Security and Freedom Through Encryption (SAFE) Act: Hearing Before the Subcommittee on Courts and Intellectual Property of the Committee on the Judiciary, House of Representatives, One Hundred Fifth Congress, First Session, on H.R. 695 ... March 20, 1997

Front Cover
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Other editions - View all

Common terms and phrases

Popular passages

Page 6 - ACT 11 OF 1979.—Section 17 of the Export Administration Act 12 of 1979 (50 USC App. 2416) is amended by adding at 13 the end thereof the following new subsection: 14 "(g) COMPUTERS AND RELATED
Page 67 - support. While these bills differ in some respects, they all modernize export laws regarding software and hardware with encryption capabilities to permit American software companies to compete on a level international playing field and to provide computer users with their choice of adequate protection for their confidential information. I also want to thank Senator
Page 142 - in order to hide its information content, establish its authenticity, prevent its undetected modification, prevent its repudiation, and/or prevent its unauthorised use. • "Cryptographic key" means a parameter used with a cryptographic algorithm to transform, validate, authenticate. encrypt or decrypt data, • "Cryptographic methods" means cryptographic techniques, services, systems, products and key management systems.
Page 141 - THAT MEMBER COUNTRIES: • establish new. or amend existing, policies, methods, measures, practices and procedures to reflect and take into account the Principles concerning cryptography policy set forth in the Guidelines contained in the Annex to this Recommendation (hereinafter "the Guidelines"), which is an integral
Page 37 - These are just a few examples of recent cases involving encryption. As encryption proliferates and becomes an ordinary component of mass market items, and as the strength of encryption products increases, the threat to public safety will increase proportionately. To some, this is
Page 37 - In several major hacker cases, the subjects have encrypted computer files, thereby concealing evidence of serious crimes. In one such case, the government was unable to determine the full scope of the hacker's activity because of the use of encryption. The subject of a major international drug-trafficking case used a telephone encryption device to seriously reduce the effectiveness of a court-ordered wiretap.
Page 140 - THE COUNCIL, HAVING REGARD TO: • the Convention on the Organisation for Economic Co-operation and Development of 14 December I960, in
Page 138 - Cryptographic methods should be developed in response to the needs, demands and responsibilities of individuals, businesses and governments. 4 . Technical standards, criteria and protocols for cryptographic methods should be developed and promulgated at the national and international level. 5 . The fundamental rights of individuals
Page 33 - As encryption proliferates and becomes an ordinary component of mass market items, and as the strength of encryption products increases, the threat to public safety will increase proportionately. To some this is
Page 141 - remove, or avoid creating in the name of cryptography policy, unjustified obstacles to international trade and the development of information and communications networks: • state clearly and make publicly available, any national controls imposed by governments relating to the use

Bibliographic information