Encryption Outline

From CSEP590TU
Jump to: navigation, search

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Steven and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.