Encryption Outline

From CSEP590TU
Revision as of 19:34, 8 November 2004 by Jopos (talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

Intro

  • Similar to project description on front page

Background on Encryption

  • Lead: Josh

Basic encryption concepts

Terms and vocab used throughout the paper

Historical Incidents

  • Lead: Andrew

How has encryption been (mis)used in the past

Room 40, Ultra, Magic, Venona, Diebold, Open Source

Encryption Policy

  • Lead: Steven and John

Government regulations and policies

Export Regulations, Key Escrow/Recovery, Computer Security Act of 1987

Analysis

Analysis of trends and how policy has played a role in encryption events

Conclusion

  • Concluding remarks and looking torward what should be done in the future.