DocumentCode :
2197234
Title :
Key recovery and confidentiality oops, where did I put that key?
Author :
Kesterson, Hoyt L., II
Author_Institution :
BULL HN Inf. Syst. Inc., Phoenix, AZ, USA
Volume :
4
fYear :
1998
fDate :
21-28 Mar 1998
Firstpage :
313
Abstract :
National defense organizations have long had the requirement that their communications be secured against eavesdropping. Typically this confidentiality has been achieved by using cryptography to ensure that information can only be read by those who have the proper information, the key, to decrypt a message. As industry and private individuals begin to utilize open forms of communication, e.g. the Internet or cellular modems, it has become increasingly important to keep some parts of that communication confidential. In addition, because exposed systems such as laptop computers are holding more information that is either mission critical or sensitive, it becomes necessary to encrypt that information to preserve confidentiality. Those wishing to subvert that confidentiality are using increasingly more powerful computers or sophisticated methods, e.g. networked computers working in parallel. In response, industry is beginning to utilize stronger algorithms and/or longer keys to strengthen confidentiality. Essentially industry is now able to lock information in a “safe” so strong that if the key is lost, no amount of “dynamite” will open that safe. Therefore it is a prudent business practice to ensure that keying information is not lost. This paper discusses methods for recovering encrypted information as well as the risks and benefits. It presents a business case for the technology and discusses other influences, e.g. needs of law enforcement, import/export control, politics, regulation, and legislation
Keywords :
Internet; cryptography; data privacy; legislation; telecommunication security; Internet; benefits; cellular modems; confidentiality; cryptography; eavesdropping; encrypted information; import/export control; laptop computers; law enforcement; legislation; national defense organizations; networked computers; politics; regulation; risks; Communication industry; Computer networks; Concurrent computing; Cryptography; Defense industry; Internet; Law enforcement; Mission critical systems; Modems; Portable computers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Aerospace Conference, 1998 IEEE
Conference_Location :
Snowmass at Aspen, CO
ISSN :
1095-323X
Print_ISBN :
0-7803-4311-5
Type :
conf
DOI :
10.1109/AERO.1998.682201
Filename :
682201
Link To Document :
بازگشت