22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

30 Lotus Security Handbook<br />

As a follow-up to this, there was a November 18, 1998 announcement by the<br />

Bureau of Export Administration of the Commerce Department that amended the<br />

export administration regulations for exports and re-exports of strong encryption<br />

commodities and software. The key lengths are now full 56 bits for DES and<br />

“equivalent” bulk ciphers (namely RC2, RC4, RC5 and CAST) and 1,024 bits for<br />

RSA asymmetric keys to all destinations except Cuba, Iran, Iraq, Lybia, North<br />

Korea, Sudan, and Syria. This is also under the proviso that there be no key<br />

re<strong>cover</strong>y possible. As well, unlimited strength crypto keys can be used by US<br />

subsidiaries, Insurance companies, health and medical firms and online<br />

merchants, provided they do not have a presence in any of the previously listed<br />

countries.<br />

Moving forward, on June 6, 2002, the Bureau of Industry and Security (BIS)<br />

published a rule which amended the Export Administration Regulations (EAR) to<br />

reflect changes made to the Wassenaar Arrangement List of dual-use items and<br />

to update and clarify other provisions of the EAR pertaining to encryption export<br />

controls.<br />

Mass market encryption commodities and software with symmetric key lengths<br />

exceeding 64 bits that are classified under Export Control Classification Numbers<br />

(ECCNs) 5A992 and 5D992 may be exported and reexported No License<br />

Required (NLR), following a 30-day review by the BIS. This rule updates<br />

Category 5, part II (Information Security) of the Commerce Control List (CCL),<br />

and will also allow equipment controlled under ECCN 5B002 to be exported and<br />

reexported under License Exception ENC.<br />

For more information, here is a complete list of resources that will shed some<br />

light on export regulations and bilateral agreements currently in place:<br />

► The Published Federal Registers - Rules affecting the Export Administration<br />

Regulations can be found at the following URL:<br />

http://w3.access.gpo.gov/bis/fedreg/ear_fedreg.html#67fr38855<br />

► An Encryption Fact Sheet pertaining to Commercial Encryption Export<br />

Controls can be found at the following URL:<br />

http://www.bxa.doc.gov/encryption/EncFactSheet6_17_02.html<br />

► Explanation of the Wassenaar arrangement and what it involves can be found<br />

at the following URL:<br />

http://www.bxa.doc.gov/Wassenaar/Default.htm<br />

1.4.3 Asymmetric key algorithms<br />

A non-mathematician can intuitively understand how a symmetric key algorithm<br />

works by extrapolating from a familiar base. However, asymmetric key<br />

algorithms are much less accessible to the lay person. In fact, it sometimes

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!