Encryption Outline
From CSEP590TU
Contents
Intro
- Similar to project description on front page
Background on Encryption
- Lead: Josh
Basic encryption concepts
Terms and vocab used throughout the paper
Historical Incidents
- Lead: Andrew
How has encryption been (mis)used in the past
Room 40, Ultra, Magic, Venona, Diebold, Open Source
Encryption Policy
- Lead: Steven and John
Government regulations and policies
Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
Analysis
Analysis of trends and how policy has played a role in encryption events
Conclusion
- Concluding remarks and looking torward what should be done in the future.