Difference between revisions of "Encryption Outline"
From CSEP590TU
John.naegle (talk | contribs) |
John.naegle (talk | contribs) |
||
Line 1: | Line 1: | ||
− | == | + | =Intro= |
− | + | *Similar to project description on front page | |
− | + | =Background on Encryption= | |
− | + | * Lead: Josh | |
− | + | ==Basic encryption concepts== | |
− | + | ==Terms and vocab used throughout the paper== | |
− | + | =Historical Incidents= | |
− | + | * Lead: Andrew | |
− | + | ==How has encryption been (mis)used in the past== | |
− | + | ==Room 40, Ultra, Magic, Venona, Diebold, Open Source== | |
− | + | =Encryption Policy= | |
− | + | * Lead: Stephan and John | |
− | + | ==Government regulations and policies== | |
− | + | ==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987== | |
− | + | =Analysis= | |
− | + | ==Analysis of trends and how policy has played a role in encryption events== | |
− | + | =Conclusion= | |
+ | *Concluding remarks and looking torward what should be done in the future. |
Revision as of 07:59, 8 November 2004
Contents
Intro
- Similar to project description on front page
Background on Encryption
- Lead: Josh
Basic encryption concepts
Terms and vocab used throughout the paper
Historical Incidents
- Lead: Andrew
How has encryption been (mis)used in the past
Room 40, Ultra, Magic, Venona, Diebold, Open Source
Encryption Policy
- Lead: Stephan and John
Government regulations and policies
Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
Analysis
Analysis of trends and how policy has played a role in encryption events
Conclusion
- Concluding remarks and looking torward what should be done in the future.