Encryption Outline
From CSEP590TU
Revision as of 07:51, 8 November 2004 by John.naegle (talk | contribs)
Paper Outline
1.Intro
2.Background on Encryption (Josh)
3.Historical Incidents (Andrew)
- Room 40, Ultra, Magic, Venona, Diebold, Open Source
4.Encryption Policy (Steven, John)
- Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987
5.Analysis (All)
6.Conclusion