Difference between revisions of "Encryption Outline"

From CSEP590TU
Jump to: navigation, search
 
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
== '''Paper Outline''' ==
+
==Intro==
 +
* Similar to project description on front page
 +
==Background on Encryption==
 +
* Lead: Josh
 +
===Basic encryption concepts===
 +
===Terms and vocab used throughout the paper===
 +
==Historical Incidents==
 +
* Lead: Andrew
 +
===How has encryption been (mis)used in the past===
 +
====''Room 40, Ultra, Magic, Venona, Diebold, Open Source''====
 +
==Encryption Policy==
 +
* Lead: Steven and John
 +
===Government regulations and policies===
 +
====''Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987''====
  
<B>1.Intro</B><br>
+
==Analysis==
<li><I>Similar to project description on front page</I><br>
+
===Analysis of trends and how policy has played a role in encryption events===
<B>2.Background on Encryption (Josh)</B><br>
+
==Conclusion==
<li><I>Basic encryption concepts<br>
+
* Concluding remarks and looking torward what should be done in the future.
<li>Terms and vocab used throughout the paper</I><br>
 
<B>3.Historical Incidents (Andrew)</B><br>
 
<li><I>How has encryption been (mis)used in the past</I><br>
 
<ul><ul><li><I>Room 40, Ultra, Magic, Venona, Diebold, Open Source</I></ul></ul></li>
 
<B>4.Encryption Policy (Steven, John)</B><br>
 
<li><I>Government regulations and policies</I><br>
 
<ul><ul><li><I>Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987</I></ul></ul>
 
<B>5.Analysis (All)</B><br>
 
<li><I>Analysis of trends and how policy has played a role in encryption events</I><br>
 
<B>6.Conclusion</B><br>
 
<li><I> Concluding remarks and looking torward what should be done in the future.</I><br>
 

Latest revision as of 19:34, 8 November 2004

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Steven and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.