Skip to main content

Currently Skimming:

L - Other Looming Issues Related to Cryptography Policy
Pages 477-484

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 477...
... Today, interest in so-called digital cash is increasing. Digital cash is similar to paper cash in the sense that neither the paper on which paper 1This section draws heavily on Cross Industry Working Team, Electronic Cash, Tokens, and Payments in the National Information Infrastructure, Corporation for National Research Initiatives, 1895 Preston White Drive, Suite 100, Reston, Va., 1994; available on-line at info-xiwt@cnri.reston.va.us.
From page 478...
... Detection is essential to deter mine whether preventive measures are working. SOURCE: Adapted from Cross Industry Working Team, Electronic Cash, To kens, and Payments in the National Information Infrastructure, Corporation for National Research Initiatives, Reston, Va., 1994.
From page 479...
... Digital cash raises many basic questions. For example, if electronic cash is legal tender, who should be authorized to issue it and how should the public be assured that a particular issuing authority is legitimate?
From page 480...
... Law enforcement officials consider financial audit trails an essential crime-fighting tool; a digital cash system designed to support the highest levels of anonymity may put such tools at risk. The important policy issue for digital cash is the extent to which the anonymity possible with physical cash in face-to-face transactions should also be associated with electronic transactions.
From page 481...
... A man opened a bank account under the false name Kobayashi and ob tained a credit card drawing on the account. He kidnapped the baby of a famous actor and demanded that a 5 million yen ransom be deposited in the account.
From page 482...
... L.2 CRYPTOGRAPHY FOR PROTECTING INTELLECTUAL PROPERTY Much of the interest in a global information infrastructure comes from the prospect of transporting digitized information objects over communications lines without the need for transport of physical matter. At the same time, concerns are raised about the fact that digital information objects can be retransmitted in the same way by the receiving party.
From page 483...
... Encryption technology is vital because it gives copyright owners an additional degree of protection against misappropriation.4 Using cryptography to protect intellectual property raises questions related to the strength of algorithms used to encrypt and decrypt digital objects. Specifically, the use of weak cryptography to protect exported digital objects could well result in considerable financial damage to the original creators of intellectual property.5 If it proves reasonable to protect intellectual property through encryption, pressures may well grow to allow stronger cryptography to be deployed worldwide so that creators of intellectual property can market their products safely and without fear of significant financial loss.
From page 484...
... For example, a digital watermark might embed information into a digital representation of a photograph in such a way that it did not affect the visual presentation of the photograph; nevertheless, if the photograph were copied and distributed, all subsequent copies would have that hidden information in them.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.