Difference between revisions of "Encryption Outline"

From CSEP590TU
Jump to: navigation, search
 
Line 1: Line 1:
== '''Paper Outline''' ==
+
=Intro=
 
+
*Similar to project description on front page
<B>1.Intro</B><br>
+
=Background on Encryption=
<li><I>Similar to project description on front page</I><br>
+
* Lead: Josh
<B>2.Background on Encryption (Josh)</B><br>
+
==Basic encryption concepts==
<li><I>Basic encryption concepts<br>
+
==Terms and vocab used throughout the paper==
<li>Terms and vocab used throughout the paper</I><br>
+
=Historical Incidents=
<B>3.Historical Incidents (Andrew)</B><br>
+
* Lead: Andrew
<li><I>How has encryption been (mis)used in the past</I><br>
+
==How has encryption been (mis)used in the past==
<ul><ul><li><I>Room 40, Ultra, Magic, Venona, Diebold, Open Source</I></ul></ul></li>
+
==Room 40, Ultra, Magic, Venona, Diebold, Open Source==
<B>4.Encryption Policy (Steven, John)</B><br>
+
=Encryption Policy=
<li><I>Government regulations and policies</I><br>
+
* Lead: Stephan and John
<ul><ul><li><I>Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987</I></ul></ul>
+
==Government regulations and policies==
<B>5.Analysis (All)</B><br>
+
==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987==
<li><I>Analysis of trends and how policy has played a role in encryption events</I><br>
+
=Analysis=
<B>6.Conclusion</B><br>
+
==Analysis of trends and how policy has played a role in encryption events==
<li><I> Concluding remarks and looking torward what should be done in the future.</I><br>
+
=Conclusion=
 +
*Concluding remarks and looking torward what should be done in the future.

Revision as of 07:59, 8 November 2004

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Stephan and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.