Abstract: The use of cryptography by individuals is growing at a tremendous rate, and since 1991 encryption problems have overwhelmed both the US government and the computer industry . One of the most contentious issues is whether encryption should be made extremely secure at the highest level current technology allows, or whether a "master key" should be locked away somewhere, to be used only when absolutely justified. Both sides of the issue have their advantages and disadvantages; the problem is finding the middle ground that will provide the greatest benefit to society. Rapid progress has been made in the field of cryptography over the past decade. These advances have drawn considerable attention to encryption policies in the United States from three large groups: the government, the computer industry, and researchers in the field. Since the old faithful encryption standards are rapidly becoming obsolete, new standards are currently being proposed by each group. However, the government has its own interest in mind when it comes to its standards, while the IT industry and researchers have an opposite idea about how encryption should be implemented. Therefore, the question is to try to find a new standard that will be accepted by both groups and, ultimately, will be a benefit to all individuals. Specifically stated by Kevin Bowyer: “Individuals should have an equally great guarantee of privacy. Law enforcement should have at least the same effective ability to conduct surveillance. The US computer industry should compete at least as effectively in global markets. And the national governments should have no less ability to regulate what happens within their nation.” [1]Before the 1990s, the… middle of document… May 8, 19984. Schwartz, John high-end breaks data encryption system, The Washing Post, July 18, 19985. Nechvatal et al. Advanced Encryption Standard Development Report James National Institute of Standards and Technology, October 2, 20006. Baker, Stewart happy, Wired Magazine, June 19947. Cryptography: Impact on Law Enforcement, Federal Bureau of Investigation, June 3, 1999, pp. 7-88. October 1998. pp. 116--117.9. Kolata, Gina. The Key Vanishes: Scientist Outlines Unbreakable Code, New York Times, February 20, 200110. United States Supreme Court, Olmstead v. US, 277 US 438, 1928.11. Schneier, Bruce. Cryptography: The Importance of Not Being Different, IEEE Computer, vol. 32, no. 3, March 1999, pp. 108-109
tags