| overview 
 perspectives
 
 frameworks
 
 agencies
 
 CII
 
 desktops
 
 criminals
 
 messaging
 
 vandalism
 
 fraud
 
 authentication
 
 anonymity
 
 pseudonymity
 
 malware
 
 crypto
 
 geolocation
 
 economics
 
 insurance
 
 kids
 
 s-business
 
 appraisal
 
 self-help
 
 forensics
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  related
 Guides:
 
 Governance
 
 Information
 Economy
 
 Consumers
 & Trust
 
 Privacy
 
 
 
  related
 Profiles:
 
 e-Signatures
 
 Identity
 Theft
 
 Forgery &
 Forensics
 
 Surveillance
 
 Wassenaar
 |  crypto 
 This page considers cryptography.
 
 It covers -
  introduction 
 Encryption of information, whether by government or by 
                        business and individuals, is a key technology for preserving 
                        security online and accordingly the centre of debate about 
                        policy, legislation and specific technical standards or 
                        mechanisms.
 
 That debate reflects tensions that encompass -
 
                        perceptions 
                          that there is a significant untapped consumer and business 
                          market for encryption products of varying degrees of 
                          sophisticationsupport 
                          by some government agencies for growth of a local encryption 
                          industry concerns 
                          within other government agencies about access by criminals 
                          (inc tax evaders, terrorists, drug traffickers) to encryption 
                          products anxiety 
                          among some citizens that they are under surveillance 
                          by their governmentanxiety 
                          among governments that their information and communication 
                          is being illicitly captured by other governments, organisations 
                          or individualsconcerns 
                          among connectivity providers such as ISPs and phone 
                          companies that they will be expected to monitor and 
                          even decrypt communicationsfears 
                          among some businesses and other organisations that their 
                          communications are being exploited by competitors (including 
                          information provided to competitors by governments other 
                          than their own). Those 
                        tensions can broadly be characterised as disagreement 
                        about the 'ownership' of information: protecting mine, 
                        being free to see yours.
 The technical nature of the debate (and the vehemence 
                        of some protagonists) has overshadowed the diffusion of 
                        encryption throughout the information economy, in particular 
                        its use in many online payment systems and in e-government.
 
 
  background 
 Mechanisms for protecting information through encryption 
                        date from the beginning of recorded history, as explored 
                        in works such as David 
                        Kahn's classic  The Code Breakers (London: Weidenfeld 
                        & Nicolson 1967).
 
 Encryption has attracted particular attention over the 
                        past century because of perceptions that information can 
                        offer a fundamental strategic or tactical advantage, because 
                        electronic communication networks (from the telegraph 
                        onwards) facilitate the rapid transfer and collection 
                        of large amounts of information, and because technologies 
                        such the personal computer have made it significantly 
                        easier to encrypt and decrypt electronic information.
 
 Making sense of developments can often seem like wandering 
                        in a wilderness of mirrors, given polemic by advocates 
                        for different positions, uncertainty about claims made 
                        by government agencies and the difficulty of assessing 
                        balances between competing claims. Intelligence bodies 
                        are necessarily economical with the truth; law enforcement 
                        bodies seek statutory powers and resources to circumvent 
                        protection used by enemies of the state ... or potential 
                        enemies.
 
 In the US argument continues about government restrictions 
                        on the domestic use and export of 'strong' cryptography, 
                        uniting the libertarian left and right with software/hardware 
                        manufacturers.
 
 Examples of that alliance are the Americans for Computer 
                        Privacy (ACP) 
                        - a commercial lobby group - and the Global Internet Liberty 
                        Campaign (GILC).
 
 An example of fears is Brad Templeton's 2002 comment
  
                        Let 
                          me put on my EFF hat and say that in fact government 
                          regulation has been the biggest barrier to getting security 
                          deployed in the market. Some forces in the government 
                          are afriad of good security in computers, and so acted 
                          (with remarkable success) to regulate encryption and 
                          stop it from getting deployed in consumer products. 
                           The 
                        Washington-based Electronic Privacy Information Centre 
                        (EPIC) 
                        has recently released its comprehensive annual global 
                        survey 
                        of cryptography policy.  Locally, Electronic Frontiers 
                        Australia has published the suppressed 1996 Commonwealth 
                        government Walsh 
                        Report on encryption policy.
 The Certification Authority for the German Research Network 
                        has an outstanding 8 page list 
                        of Public Key Infrastructure links, along with pointers 
                        to SSL, SET, MIME and other security tools. In Australia 
                        the Government Public Key Authority (GPKA), 
                        established in 1999, deals with government aspects of 
                        PKA.
 
 For a succinct introduction to PKA we recommend the 1999 
                        article 
                        by Jessica Polito on A Primer on Public-Key Cryptography.
 
 In 1996 the US National Research Council produced an excellent 
                        report 
                        on Cryptography's Role in Securing the Information 
                        Society.
 
 For a global perspective on government approaches we recommend 
                        the 1997 OECD Cryptography Policy Guidelines & 
                        Background Report (CPG). 
                        The Limits of Trust: Cryptography, Governments & 
                        Electronic Commerce (Hague: Kluwer 1998) by Stewart 
                        Baker & Paul Hurst offers a contentious assessment 
                        of issues and approaches.
 
 Bert-Jaap Koops offers more temperate views in ICT 
                        Law & Internationalisation: A Survey of Government 
                        Views (Hague: Kluwer 2000), complementing his The 
                        Crypto Controversy: A Key Conflict in the Information 
                        Society  (Hague: Kluwer 1998).
 
 
  export controls and domestic regulation 
 A global framework for restrictions on the export of 'strong 
                        cryptography' products is provided by the Wassenaar Arrangement 
                        and associated national legislation, discussed in a detailed 
                        note elsewhere on this 
                        site.
 
 Simo-Pekka Parvaiainen's masters thesis 
                        on Cryptographic Software Export Controls in the EU 
                        describes the EU export regime.
 
 
  reading 
 David Kahn's  The Code Breakers (London: Weidenfeld 
                        & Nicolson 1967, rev ed 1990) remains a valuable introduction 
                        to the nature and history of cryptography and cryptology.
 
 It has not been superseded by the more recent The Code 
                        Book (New York: Doubleday 1999) by Simon Singh. Cautions 
                        are provided in Rebecca Ratcliff's superb Delusions 
                        of Intelligence: Enigma, Ultra, and the End of Secure 
                        Ciphers (Cambridge: Cambridge Uni Press 2006), exploring 
                        how crypto is used and misused.
 
 For those seeking more detailed information about the 
                        mechanics of encryption we recommend Bruce Schneier's 
                        Applied Cryptography: Protocols, Algorithms and Source 
                        Code in C (New York: Wiley 1995). Schneier's new Secrets 
                        & Lies: Digital Security In A Networked World 
                        (New York: Wiley 2000) offers a more panoramic but equally 
                        insightful view of network security: issues, mechanisms, 
                        risk assessment.
 
 It is particularly valuable because of its holistic approach, 
                        avoiding reliance on isolated technological fixes such 
                        as PGP.
 
 Schneier and David Banisar co-edited The Electronic 
                        Privacy Papers (New York: Wiley 1997), a unique compilation 
                        of key US government and private sector documents about 
                        encryption, privacy policy, law enforcement and other 
                        matters.
 
 Cryptographic abundance 
                        and pervasive computing   (CAPC) 
                        is a provocative paper by AT&T scientist Andrew Odlyzko, 
                        one of the more perceptive writers about online information 
                        pricing.
 
 Information about encryption standards and the policy 
                        debate will be added shortly.
 
 Michael Froomkin's paper 
                        It Came From Planet Clipper: The Battle Over Cryptographic 
                        Key 'Escrow' and paper 
                        on The Metaphor Is the Key: Cryptography, The Clipper 
                        Chip & the Constitution are stimulating, although 
                        we regard Dorothy Denning and Schneier as more convincing.
 
 
  encryption and privacy 
 Pointers to encryption as a tool for privacy (eg use 
                        of PGP) are supplied in our Privacy 
                        guide.
 
 
  and 
                        e-commerce 
 [under development]
 
 
 
 
  next 
                        page  (authentication) 
 
 
 | 
                        
                       |