Difference between revisions of "Encryption Outline"

From CSEP590TU
Jump to: navigation, search
(Encryption Policy)
Line 10: Line 10:
 
==Room 40, Ultra, Magic, Venona, Diebold, Open Source==
 
==Room 40, Ultra, Magic, Venona, Diebold, Open Source==
 
=Encryption Policy=
 
=Encryption Policy=
* Lead: Stephan and John
+
* Lead: Steven and John
 
==Government regulations and policies==
 
==Government regulations and policies==
 
==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987==
 
==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987==
 +
 
=Analysis=
 
=Analysis=
 
==Analysis of trends and how policy has played a role in encryption events==
 
==Analysis of trends and how policy has played a role in encryption events==
 
=Conclusion=
 
=Conclusion=
 
*Concluding remarks and looking torward what should be done in the future.
 
*Concluding remarks and looking torward what should be done in the future.

Revision as of 08:16, 8 November 2004

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Steven and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.