9.4.1. Peter Denning on crypto policy: + provided by Pat Farrell, 1994-08-20; Denning comments are 1992-01-22, presented at Computers, Freedom, and Privacy 2. Peter D. uses the metaphor of a "clearing,"as in a forest, for the place where people meet to trade, interact, etc. What others call markets, agoras, or just "cyberspace." - "Information technology in producing a clearing in which individuals and corporations are key players besides government. Any attempt by government to control the flow of information over networks will be ignored or met with outright hostility. There is no practical way that government can control information except information directly involved in the business of governing. It should not try." [Peter Denning, PUBLIC POLICY FOR THE 21ST CENTURY, DRAFT 1/22/92] - No word on how this view squares with his wife's control freak views. 9.4.2. Will government and NSA in particular attempt to acquire some kind of control over crypto companies? + speculations, apparently unfounded, that RSA Data Security is influenced by NSA wishes - weaknesses in the DES keys picked? - and companies may be dramatically influenced by contracts (and the witholding of them) 9.4.3. NIST and DSS 9.4.4. Export restrictions, Munitions List, ITAR 9.4.5. old crypto machines sold to Third World governments, cheaply - perhaps they think they can make some changes and outsmart the NSA (which probably has rigged it so any changes are detectable and can be factored in) - and just knowing the type of machine is a huge advantage 9.4.6. 4/28/97 The first of several P-K and RSA patents expires + U.S. Patent Number: 4200770 - Title: Cryptographic Apparatus and Method - Inventors: Hellman, Diffie, Merkle - Assignee: Stanford University - Filed: September 6, 1977 - Granted: April 29, 1980 - [Expires: April 28, 1997] + remember that any one of these several patents held by Public Key Partners (Stanford and M.I.T., with RSA Data Security the chief dispenser of licenses) can block an effort to bypass the others - though this may get fought out in court 9.4.7. encryption will be needed inside computer systems - for operating system protection - for autonomous agents (active agents) - for electronic money
Next Page: 9.5 Motivations for Crypto Laws
Previous Page: 9.3 Introduction
By Tim May, see README
HTML by Jonathan Rochkind