|
|
|||
|
||||
OverviewFor the first time in history, everyone - Third World freedom fighters to urban drug dealers - can communicate in secrecy via unbreakable codes made available by advances in cryptography and computer technology. As the welcome and unwelcome consequences of this new technology begin to dawn on governments worldwide, responses have varied from stringent regulation to laissez faire liberalism. Written by a former General Counsel of the National Security Agency and an expert in cryptography law, this text explores the policy and legal issues raised by the democratization of cryptography and offers a guide to the ways in which the law of cryptography translates issues of trust into standards for lawful conduct. The book addresses the international regulation of cryptography and digital signatures both in terms of confidentiality (cryptography used to keep secrets) and authentication (cryptography used to verify information). Coverage includes: a description of over 45 countries' policies and laws on cryptography import, export, and domestic controls and digital signature initiatives worldwide; a concise history of the cryptography debate in the United States from its beginnings after World War II to the recent debates over the Clipper Chip and key recovery encryption; and a presentation of the efforts of the United States government (and others) to build a new national consensus on regulation of encryption. Full Product DetailsAuthor: David Stewart , Paul R. HurstPublisher: Kluwer Law International Imprint: Kluwer Law International Dimensions: Width: 16.00cm , Height: 3.40cm , Length: 23.00cm Weight: 0.966kg ISBN: 9789041106353ISBN 10: 9041106359 Pages: 621 Publication Date: 01 August 1998 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: In Print This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsIntroducting confidentiality and authentication. Part 1 Confidentiality: overview of the United States policy debate; United States' policy towards the export of cryptography; international initiatives addressing cryptography; section 1 - the OECD; section 2 - Wassenaar Arrangement; country-by-country guide to encryption regulation. Part 2 Authentication: authentication, cryptography and digital signatures; digital signatures - an overview of the legal issues; consequences of the current legislative approaches; international guide to digital signature regulation; section 1 - international organizations; section 2 - country survey.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||