| Front Matter | i-xxxii |
| Executive Summary | 1-14 (skim) |
| A Road Map Through This Report | 15-16 (skim) |
| Part I - Framing the Policy Issues | 17-18 (skim) |
| Growing Vulnerability in the Information Age | 19-50 (skim) |
| Cryptography: Roles, Market, and Infrastructure | 51-78 (skim) |
| Needs for Access to Encrypted Information | 79-110 (skim) |
| Part II - Policy Instruments | 111-112 (skim) |
| Export Controls | 113-166 (skim) |
| Escrowed Encryption and Related Issues | 167-215 (skim) |
| Other Dimensions of National Cryptography Policy | 216-246 (skim) |
| Part III - Policy Options, Findings, and Recommendations | 247-248 (skim) |
| Policy Options for the Future | 249-292 (skim) |
| Syntehsis, Findings, and Recommendations | 293-340 (skim) |
| A - Contributors to the NRC Project on National Cryptographic Policy | 341-352 (skim) |
| B - Glossary | 353-363 (skim) |
| C - A Brief Primer on Cryptography | 364-395 (skim) |
| D - An Overview of Electronic Surveillance: History and Current Status | 396-413 (skim) |
| E - A Brief History of Cryptography Policy | 414-420 (skim) |
| F - A Brief Primer on Intelligence | 421-429 (skim) |
| G - The International Scope of Cryptography Policy | 430-449 (skim) |
| H - Summary of Important Requirements for a Public-Key Infrastructure | 450-454 (skim) |
| I - Industry-Specific Dimensions of Security | 455-468 (skim) |
| J - Examples of Risks Posed by Unprotected Information | 469-473 (skim) |
| K - Cryptographic Applications Programming Interfaces | 474-476 (skim) |
| L - Other Looming Issues Related to Cryptography Policy | 477-484 (skim) |
| M - Federal Information Processing Standards | 485-488 (skim) |
| N - Laws, Regulations, and Documents Relevant to Cryptography | 489-676 (skim) |
| Index | 677-688 (skim) |