overview 
                       
                      perspectives 
                       
                      frameworks 
                       
                      agencies 
                       
                      CII 
                       
                      desktops 
                       
                      criminals 
                       
                      messaging 
                       
                      vandalism 
                       
                      fraud 
                       
                      authentication 
                       
                      anonymity 
                       
                      pseudonymity 
                       
                      malware 
                       
                      crypto  
                       
                      geolocation 
                       
                      economics 
                       
                      insurance 
                       
                      kids 
                       
                      s-business 
                       
                      appraisal 
                       
                      self-help 
                       
                      forensics 
                       
                       
                       
                       
                       
                       
                       
                       
                       
                       
                       
                       
                       
                        
                      related  
                      Guides: 
                       
                      Governance 
                       
                      Information 
                      Economy  
                       
                      Consumers 
                      & Trust  
                       
                      Privacy 
                       
                       
                        
                      related  
                      Profiles: 
                       
                      e-Signatures 
                       
                       
                       
                      Identity  
                      Theft 
                       
                      Forgery & 
                      Forensics 
                       
                      Surveillance 
                       
                       
                      Wassenaar  | 
                            
                        crypto 
                         
                        This page considers cryptography. 
                         
                        It covers - 
                      
                            
                        introduction 
                         
                        Encryption of information, whether by government or by 
                        business and individuals, is a key technology for preserving 
                        security online and accordingly the centre of debate about 
                        policy, legislation and specific technical standards or 
                        mechanisms. 
                         
                        That debate reflects tensions that encompass - 
                      
                        - perceptions 
                          that there is a significant untapped consumer and business 
                          market for encryption products of varying degrees of 
                          sophistication
 
                        - support 
                          by some government agencies for growth of a local encryption 
                          industry 
 
                        - concerns 
                          within other government agencies about access by criminals 
                          (inc tax evaders, terrorists, drug traffickers) to encryption 
                          products 
 
                        - anxiety 
                          among some citizens that they are under surveillance 
                          by their government
 
                        - anxiety 
                          among governments that their information and communication 
                          is being illicitly captured by other governments, organisations 
                          or individuals
 
                        - concerns 
                          among connectivity providers such as ISPs and phone 
                          companies that they will be expected to monitor and 
                          even decrypt communications
 
                        - fears 
                          among some businesses and other organisations that their 
                          communications are being exploited by competitors (including 
                          information provided to competitors by governments other 
                          than their own).
 
                       
                      Those 
                        tensions can broadly be characterised as disagreement 
                        about the 'ownership' of information: protecting mine, 
                        being free to see yours. 
                         
                        The technical nature of the debate (and the vehemence 
                        of some protagonists) has overshadowed the diffusion of 
                        encryption throughout the information economy, in particular 
                        its use in many online payment systems and in e-government. 
                         
                              
                        background 
                         
                        Mechanisms for protecting information through encryption 
                        date from the beginning of recorded history, as explored 
                        in works such as David 
                        Kahn's classic  The Code Breakers (London: Weidenfeld 
                        & Nicolson 1967).  
                         
                        Encryption has attracted particular attention over the 
                        past century because of perceptions that information can 
                        offer a fundamental strategic or tactical advantage, because 
                        electronic communication networks (from the telegraph 
                        onwards) facilitate the rapid transfer and collection 
                        of large amounts of information, and because technologies 
                        such the personal computer have made it significantly 
                        easier to encrypt and decrypt electronic information. 
                         
                         
                        Making sense of developments can often seem like wandering 
                        in a wilderness of mirrors, given polemic by advocates 
                        for different positions, uncertainty about claims made 
                        by government agencies and the difficulty of assessing 
                        balances between competing claims. Intelligence bodies 
                        are necessarily economical with the truth; law enforcement 
                        bodies seek statutory powers and resources to circumvent 
                        protection used by enemies of the state ... or potential 
                        enemies.  
                         
                        In the US argument continues about government restrictions 
                        on the domestic use and export of 'strong' cryptography, 
                        uniting the libertarian left and right with software/hardware 
                        manufacturers.  
                         
                        Examples of that alliance are the Americans for Computer 
                        Privacy (ACP) 
                        - a commercial lobby group - and the Global Internet Liberty 
                        Campaign (GILC). 
                         
                        An example of fears is Brad Templeton's 2002 comment 
                         
                       
                        Let 
                          me put on my EFF hat and say that in fact government 
                          regulation has been the biggest barrier to getting security 
                          deployed in the market. Some forces in the government 
                          are afriad of good security in computers, and so acted 
                          (with remarkable success) to regulate encryption and 
                          stop it from getting deployed in consumer products. 
                           
                       
                      The 
                        Washington-based Electronic Privacy Information Centre 
                        (EPIC) 
                        has recently released its comprehensive annual global 
                        survey 
                        of cryptography policy.  Locally, Electronic Frontiers 
                        Australia has published the suppressed 1996 Commonwealth 
                        government Walsh 
                        Report on encryption policy. 
                         
                        The Certification Authority for the German Research Network 
                        has an outstanding 8 page list 
                        of Public Key Infrastructure links, along with pointers 
                        to SSL, SET, MIME and other security tools. In Australia 
                        the Government Public Key Authority (GPKA), 
                        established in 1999, deals with government aspects of 
                        PKA.  
                         
                        For a succinct introduction to PKA we recommend the 1999 
                        article 
                        by Jessica Polito on A Primer on Public-Key Cryptography. 
                         
                        In 1996 the US National Research Council produced an excellent 
                        report 
                        on Cryptography's Role in Securing the Information 
                        Society.  
                         
                        For a global perspective on government approaches we recommend 
                        the 1997 OECD Cryptography Policy Guidelines & 
                        Background Report (CPG). 
                        The Limits of Trust: Cryptography, Governments & 
                        Electronic Commerce (Hague: Kluwer 1998) by Stewart 
                        Baker & Paul Hurst offers a contentious assessment 
                        of issues and approaches.  
                         
                        Bert-Jaap Koops offers more temperate views in ICT 
                        Law & Internationalisation: A Survey of Government 
                        Views (Hague: Kluwer 2000), complementing his The 
                        Crypto Controversy: A Key Conflict in the Information 
                        Society  (Hague: Kluwer 1998). 
                         
                              
                        export controls and domestic regulation 
                         
                        A global framework for restrictions on the export of 'strong 
                        cryptography' products is provided by the Wassenaar Arrangement 
                        and associated national legislation, discussed in a detailed 
                        note elsewhere on this 
                        site. 
                         
                        Simo-Pekka Parvaiainen's masters thesis 
                        on Cryptographic Software Export Controls in the EU 
                        describes the EU export regime.  
                         
                              
                        reading 
                         
                        David Kahn's  The Code Breakers (London: Weidenfeld 
                        & Nicolson 1967, rev ed 1990) remains a valuable introduction 
                        to the nature and history of cryptography and cryptology.  
                         
                        It has not been superseded by the more recent The Code 
                        Book (New York: Doubleday 1999) by Simon Singh. Cautions 
                        are provided in Rebecca Ratcliff's superb Delusions 
                        of Intelligence: Enigma, Ultra, and the End of Secure 
                        Ciphers (Cambridge: Cambridge Uni Press 2006), exploring 
                        how crypto is used and misused.   
                         
                        For those seeking more detailed information about the 
                        mechanics of encryption we recommend Bruce Schneier's 
                        Applied Cryptography: Protocols, Algorithms and Source 
                        Code in C (New York: Wiley 1995). Schneier's new Secrets 
                        & Lies: Digital Security In A Networked World 
                        (New York: Wiley 2000) offers a more panoramic but equally 
                        insightful view of network security: issues, mechanisms, 
                        risk assessment.  
                         
                        It is particularly valuable because of its holistic approach, 
                        avoiding reliance on isolated technological fixes such 
                        as PGP.  
                         
                        Schneier and David Banisar co-edited The Electronic 
                        Privacy Papers (New York: Wiley 1997), a unique compilation 
                        of key US government and private sector documents about 
                        encryption, privacy policy, law enforcement and other 
                        matters.  
                         
                          Cryptographic abundance 
                        and pervasive computing   (CAPC) 
                        is a provocative paper by AT&T scientist Andrew Odlyzko, 
                        one of the more perceptive writers about online information 
                        pricing. 
                         
                        Information about encryption standards and the policy 
                        debate will be added shortly. 
                         
                        Michael Froomkin's paper 
                        It Came From Planet Clipper: The Battle Over Cryptographic 
                        Key 'Escrow' and paper 
                        on The Metaphor Is the Key: Cryptography, The Clipper 
                        Chip & the Constitution are stimulating, although 
                        we regard Dorothy Denning and Schneier as more convincing. 
                         
                               
                        encryption and privacy 
                         
                        Pointers to encryption as a tool for privacy (eg use 
                        of PGP) are supplied in our Privacy 
                        guide.  
                         
                              
                        and 
                        e-commerce 
                         
                        [under development] 
                         
                         
                         
                            
                          next 
                        page  (authentication)   
                         
                         
                           | 
                      
                        
                       
                        |