Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Case Against Regulating Encryption Technology

Case Against Regulating Encryption Technology

Ratings: (0)|Views: 20|Likes:
Published by Arif Zina

More info:

Categories:Types, Research
Published by: Arif Zina on Apr 10, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/28/2010

pdf

text

original

 
The Case against regulating Encryption TechnologyPrepared by:Arif ZinaDate:September 26, 2005email:zina.arif@hotmail.com
1
 
The use of Cryptography is becoming more essential in today’s global economy.The benefits of cryptography to the society in general, in today’s modern fastpaced life, are tremendous. On-line banking, electronic commerce, globalcommunications means such as email, instantaneous messaging, are some of few applications, which are becoming quite essential in every day life. Theseapplications however require secure means of communications in ensuringconfidentiality and integrity. Encryption technology has contributed in bringingthese technologies to reality.Also, in today global and highly competitive market, the use of encryptiontechnology becomes necessary to prevent theft of intellectual property, especiallyif these properties are stolen and sent to countries, which are in directcompetition. This can have a major financial impact not only on the companies,which might have spent billions of dollars in R&D, but also on the government,which might have benefited from the revenues.Cryptography can also be used to allow for the anonymous dissemination of information, such as reports on human rights abuses, and to ensure thatdocuments of human rights groups are not tampered with or altered after release.Encryption also ensures the confidentiality of personal records, such as medicalinformation, personal financial data, and electronic mail. Also, a governmentalregulation of cryptographic security techniques endangers personal privacy anddiscourages the freedom of speech, which is one’s constitutional right.In a networked environment, such information is increasingly at a risk of beingstolen or misused and can generally be very costly if it is compromised.Therefore advancement in cipher programs should be definitely encouraged soas to make it difficult in retrieving or unlawfully gaining access to information, andof course, without any government intervention.The government’s concern about security is valid, especially after the events thattook place in New York, on September 11, and also the recent bombing inLondon, England. The question however is whether governments can even besuccessful in stopping all the criminal activities around the world. Electronictransfer of information, which is perhaps the fastest and most efficient, is onlyone of the many ways of transferring. Criminals, who have a set mind, do noteven have to use electronic medium to communicate. They can quite easilycommunicate, perhaps not as efficiently, with other means such as coded letters,private meetings in a basement, voice communications and video.The governments, in their fight against the terrorism, should revisit this issuefrom another angle. They should look at their foreign policies in regards tobringing economic development to countries that that are known to breedterrorists. Another area that the government should put its efforts is onimplementing newer technologies in monitoring the flow of illegal goods, such as
2

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->