Difference between revisions of "Encryption Outline"
From CSEP590TU
John.naegle (talk | contribs) |
|||
(2 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | == ''' | + | ==Intro== |
+ | * Similar to project description on front page | ||
+ | ==Background on Encryption== | ||
+ | * Lead: Josh | ||
+ | ===Basic encryption concepts=== | ||
+ | ===Terms and vocab used throughout the paper=== | ||
+ | ==Historical Incidents== | ||
+ | * Lead: Andrew | ||
+ | ===How has encryption been (mis)used in the past=== | ||
+ | ====''Room 40, Ultra, Magic, Venona, Diebold, Open Source''==== | ||
+ | ==Encryption Policy== | ||
+ | * Lead: Steven and John | ||
+ | ===Government regulations and policies=== | ||
+ | ====''Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987''==== | ||
− | + | ==Analysis== | |
− | + | ===Analysis of trends and how policy has played a role in encryption events=== | |
− | + | ==Conclusion== | |
− | + | * Concluding remarks and looking torward what should be done in the future. | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− |
Latest revision as of 19:34, 8 November 2004
Contents
Intro
- Similar to project description on front page
Background on Encryption
- Lead: Josh
Basic encryption concepts
Terms and vocab used throughout the paper
Historical Incidents
- Lead: Andrew
How has encryption been (mis)used in the past
Room 40, Ultra, Magic, Venona, Diebold, Open Source
Encryption Policy
- Lead: Steven and John
Government regulations and policies
Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
Analysis
Analysis of trends and how policy has played a role in encryption events
Conclusion
- Concluding remarks and looking torward what should be done in the future.