Question

In: Computer Science

Widespread use of cryptography can mean trouble for law enforcement and security personnel when crooks and spies use cryptography to secure their communications from wiretapping.

Widespread use of cryptography can mean trouble for law enforcement and security personnel when crooks and spies use cryptography to secure their communications from wiretapping. Under U.S. law, communications utilities are required to provide law enforcement access to communication links when proper judicial process has been observed. Such access is useless if the messages they provide access to are encrypted with powerful security. For years the U.S. and other countries have tried to control the spread of cryptographic technologies, with little success. What should public policy be with regard to free use of cryptographic systems? What can realistically be done to implement restrictive policies?

Solutions

Expert Solution

Cryptography is said to be the art of secret writing. Using cryptography, plaintext is converted into non-human readable ciphertext which cannot be understood in plain sight. The 2 processes in cryptography are encryption and decryption. Encryption means converting plain text to cipher text and decryption means converting the ciphertext back to human readable and meaningful plain text. To make a message or content secure we apply cryptographic algorithms so that the message cannot be read or meaning cannot be understood by persons for which it is not meant to. Only authorized persons will have the means of decrypting the ciphertext back to plain text so that they can understand the meaning of it. When sending through an unsecured medium of transmission such as the Internet cryptographic algorithms are used to secure the transfer of messages from the source to the destination.
The widespread use of the cryptographic system means a lot of trouble for law enforcement and security personnel when the illegal activities are cause using cryptography to secure their communications from wiretapping, and thus it becomes tough for the law enforcement to detect them and decrypt the data. Under the US law, law enforcement can access communication links when the proper judicial process is applied. But such tapping is useless when access to are encrypted with powerful security. The public policy to use the cryptographic systems cannot be controlled as the users and the companies use the cryptography for their security. Thus, the only thing that can be done is that the providers should provide the law enforcement with the access such as a back-door access to wiretapping into suspects and illegal activities where the encryption would not work. This, can be realistically be done to implement restrictive policies, such as when we would want to access and wiretap the contents of somebody's voice call or some data stored in some mobile phone or any service which is encrypted on the Internet, we can ask the provider under the US law to ask for the unencrypted data.


Related Solutions

what does this "->" mean in c? when can you use it?
what does this "->" mean in c? when can you use it?
Which statement is NOT true Batch processing a. permits data to be edited in a separate computer run. b. is subject to deadlocks when processing common accounts. c. can use databases and flat files. d. can be initiated from a terminal.
Which statement is NOT true Batch processinga. permits data to be edited in a separate computer run.b. is subject to deadlocks when processing common accounts.c. can use databases and flat files.d. can be initiated from a terminal. 
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT