Difference between revisions of "Encryption Outline"

From CSEP590TU
Jump to: navigation, search
(Encryption Policy)
 
Line 1: Line 1:
=Intro=
+
==Intro==
*Similar to project description on front page
+
* Similar to project description on front page
=Background on Encryption=
+
==Background on Encryption==
 
* Lead: Josh
 
* Lead: Josh
==Basic encryption concepts==
+
===Basic encryption concepts===
==Terms and vocab used throughout the paper==
+
===Terms and vocab used throughout the paper===
=Historical Incidents=
+
==Historical Incidents==
 
* Lead: Andrew
 
* Lead: Andrew
==How has encryption been (mis)used in the past==
+
===How has encryption been (mis)used in the past===
==Room 40, Ultra, Magic, Venona, Diebold, Open Source==
+
====''Room 40, Ultra, Magic, Venona, Diebold, Open Source''====
=Encryption Policy=
+
==Encryption Policy==
 
* Lead: Steven and John
 
* Lead: Steven and John
==Government regulations and policies==
+
===Government regulations and policies===
==Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987==
+
====''Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987''====
  
=Analysis=
+
==Analysis==
==Analysis of trends and how policy has played a role in encryption events==
+
===Analysis of trends and how policy has played a role in encryption events===
=Conclusion=
+
==Conclusion==
*Concluding remarks and looking torward what should be done in the future.
+
* Concluding remarks and looking torward what should be done in the future.

Latest revision as of 19:34, 8 November 2004

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Steven and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.