Difference between revisions of "Encryption Outline"
From CSEP590TU
John.naegle (talk | contribs) |
(→Encryption Policy) |
||
Line 10: | Line 10: | ||
==Room 40, Ultra, Magic, Venona, Diebold, Open Source== | ==Room 40, Ultra, Magic, Venona, Diebold, Open Source== | ||
=Encryption Policy= | =Encryption Policy= | ||
− | * Lead: | + | * Lead: Steven and John |
==Government regulations and policies== | ==Government regulations and policies== | ||
==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987== | ==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987== | ||
+ | |||
=Analysis= | =Analysis= | ||
==Analysis of trends and how policy has played a role in encryption events== | ==Analysis of trends and how policy has played a role in encryption events== | ||
=Conclusion= | =Conclusion= | ||
*Concluding remarks and looking torward what should be done in the future. | *Concluding remarks and looking torward what should be done in the future. |
Revision as of 08:16, 8 November 2004
Contents
Intro
- Similar to project description on front page
Background on Encryption
- Lead: Josh
Basic encryption concepts
Terms and vocab used throughout the paper
Historical Incidents
- Lead: Andrew
How has encryption been (mis)used in the past
Room 40, Ultra, Magic, Venona, Diebold, Open Source
Encryption Policy
- Lead: Steven and John
Government regulations and policies
Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
Analysis
Analysis of trends and how policy has played a role in encryption events
Conclusion
- Concluding remarks and looking torward what should be done in the future.