Abstract: The use of encryption by individuals is growing at a tremendous rate, and since 1991 cryptography issues have engulfed both the U.S. government as well as the computing industry. One of the most controversial of these issues is whether encryption should be made supremely secure to the highest-level current technology will allow, or whether a "master key" should be locked away somewhere, only to be used when absolutely justified. Both sides of the issue have their benefits and detriments; the problem is finding the middle ground that will provide the greatest benefit to society.
In the past decade, rapid advances have been made in the field of cryptography. These advances have brought considerable attention to encryption policies in the United States from three large groups: the government, the computing industry and researchers in the field. With old faithful encryption standards quickly becoming obsolete, new standards are currently being proposed by each group. However, the government has its own interest in mind in its standards, and the computing industry and researchers have an opposite idea as to how encryption should be implemented. Thus, the issue is trying to find a new standard that will be accepted by both groups, and ultimately will be a benefit to all individuals. Specifically stated by Kevin Bowyer, "Individuals should have just as great an assurance of privacy. Law enforcement should have at least the same effective ability to conduct surveillance. The U.S. computing industry should compete at least as effectively in global markets. And, national governments should have no less ability to regulate what happens inside their nation." 
Before the 1990s, th...
... middle of paper ...
...ay 8, 1998
4. Schwartz, John. One High-End PC Cracks Data-Scrambling System, The Washing Post, July18, 1998
5. Nechvatal et al. Report on the Development of the Advanced Encryption Standard James National Institute of Standards and Technology, October 2, 2000
6. Baker, Stewart. Don't Worry Be Happy, Wired Magazine, Jun 1994
7. Encryption: Impact on Law Enforcement, Federal Bureau of Investigation, June 3, 1999, pps. 7-8
8. Rivest, Ronald L. The Case against Regulating Encryption Technology, Scientific American, October 1998. pps. 116--117.
9. Kolata, Gina. The Key Vanishes: Scientist Outlines Unbreakable Code, New York Times, February 20, 2001
10. U.S. Supreme Court, Olmstead v. U.S., 277 U.S. 438, 1928.
11. Schneier, Bruce. Cryptography: The Importance of Not Being Different, IEEE Computer, Vol. 32, No. 3, March 1999. pps. 108-109
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- How Important is the Encryption Debate. The encryption debate is intense and heated in certain circles, but is of no major concern to the vast majority of people in the United States. Most of the people I talk to regard its regulation to be of little consequence, or too complicated to take a position on. Indeed, the prevailing opinion I encounter is that is an area best left to the experts who understand its capabilities, uses and dangers. While no one really trusts the government, in the face of the sundry bogeymen evoked by law enforcement agents as a rationale for protecting the people, most people are hard pressed to stand up and speak of the inviolability of their privacy rights.... [tags: Encryption Market Essays]
1109 words (3.2 pages)
- Businesses and people are using Internet for entertainment, e-business and e-commerce, social networking, and communication to the people and business, but there have always been threats to the Internet Security. Internet security is major concern in field of technology, because there are various personal, business and government data on the Internet. Today every businesses and organizations have their own security systems to reach their goals of information security. Internet security systems are created to reduce cyber attack risks, reliability, maintain confidentiality, and compliance with privacy laws and national security laws.... [tags: Security, Computer security, Internet]
962 words (2.7 pages)
- ENCRYPTION COSC 111 5/7/2013 Cam 2 ABSTRACT In this research paper I want to shed light on encryption. After careful research it becomes clear that encryption has been around for centuries and used in various ways. There are two distinct methods of encryption: Public Key and Private Key. Each comes with its own set of pros and cons but Private Key is the more widely used method. Laws have been put into place to sanction the use of encryption products and devices. Information has been gathered from several different sources to also explain how encryption has impacted the past and how it will continue to shape our futures.... [tags: Pretty Good Privacy, Public-key cryptography]
1605 words (4.6 pages)
- This paper looks at the security concerns that the Internet of Things, or IOT carries along with it. The Internet of Things is defined as “a proposed development of the Internet in which everyday objects have network connectivity, allowing them to send and receive data” This increasing level of connectivity and interconnectivity certainly makes everyday tasks easier for the average person, but at the same time, it makes finding holes in security measures easy as well. The Internet of Things is said to have been “in the works” in the 1990’s.... [tags: Security, Computer security, Internet]
1545 words (4.4 pages)
- Data Security Data Security is critical in the computerized world we live in today. Cyber Security is a big part of data security in the United States and all parts of the world that rely on networked computers in a business and personal environment. The business and personal environment is more difficult to separate with all computers touching the Internet. Businesses have more responsibility to keep their data safe than someone working personally on the Internet. The federal government is deeply involved in the ways data is handled in this country.... [tags: Information security, Security, Computer]
1058 words (3 pages)
- Missing Chart Encryption Encryption is a method of programming data for security so that it appears to be random data. Only the people sending and receiving the information have the key to decrypt the message, which will put it back into its original form making it readable. The only people with the key are the people who are intended to read the message. Not many people know what encryption is. I took a survey of twenty students and asked two questions. The first question I asked was do you know what encryption means and the second question I asked was have you ever heard of anybody using encryption.... [tags: Data Security]
1027 words (2.9 pages)
- Ethics of Encryption Effects of Encryption on the Constitution of the United States of America In the rapidly developing field of computer science, there is no more controversial issue than encryption. Encryption has become a highly contested issue with the broad use of global networks including the Internet. As more and more sensitive documents are being placed on computer networks, and trusted information is being sent from computer to computer throughout the world, the need for encryption has never been greater.... [tags: Essays Papers]
2197 words (6.3 pages)
- National ID Card There has been much discussion over the issue of a national ID card. Can it guarantee national security. Can it even improve the current state of security in the US. Is implementation feasible. Is it an invasion of privacy. These are just a few of the questions that surround the issue of a national ID. The scene that the NID evokes in me is from the movies of the forties and fifties. The security officials from some eastern European country move from passenger to passenger in a train demanding “Papers please.” The US citizenry have never been subject to that kind of open scrutiny before and it is disturbing to contemplate the implementation of such a draconian sys... [tags: National Security NID American Citizenship Essays]
1523 words (4.4 pages)
- Security Versus Privacy As a result of 9/11, our country has been faced with a new issue: electronic privacy. The terrorists that attacked us used our own technology against us to protect their activities from our view. Because of this, we are now forced to make a decision between two desirable things: privacy and national security. On the one hand, our right to privacy will ensure that our personal rights are not violated, whereas, on the other hand, national security would allow us some comfort against the evil in the world.... [tags: Argumentative Persuasive essays]
2300 words (6.6 pages)
- Encryption Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information.... [tags: Computer Technology]
780 words (2.2 pages)