Encryption Do We Need By Term Paper

PAGES
1
WORDS
339
Cite
Related Topics:

¶ … Encryption Do We Need?" By Ruth Walker appears in the Christian Science Monitor, a news source believed by many to have a left-wing bias.

The only information the author supplies about herself is her email address (

There is no company with the URL www.cps.com.The author argues against export controls for encryption technologies, but does a poor job

The author asserts that people hesitate to do business over the Internet because they're worried about security and invasion of privacy and implies that laxer export controls in the U.S. would help fix these problems. Yet, electronic commerce sales were nearly $40 billion in 2005, a figure the author neglects to mention. Encryption technology is very complex; clearly, the U.S. allows certain levels of encryption for online transactions. However, Walker fails to prevent an intelligent discussion on which encryption is tightly controlled and which is not and why.

To bolster support for her opinion, Walker mentions a company that has moved outside the U.S. To take advantage of friendlier encryption laws. but, just because other countries have weaker standards doesn't necessarily mean that the U.S. should. Walker quotes an Electronic Frontier Canada representative as saying that, "Export controls have had the general result of weakening the encryption standards available off the shelf in the U.S. And Canada." To her credit, Walker provides an alternative view by a senior officer of a security vendor saying that existing encryption, digital signatures and strong authentication technology make it save to do business on the Internet. The problem is that both of these sources are biased and there's not enough evidence to support or dispute either one.

Walker never answers the question she initially posed in the title of her article, "How Much Encryption Do We Need?" The article is filled with unsupported generalizations and opinions and can no way be considered an authoritative research source.

Bibliography

Walker, Ruth. "How Much Encryption Do We Need?" Christian Science Monitor. http://www.efc.ca/pages/media/2001/2001-01-18-a-csmonitor.html (Accessed 2 Mar. 2007).

Cite this Document:

"Encryption Do We Need By" (2007, March 02) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/encryption-do-we-need-by-39663

"Encryption Do We Need By" 02 March 2007. Web.25 April. 2024. <
https://www.paperdue.com/essay/encryption-do-we-need-by-39663>

"Encryption Do We Need By", 02 March 2007, Accessed.25 April. 2024,
https://www.paperdue.com/essay/encryption-do-we-need-by-39663

Related Documents

The other is a private key that you use to decrypt messages that you receive" (Pretty pp). PGP is such an effective encryption tool that the United States Government actually brought a lawsuit against Zimmerman for putting it in the public domain and therefore making it available to enemies of the United States, however, after a public outcry, the government's lawsuit was dropped, yet it is still illegal to use PGP

(Proposed encryption, 2004, USA Today). As Bruce Schneier's text Schneier on Security indicates, encryption is being increasingly used by watchful and responsible people to protect their security online. The concern about implicating an innocent person or giving a harsh sentence to someone for a minor offense is not far-fetched given the ubiquitous nature of encryption technology. The useful and benign nature of encryption means that to increase the potential

PGP Encryption, better known as Pretty Good Privacy is a computer program that provides cryptographic privacy and authentication. Phil Zimmerman, the developer of PGP, introduced his invention in 1991. Since then, major improvements have been made to the computer program and is now available from PGP Corporation and other companies. The original intent of PGP was to encrypt email and attachments. PGP encryption applications have expanded to a variety of components

Data Encryption
PAGES 7 WORDS 1804

Encryption With the ever-increasing amount of information traffic on the net (LAN, WAN, etc.) there is a corresponding increase in the risk of vital data falling into the wrong hands. Data encryption is a technology that provides for a safe, secure and private information exchange. The advancement of computer technology has bought a paradigm shift to our mode of communication. The Internet has managed to overcome all the geographical limitations and

4G LTE Encryption When cellular phones first came out, the concerns about data loss and theft was not all that high. This was mostly because these devices functioned mostly (if not entirely) as phones with perhaps a camera phone here and there. Nowadays, however, cellular phones are often smartphones and they are literally small computers in terms of the data that they carry and the abilities that they have. Given that

This is however, not considered foolproof. It is possible to break the security by a person having adequate technical expertise and access to the network at hardware level. In view of this the SSL method with right configuration is considered perfectly sufficient for all commercial purposes.5In order to safeguard the data while in transit it is customary to adopt a practical SSL protocol covering all network services that use