy Towards The Export of Cryptography. Ch. 4. International Initiatives Addressing Cryptography. Ch. 5. Country-By-Country Guide to Encryption Regulation Essay: Australian Cryptography Policy 1998 / William J. (Bill) Caelli Essay: The New French Encryption Regulations / Bertrand Warusfel Essay: Cryptography Regulation in Germany / Christopher Kuner Israel: Cryptography Law and Policy / Ori Rosen Essay: Japanese Cryptography Policy / Noriaki Hashimoto Essay: Cryptography Policy The United Kingdom Perspective / Henry Beker and Chris Amery Pt. II. Authentication. Ch. 6. Authentication, Cryptography, and Digital Signatures. Ch. 7. Digital Signatures An Overview of the Legal Issues. Ch. 8. Consequences of the Current Legislative Approaches. Ch. 9. International Guide to Digital Signature Regulation.