Cryptography Policy and the Information Economy

نویسنده

  • Matt Blaze
چکیده

This paper is a high-level technical overview of the impact of cryptography on the computing and communications industries, with emphasis on the implications of the Administration’s recent cryptography policy initiatives. It represents the best judgement of its author, and does not necessarily reflect the position of AT&T or any other organization. We argue that unless a fundamental change is made in the direction of our cryptography policy, the United States’ dominance in the emerging “information economy” will ultimately be placed in jeopardy. In particular, current policy fails to recognize several increasingly important realities of cryptographic technology:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Macroprudential Policy Arrangement for Achieving Financial Stability in an Oil-exporting Economy: A DSGE approach

Following the 2008 financial crisis, the application of macro-prudential policies has expanded to ensure financial stability. In addition, in most oil-exporting economies, oil revenues are an important source of fluctuations in macroeconomic variables and, therefore, calls for the use of macroeconomic stabilization policies. Considering the vulnerability of financial stability in the Iranian ec...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Exception Based Enterprise Rights Management : Towards a Paradigm Shift in Information Security and Policy Management

Enterprise DRM is still dominated by vendor driven proprietary approaches fundamentally lacking interoperability features and essentially relying on strong cryptography lacking the flexibility to accommodate unanticipated work situations requiring exceptional actions. Consequently users increasingly circumvent corporate security policies just to get their work done and such incidents simply go ...

متن کامل

Evaluation of Price Setting Models in Iran’s Economy (DSGE Approach)

 Despite the consensus on the importance of nominal rigidities, there is no general agreement among monetary economists regarding the most appropriate and consistent pricing model that must be used to assess the effects of monetary policies in the economy. Due to the lack of empirical evidence with relation to the pricing behavior of Iranian firms, there is no general agreement on how to introd...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007