Difference between revisions of "Encryption Outline"
From CSEP590TU
(→Encryption Policy) |
|||
Line 1: | Line 1: | ||
− | =Intro= | + | ==Intro== |
− | *Similar to project description on front page | + | * Similar to project description on front page |
− | =Background on Encryption= | + | ==Background on Encryption== |
* Lead: Josh | * Lead: Josh | ||
− | ==Basic encryption concepts== | + | ===Basic encryption concepts=== |
− | ==Terms and vocab used throughout the paper== | + | ===Terms and vocab used throughout the paper=== |
− | =Historical Incidents= | + | ==Historical Incidents== |
* Lead: Andrew | * Lead: Andrew | ||
− | ==How has encryption been (mis)used in the past== | + | ===How has encryption been (mis)used in the past=== |
− | ==Room 40, Ultra, Magic, Venona, Diebold, Open Source== | + | ====''Room 40, Ultra, Magic, Venona, Diebold, Open Source''==== |
− | =Encryption Policy= | + | ==Encryption Policy== |
* Lead: Steven and John | * Lead: Steven and John | ||
− | ==Government regulations and policies== | + | ===Government regulations and policies=== |
− | ==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987== | + | ====''Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987''==== |
− | =Analysis= | + | ==Analysis== |
− | ==Analysis of trends and how policy has played a role in encryption events== | + | ===Analysis of trends and how policy has played a role in encryption events=== |
− | =Conclusion= | + | ==Conclusion== |
− | *Concluding remarks and looking torward what should be done in the future. | + | * Concluding remarks and looking torward what should be done in the future. |
Latest revision as of 19:34, 8 November 2004
Contents
Intro
- Similar to project description on front page
Background on Encryption
- Lead: Josh
Basic encryption concepts
Terms and vocab used throughout the paper
Historical Incidents
- Lead: Andrew
How has encryption been (mis)used in the past
Room 40, Ultra, Magic, Venona, Diebold, Open Source
Encryption Policy
- Lead: Steven and John
Government regulations and policies
Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
Analysis
Analysis of trends and how policy has played a role in encryption events
Conclusion
- Concluding remarks and looking torward what should be done in the future.