Skip to main content

Currently Skimming:

Index
Pages 677-688

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 677...
... , 633–636 brute-force search, 62–63, 124, 276, 287, AECA, see Arms Export Control Act (AECA) 381 Algorithm, 378 chosen plaintext, 381–382 and key length, 353 ciphertext only, 287, 381 America Online, 42–43n, 148 exploitation of design factors, 60–62 American National Standards Institute exploitation of operational errors, 383 (ANSI)
From page 678...
... Authorization, 354, 368n Ciphertext, 172n, 355, 374 Availability, 354 Circumventing laws against unescrowed encryption, 269, 330 Civil liberties, viii, 44n, 44–46 B Civiletti, Benjamin R., 344–345 CJ, see Commodity jurisdiction (CJ) Back door Cleartext, 355 access, 56 Clinton, President William, 95, 100 defined, 354 Clinton Administration, 41, 170, 235, 265– hidden, 201–201n, 203, 277 266, 303, 376 open, 276–277 Clipper see also Escrowed encryption chip, xii, 171–174, 230, 355 Banking and finance services, vii, 23, 35– initiative, 356, 376, 445n 36n, 57, 123, 179, 312, 455–458, see also Escrowed Encryption Standard 470; see also Credit cards; Digital (EES)
From page 679...
... nations, in information security products, 65–66, 231, 251n, 310, 356, 434–436, 442, 476 639 foreign, 132–133 Cordless phones, 218, 398n market for, xii, 66–72, 135–136, 145–152, Countermeasure, 356 310 Credit cards, 22, 76, 481 for nonrepudiation, 55 Crime prevention, xv, 10, 47, 323, 472–473, as one element of information security, 480 10, 296, 298 Criminalizing use regulations relevant to (text of) , 637–677 of cryptography for criminal purposes, strength of, 63, 152–153, 250 12, 94, 273–274, 332–333 see also Encryption of unescrowed cryptography, 192, 265– Cryptography policy, 16 273 adopting standards, 7, 222, 290, 316 Crook, Colin, 345 committee recommendations on, viii– Cryptanalysis, 62, 379n, 380n xvii, 1, 5–13, 303–339 of 40-bit encryption algorithms, 8n, 63, current U.S.
From page 680...
... , 176, 222– compression, 270–270n, 304 223, 225n, 229–230, 259, 301, 357, integrity, 365–367, 374 418, 488 Data Encryption Standard (DES) , 72, 207, Digital Telephony Act, 357; see also 223, 228–232, 288, 314–318, 334, Communications Assistance for 357, 365, 388–389, 417–420 Law Enforcement Act (CALEA)
From page 681...
... , 444–447, 452 115, 415–416 trustworthiness of, 190 Part 779, Technical Data (text of) , 656– binding, 210–211, 215 677 Escrowable encryption products, 182, 262 Export controls, 7–9, 15, 249–251, 298, 307– Escrowed encryption, 15–16, 61, 81, 298, 322 359 circumvention of, 133 benefits of, 170 corporate perceptions of, 152–153 contract-based, 191–193, 263–264 cryptography exemptions from, xi, 120– defined, 167–169 125, 144, 188, 256 economic implications, 177–182, 271, description of, 114–122 330 dimensions of choice in, 252–253 government control of, 158, 266–268, of dual-use items, 8, 118, 162, 264, 310 328–332 economic impact of, 40, 153–154 law enforcement benefits, 4, 9, 11, 184– effect on national security, 157–165 187 effect on sales, 145–153 liabilities, 184, 329 effectiveness of, 127–134 mandatory versus voluntary use, 185– elimination of, 251, 254 188, 199, 265, 320–321 and end-use certification, 320 policy issues associated with, 170 export defined, 142 proper escrowing, 177–178, 188, 213– foreign policy considerations, 162–163, 214, 250n 170
From page 682...
... , 485–488 127, 249–250 defined, 358 licensing process for, 9, 114, 142–144, development of, 222–224 647–653, 667–669 NIST role in, 222, 289–290 limiting domestic availability, 7, 12, related to cryptography, 173, 176, 223, 134–138 418 of other nations, 257, 434–436 Federal Reserve Board, 290–291 providing technical data, 9, 159–161, FEMA, see Federal Emergency 313–314 Management Agency (FEMA) rationale for, 113–114 Fermat numbers, 386–387 stimulating foreign competition, 8, FIPS, see Federal Information Processing 155n, 155–159, 309 Standards (FIPS)
From page 683...
... , 41, 242, 335, 483 Hackers, 67n Inman, Bobby, xiii, 267 Hardware Integrated product, 358 product implementations in, 65, 74, 205, Integrity, 359 296, 369n Integrity check, 359, 366 security advantages of, 130 Intellectual property, protecting, 228–230, security disadvantages of, 206–209 465, 482–484 Hashes, 367; see also One-way hash Intelligence community function; Secure hash algorithm; and the intelligence cycle, 10, 425–429 Secure Hash Standard mission of, 95, 423–425 Health care industry, 256, 457, 459–461 regulation of, 87, 404–405n, 408, 423 Hellman, Martin, 347 see also Central Intelligence Agency Hewlett-Packard, 261n (CIA) ; Executive Order 12333; Homologation laws, 437 Federal Bureau of Investigation (FBI)
From page 684...
... . See Escrow forces, xv, 7, 305–307 agents Master Card, see Credit cards escrow encryption, 359 Microsoft Windows NT, 135, 259–260 generation, 211–213, 454 Modularity, 140–142, 223 length, 63, 214–215, 287–288, 319, 353, 380 Monitoring, 359 management, 53, 74–75, 133, 173, 223, Moore's law, 63, 276, 385n 280, 359, 376–377 Multiple encryption, 58–59, 178, 215, retrieval, 284–285 383 revocation, 105n, 213, 452 Mutual Law Enforcement Assistance Key Exchange Algorithm, 176 Treaties, 331, 446 L N Latent demand, for cryptography products, NACIC, see National Counterintelligence 149–151 Center (NACIC)
From page 685...
... , America Online; Compuserve; 620–628 Netscape Navigator; Prodigy; National Security Telecommunications and World Wide Web Information Systems Security Operating system, 360 Committee (NSTISSC) , see Oral communications, see Wire and National Security Directive 42 Electronic Communications NCS, see National Communications System Interception and Interception of (NCS)
From page 686...
... Reagan, President Ronald, 99, 423; see also Plaintext, 9, 53, 270, 355, 360, 374 Executive Order 12333; Executive Plug-in cryptography, see Cryptographic Order 12472 sockets Real-time surveillance, 89–90, 103 Pretty Good Privacy (PGP) , 76, 163–164, Reliability, 361 182 Remailer, 361 Private-key cryptography, 360, 375 Reverse engineering, 205, 210, 230, 361 Prodigy, 148 Risks addressed by cryptography, 361, Products 469–473 certification and evaluation of, 70 RSA algorithm, 182, 227–229, 313n, 325, cryptography, 148, 201–208 361, 376 defaults, 250, 258 RSA Data Security Conference, 141n integrated or general-purpose, 65–66 stand-alone or security-specific, 65, 149, 208–211 S weaknesses in, 74 Safety margins in key length, 361, 384–385 Proper escrowing, see Escrowed encryption Satellite uplinks, 438 Proprietary algorithms, 70, 174, 203 Schmults, Edward C., 348 verifying, 207n Schneier, Bruce, 160n, 163–165 Protocol, 73 Second party, 361 analyzers, 62 Secrecy, xiii–xiv, 201–208, 307, 378 negotiation, 71 Secret-key Pseudorandom function, 367 cryptography, 53, 171, 366, 375 PSTN, see Public switched cryptosystem, 361, 383–384 telecommunications network Secure hash algorithm, 361–362, 370n (PSTN)
From page 687...
... , 233 Stand-alone cryptography product, 362 Trustworthiness, 363, 379 Standards, 70–71, 197, 222, 232–234, 254, Turner, Stansfield, 98 306, 485–486n, 551–556 State Department, see Department of State Steganography, 270n, 372–372n U Stone, Elliot M., 348–349 Unescrowed encryption, 7, 181–183, 186– Strategic intelligence, 97–101 187, 199, 268–273, 303–304 Strong encryption, 101–102, 114, 123, 170, 254, 296, 382–383 United States Postal Service (USPS)
From page 688...
... 688 INDEX V Wire and Electronic Communications Interception and Interception of Vendors, role of, 140, 149–153, 191, 206, Oral Communications Act (text 274 of) , 489–511 VeriSign, 76 Wireless communications, vii–viii, 61, 275, Viruses, 64, 206 279–280; see also Cellular phones; Visa, see Credit cards Cordless phones Voice communications, secure, 174, 278– Wiretapping, 62, 103, 218–220, 439 280 legal framework governing, 84–88, 170 vs data communications, 199, 221, 280– and protection of civil liberties, 44n, 281 285n, 285–286 Vulnerabilities, 24, 57, 293–296, 363 utility of, 82–84 see also Electronic surveillance Work factor, 64n, 363 W World Wide Web, 65n Ware, Willis H., 349 Weak encryption, 29, 61–62, 101, 257–258, 276 Z Web of trust, 75–76 Zimmerman, Philip, 163–164 Windows NT, see Microsoft Windows NT


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.