Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext
Title | Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 73 |
Release | 2016-10-30 |
Genre | Computers |
ISBN | 0309447402 |
In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext
Title | Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 73 |
Release | 2016-09-30 |
Genre | Computers |
ISBN | 0309447437 |
In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.
Decrypting the Encryption Debate
Title | Decrypting the Encryption Debate PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 119 |
Release | 2018-06-07 |
Genre | Computers |
ISBN | 0309471532 |
Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool. At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators. Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.
Software Update as a Mechanism for Resilience and Security
Title | Software Update as a Mechanism for Resilience and Security PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 97 |
Release | 2017-09-25 |
Genre | Computers |
ISBN | 0309462916 |
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.
Advances in Cryptology – EUROCRYPT 2021
Title | Advances in Cryptology – EUROCRYPT 2021 PDF eBook |
Author | Anne Canteaut |
Publisher | Springer Nature |
Pages | 590 |
Release | 2021-06-16 |
Genre | Computers |
ISBN | 3030778835 |
The 3-volume-set LNCS 12696 – 12698 constitutes the refereed proceedings of the 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2021, which was held in Zagreb, Croatia, during October 17-21, 2021. The 78 full papers included in these proceedings were accepted from a total of 400 submissions. They were organized in topical sections as follows: Part I: Best papers; public-key cryptography; isogenies; post-quantum cryptography; lattices; homomorphic encryption; symmetric cryptanalysis; Part II: Symmetric designs; real-world cryptanalysis; implementation issues; masking and secret-sharing; leakage, faults and tampering; quantum constructions and proofs; multiparty computation; Part III: Garbled circuits; indistinguishability obfuscation; non-malleable commitments; zero-knowledge proofs; property-preserving hash functions and ORAM; blockchain; privacy and law enforcement.
Recoverability as a First-Class Security Objective
Title | Recoverability as a First-Class Security Objective PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 61 |
Release | 2018-10-01 |
Genre | Computers |
ISBN | 0309483735 |
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverabilityâ€"that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.
Cryptographic Agility and Interoperability
Title | Cryptographic Agility and Interoperability PDF eBook |
Author | National Academies of Sciences, Engineering, and Medicine |
Publisher | National Academies Press |
Pages | 91 |
Release | 2017-02-03 |
Genre | Computers |
ISBN | 0309453569 |
In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.