Regulatory Environment Surrounding Encryption

| October 25, 2018

Governments all over the world, including the U.S. government, have concerns about the use of encryption. This concern manifests itself in a range of regulatory challenges to the technology that limit or restrict its use. The concerns, and therefore the regulations, differ from nation to nation. One example of this comes from the early years of encryption in the United States. Diffie-Hellman and the guys at RSA came up with the mathematical foundations for today’s symmetric encryption solutions in the late 1970s. The NSA tried to block this research from being published because they felt it was a threat to their oversight of security matters. In the meantime, the barriers to research and the patent laws that favored offshore development caused a number of researchers in foreign countries to put their attention to potential technologies. Among those were PGP, or pretty good privacy. By the early 1990s the United States Congress, at the behest of the NSA and other intelligence agencies, were casting about for regulations that could restrict the impact of encryption, including a requirement that anyone manufacturing an encryption-based technology create a backdoor into their solutions or engage in ‘key escrow’ where the keys to an encryption algorithm would be held by a neutral third party. This controversy and the reaction to it is comparable to the more recent fight over the SOPA (Stop Online Piracy Act) rules, over which Internet providers and users pushed back at Congress.Use the study materials and engage in any additional research needed to fill in knowledge gaps. Discuss the following:

  • Explain how society can balance the need to be able to investigate wrongdoing with the important and beneficial aspects of encryption as a security tool.
  • Evaluate the legal/regulatory impact for a multinational organization doing business in China, India, Ireland, and the United States that would like to implement IPSec as a component of a move to IPv6.
  • Describe the major differences between symmetric and asymmetric encryption technologies.

Must be 400 words

Get a 5 % discount on an order above $ 150
Use the following coupon code :
2018DISC
Leadership and Management Characteristics Paper
Criminal Justice Assignment

Category: Completed Assignments

Our Services:
Order a customized paper today!