Encryption Archive
Files in this archive
- Civil Liberties Groups Say New Encryption Export Regulations Still Have Serious Constitutional Deficiencies (January 13, 2000)
- Latest Governmental Encryption Scheme Still Unconstitutional (September 16, 1999)
- 19990421_leahy_electr_rghts.bill
This is a bill introduced by Senator
Leahy some sections of which were eventually incorporated in other
bills and in the FCC implementation order relevant to CALEA. This
bill was read twice on the floor and referred to committee and never
was voted on in this form. The titles were:
Title I: Privacy Protection for Communications and Electronic
Information
Title II: Promoting Use of Encryption
Title III: Privacy Protection for Library Loan and Book Sale Records
Title IV: Privacy Protection for Satellite Home Viewers
- cpsr_brooks.letter
File containing August 1992 text of a letter
Computer Professionals for Social Responsibility (CPSR) recently sent to
Rep. Jack Brooks, chairman of the House Judiciary Committee. The letter
raises several issues concerning computer security and cryptography
policy.
- crypto_mail_liability.article
Mike Riddle's November 1993 article
"Sysop Liability for Enroute (and/or Encrypted) Mail."
- crypt_wired.articles
File containing cryptography-related articles from
'WIRED Online' gathered in January of 1994. (Republished by permission)
- crypto.faq
File containing February 1994 faq regarding cryptography and
related issues compiled by The Crypto Cabal.
- crypto.intro
File containing "An Introduction to the Use of
Encryption" (revised April 1994) an article written by Peter Meyer of
Dolphin Software, providing information in the area of practical
cryptography of interest to anyone wishing to use cryptographic
software. Written for the layperson.
- nist_nsa_collusion.article
cpsr article warning that the nsa has
influenced NIST policy against the wishes of
congress through the Computer Security Act of
1987
- ota_priv_sec.report
OTA's September 1994 report focusing on safeguarding
unclassified information in networks, not on the security or
survivability of networks themselves, or on the reliability of network
services to ensure information access. OTA's analysis examines policy
issues in three 1) cryptography policy, including federal information
processing standards and export controls; 2) guidance on safeguarding
unclassified information in federal agencies; and 3) legal
issues and information security, including electronic commerce, privacy,
and intellectual property.
- ota_priv_sec_report.summary
September 1994 summary of the report named
ota_priv_sec.report in this directory.
- privacy_szabo.paper
Nick Szabo's April 1993 pamphlet regarding how to
protect your electronic privacy dealing with personal privacy
packages, such as PGP.
- sci_am_crypt.article
Feb 1993 Scientific American article "Electronic
Envelopes" regarding RSA,PEM, PGP, etc....
Subdirectories in This Archive
- Crypto_export/
Directory pertaining to US International Traffic in Arms
Regulations (ITAR) and their unconsitutional export restrictions on
encryption. Also covered are the Export Administration Regulations
(EAR), the successor to ITAR, as well as the AECA (Arms Export Control
Act), the legislation enabling ITAR and EAR.
- Crypto_misc/
Directory containing files and directories related
to cryptography, cryptology, code breaking, ciphers and encryption
(much of this is technical in nature).
- Digital_money/
Directory pertaining to electronic monetary and credit
transactions - "online commerce", e-cash, etc. - and the inherent privacy
and security concerns that arise with these developments.
- Digital_signature/
Directory pertaining to the US Digital Signature
Standard (DSS), and other cryptographic authentication technology.
- Gilmore_v_NSA/
Directory pertaining to the Gilmore case, a case involving
NSA refusal of a Freedom of Information Act (FOIA) request for treatises on
cryptanalysis.
- Key_escrow/
directory of files on governmental encryption key "escrow",
in which copies of all users' encryption keys are held by governments or
"trusted third parties" for the convenience of law enforcement and
intelligence agencies. This issue ties in directly with ITAR crypto
export policy (see http://www.eff.org/pub/Privacy/ITAR_export/).
- Security/
Directory pertaining to computer security (and cracking).
Material more specifically about user privacy and cryptographic system
protection are located in other Privacy subdirectories.
Links to Related Off-Site Resources