The Crypto Controversy:A Key Conflict in the Information SocietyKluwer Law International B.V., 1999 M01 1 - 285 pages Cryptography is essential for information security and electronic commerce, yet it can also be abused by criminals to thwart police wiretaps and computer searches. How should governments address this conflict of interests? Will they require people to deposit crypto keys with a `trusted' agent? Will governments outlaw cryptography that does not provide for law-enforcement access? This is not yet another study of the crypto controversy to conclude that this or that interest is paramount. This is not a study commissioned by a government, nor is it a report that campaigns on the electronic frontier. The Crypto Controversy is neither a cryptography handbook nor a book drenched in legal jargon. The Crypto Controversy pays attention to the reasoning of both privacy activists and law-enforcement agencies, to the particulars of technology as well as of law, to `solutions' offered both by cryptographers and by governments. Koops proposes a method to balance the conflicting interests and applies this to the Dutch situation, explaining both technical and legal issues for anyone interested in the subject. |
Other editions - View all
The Crypto Controversy:A Key Conflict in the Information Society Bert-Jaap Koops Limited preview - 1999 |
Common terms and phrases
able to decrypt address the crypto Alice and Bob Alice's allow attack burden of proof business crime Chapter ciphertext communications computer crime computer searches conferees confidentiality consider cooperate criminal organizations crown witnesses crypto conflict crypto policy crypto problem crypto systems cryptocriminals cryptography data recovery decryption command demand decryption digital signatures direct eavesdropping Dutch e-mail effective electronic commerce encrypted data encryption evidence implemented incriminating infiltration information infrastructure information security information society infringe instance interception Internet issue justice key escrow key recovery key-escrow law enforcement Leah LEAK systems legislature Netherlands offense options organized crime password penalize plaintext police Polly principles private key privilege against self-incrimination proposed protection public key public-key cryptography punishment Rawls refusal to decrypt require rule of law schemes secret session key steganography stored suspect tapping telecommunications TEMPEST monitoring Traa wiretapping