The National Academies Press: Home The National Academies: Home
Read more than 3,000 books online FREE! More than 900 PDFs now available for sale
HOME ABOUT NAP CONTACT NAP HELP NEW RELEASES ORDERING INFO cart icon Items in cart [0]
Questions? Call 888-624-8373
Cryptography's Role in Securing the Information Society (1996)
Computer Science and Telecommunications Board (CSTB)
Find More Like This Find More Like
This Book
Web Search Power Tool built from this publication Research
Dashboard
NEW!
Buy This Book BUY This Book


TABLE OF
CONTENTS

PAGE
17
PRINTABLE
PDF PAGE

CHAPTER
Previous Chapter Next Chapter
PAGE
Previous Page Next Page

The following HTML text is provided to enhance online readability. Many aspects of typography translate only awkwardly to HTML. Please use the page image as the authoritative form to ensure accuracy.


Page 17

PART I
Framing the Policy Issues

PART I IS INTENDED TO EXPLICATE the fundamental issues underlying national cryptography policy. Chapter 1 outlines basic elements of a critical problem facing the nation—the increasing vulnerability of information, a commodity that has become essential to national well-being and future opportunity. This vulnerability results from a number of trends, including the explosive growth of digital communications and data storage, the increasingly international dimensions of business, and the growing dependence of the nation on a number of critical information systems and networks. Chapter 2 describes how cryptography can play an important role in reducing the information vulnerability of the nation, of businesses, and of private individuals. Chapter 2 also places cryptography into context, as one element of an overall approach to information security, as a product that responds to factors related to both supply and demand, and as a technology whose large-scale use requires a supporting infrastructure. Chapter 3 discusses public policy issues raised by the need for access to encrypted information. The prospect of near-absolute confidentialty of information—a prospect enabled by modern cryptography—is reassuring to some and quite disturbing to others. Important public policy issues are raised by law enforcement authorities, who regard the ability to obtain information surreptitiously but legally as essential to their crime-fighting abilities, and by national security authorities, who place a high value on the ability to monitor the communications of potential adversaries. Even private individuals, who might wish to encrypt records securely, may face the need to recover their data as though they were outsiders if they have forgotten how to gain ''legitimate" access; the same is true for businesses in many situations.

 
PURCHASE OPTIONS
HARDBACK
list:$44.95
Web:$40.46
NEW!
Purchase PDFs

HARDBACK + PDF $49.00
PDF BOOK $30.50

[2.9 MB]
PDF CHAPTERS $2.10
• About PDFs
• Sample PDF
• Speed

Related Books:

Who Goes There?: Authentication Through the Lens of Privacy (2003)

Critical Information Infrastructure Protection and the Law: An Overview of Key Issues (2003)

Other Related Books
 


TABLE OF
CONTENTS

PAGE
17
PRINTABLE
PDF PAGE

CHAPTER
Previous Chapter Next Chapter
PAGE
Previous Page Next Page

The Open Book page image presentation framework is not designed to replace printed books. Rather, it is a free, browsable, nonproprietary, fully and deeply searchable version of the publication which we can inexpensively and quickly produce to make the material available worldwide.

For most effective printing, use the "printable PDF page" link available on each OpenBook page's tool block. The 300 x 150 dpi PDF linked to it is printable on your local printer.

More information on the Open Book is available.

[ Top of Page ] [ Home ] [ Contact Us ] [ Help ] [ The National Academies Home ]

Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 17
Page 17 PART I Framing the Policy Issues PART I IS INTENDED TO EXPLICATE the fundamental issues underlying national cryptography policy. Chapter 1 outlines basic elements of a critical problem facing the nation—the increasing vulnerability of information, a commodity that has become essential to national well-being and future opportunity. This vulnerability results from a number of trends, including the explosive growth of digital communications and data storage, the increasingly international dimensions of business, and the growing dependence of the nation on a number of critical information systems and networks. Chapter 2 describes how cryptography can play an important role in reducing the information vulnerability of the nation, of businesses, and of private individuals. Chapter 2 also places cryptography into context, as one element of an overall approach to information security, as a product that responds to factors related to both supply and demand, and as a technology whose large-scale use requires a supporting infrastructure. Chapter 3 discusses public policy issues raised by the need for access to encrypted information. The prospect of near-absolute confidentialty of information—a prospect enabled by modern cryptography—is reassuring to some and quite disturbing to others. Important public policy issues are raised by law enforcement authorities, who regard the ability to obtain information surreptitiously but legally as essential to their crime-fighting abilities, and by national security authorities, who place a high value on the ability to monitor the communications of potential adversaries. Even private individuals, who might wish to encrypt records securely, may face the need to recover their data as though they were outsiders if they have forgotten how to gain ''legitimate" access; the same is true for businesses in many situations.

Failed to find ocr for page 0309054753/18
OCR for page 18

Representative terms from entire chapter:

issues underlying, cryptography policy, fundamental issues, enforcement authorities, discusses public, obtain information, encrypted information, security authorities, underlying national, national cryptography, data storage, increasingly international, information surreptitiously, law enforcement, outlines basic, encrypt records, records securely, increasing vulnerability, basic elements, explosive growth, international dimensions, digital communications, public policy, policy issues, private individuals, information security, critical information, information vulnerability, national security, issues raised