28.02.2014 Views

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

Internet & Intranet Security Management - Risks & Solutions

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Everyone has heard the phrase ''if you're not doing anything wrong, you shouldn't have anything to<br />

hide". That's really Big Brother's DoubleSpeak for "if you're hiding something, then we can't watch<br />

you and protect everybody from everything". Privacy also includes being left alone - freedom from<br />

interference. Cryptography can offer a dimension of both privacy and secrecy. How it is used will<br />

dictate whether the USER is good or bad, not whether cryptography is good or bad.<br />

Conclusions<br />

The use of cryptography offers the opportunity to have real privacy of information and<br />

communications. It can be used to protect stored information (ideal for notebook computers and for<br />

files stored on any computer) as well as live or <strong>Internet</strong> communications. It can be used to protect<br />

business transactions that are communicated over the <strong>Internet</strong> (including the protection of credit card<br />

information). But only if it is available and only if it is "strong encryption".<br />

The First Amendment to the United States Constitution guarantees the right to communicate without<br />

government interference: "Congress shall make no law respecting an establishment of religion, or<br />

prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the<br />

right of the people peaceably to assemble, and to petition the government for a redress of<br />

grievances." Encryption software and hardware simply enables one to speak in a language unknown<br />

to the government. The Constitution gives the government no blanket power to demand that we<br />

provide a translation. Speech in the dialect of IDEA should be free around the world.<br />

The important issue to remember is that there is a continuous assault on our privacy and that new<br />

techniques are being developed all the time. Technology using strong cryptographic algorithms<br />

properly implemented can provide real privacy - as long as we are allowed to use them.<br />

Legislation<br />

In the bad old days of ITAR, export of cryptographic products was treated the same way as munitions<br />

and there were very specific restrictions imposed. In the first instance the relative strength of the<br />

algorithm as measured by only one of its attributes was the deciding factor. Keys of forty bits or less<br />

were permitted to be exported, those greater than forty bits were not. With modern computing power<br />

this level of security is trivial to defeat and arguments came from all quarters to relax this deciding<br />

factor. Some movements were made and restrictions were relaxed to the point where products based<br />

on fifty-six bit, sixty-four bit and one hundred and twenty-eight bit algorithms could be exported but<br />

only under license and only to approved parties.<br />

There have been several Bills proposed, however, the two that appear to have some support are<br />

languishing in Congress. These would change the export regulations currently in force (sort of). The

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!