Encryption Outline

From CSEP590TU
Revision as of 07:51, 8 November 2004 by John.naegle (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Paper Outline

1.Intro

  • Similar to project description on front page
    2.Background on Encryption (Josh)
  • Basic encryption concepts
  • Terms and vocab used throughout the paper
    3.Historical Incidents (Andrew)
  • How has encryption been (mis)used in the past
      • Room 40, Ultra, Magic, Venona, Diebold, Open Source
  • 4.Encryption Policy (Steven, John)

  • Government regulations and policies
      • Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

    5.Analysis (All)

  • Analysis of trends and how policy has played a role in encryption events
    6.Conclusion
  • Concluding remarks and looking torward what should be done in the future.