Governmental Regulations

The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit DES and similar products are allowed after a technical review, just like encryption commodities and software with key lengths of 64-bits or less which meet the mass market requirements.
For more information see:
http://www.wassenaar.org/

Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries.

This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently.

For more information on this see:
http://www.heise.de/ct/97/04/032/
http://www.fitug.de/ulf/krypto/verbot.html#welt

Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom.
The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily.

"Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible."
(Arnold G. Reinhold)


The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the PGP, stay under governmental control.

The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably?
Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands.
What about civil rights or Human Rights?

TEXTBLOCK 1/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438659135
 
Basics: Rights Recognized

Copyright protection generally means that certain uses of a work are lawful only if they are done with the authorization of the owner of the copyright. The most typical are the following:

- copying or reproducing a work
- performing a work in public
- making a sound recording of a work
- making a motion picture of a work
- broadcasting a work
- translating a work
- adapting a work

Under certain national laws, some of these rights, which are referred to, as "economic rights'" are not exclusive rights of authorization but in specific cases, merely rights to remuneration. Some strictly determined uses (for example quotations or the use of works by way of illustration for teaching) are completely free, that is, they require neither authorization of, nor remuneration for, the owner of the copyright. This practice is described as fair use.

In addition to economic rights, authors enjoy "moral rights" on the basis of which they have the right to claim their authorship and require that their names be indicated on the copies of the work and in connection with other uses thereof. They also have the right to oppose the mutilation or deformation of their creations.

The owner of a copyright may usually transfer his right or may license certain uses of his work. Moral rights are generally inalienable and remain with the creator even after he has transferred his economic rights, although the author may waive their exercise.

Furthermore there exist rights related to copyright that are referred to as "neighboring rights". In general there are three kinds of neighboring rights: 1) the rights of performing artists in their performances, 2) the rights of producers of phonograms in their phonograms, and 3) the rights of broadcasting organizations in their radio and television programs. Neighboring rights attempt to protect those who assist intellectual creators to communicate their message and to disseminate their works to the public at large.

TEXTBLOCK 2/3 // URL: http://world-information.org/wio/infostructure/100437611725/100438659584
 
Timeline 1970-2000 AD

1971 IBM's work on the Lucifer cipher and the work of the NSA lead to the U.S. Data Encryption Standard (= DES)

1976 Whitfield Diffie and Martin Hellman publish their book New Directions in Cryptography, playing with the idea of public key cryptography

1977/78 the RSA algorithm is developed by Ron Rivest, Adi Shamir and Leonard M. Adleman and is published

1984 Congress passes Comprehensive Crime Control Act

- The Hacker Quarterly is founded

1986 Computer Fraud and Abuse Act is passed in the USA

- Electronic Communications Privacy Act

1987 Chicago prosecutors found Computer Fraud and Abuse Task Force

1988 U.S. Secret Service covertly videotapes a hacker convention

1989 NuPrometheus League distributes Apple Computer software

1990 - IDEA, using a 128-bit key, is supposed to replace DES

- Charles H. Bennett and Gilles Brassard publish their work on Quantum Cryptography

- Martin Luther King Day Crash strikes AT&T long-distance network nationwide


1991 PGP (= Pretty Good Privacy) is released as freeware on the Internet, soon becoming worldwide state of the art; its creator is Phil Zimmermann

- one of the first conferences for Computers, Freedom and Privacy takes place in San Francisco

- AT&T phone crash; New York City and various airports get affected

1993 the U.S. government announces to introduce the Clipper Chip, an idea that provokes many political discussions during the following years

1994 Ron Rivest releases another algorithm, the RC5, on the Internet

- the blowfish encryption algorithm, a 64-bit block cipher with a key-length up to 448 bits, is designed by Bruce Schneier

1990s work on quantum computer and quantum cryptography

- work on biometrics for authentication (finger prints, the iris, smells, etc.)

1996 France liberates its cryptography law: one now can use cryptography if registered

- OECD issues Cryptography Policy Guidelines; a paper calling for encryption exports-standards and unrestricted access to encryption products

1997 April European Commission issues Electronic Commerce Initiative, in favor of strong encryption

1997 June PGP 5.0 Freeware widely available for non-commercial use

1997 June 56-bit DES code cracked by a network of 14,000 computers

1997 August U.S. judge assesses encryption export regulations as violation of the First Amendment

1998 February foundation of Americans for Computer Privacy, a broad coalition in opposition to the U.S. cryptography policy

1998 March PGP announces plans to sell encryption products outside the USA

1998 April NSA issues a report about the risks of key recovery systems

1998 July DES code cracked in 56 hours by researchers in Silicon Valley

1998 October Finnish government agrees to unrestricted export of strong encryption

1999 January RSA Data Security, establishes worldwide distribution of encryption product outside the USA

- National Institute of Standards and Technologies announces that 56-bit DES is not safe compared to Triple DES

- 56-bit DES code is cracked in 22 hours and 15 minutes

1999 May 27 United Kingdom speaks out against key recovery

1999 Sept: the USA announce to stop the restriction of cryptography-exports

2000 as the German government wants to elaborate a cryptography-law, different organizations start a campaign against that law

- computer hackers do no longer only visit websites and change little details there but cause breakdowns of entire systems, producing big economic losses

for further information about the history of cryptography see:
http://www.clark.net/pub/cme/html/timeline.html
http://www.math.nmsu.edu/~crypto/Timeline.html
http://fly.hiwaay.net/~paul/cryptology/history.html
http://www.achiever.com/freehmpg/cryptology/hocryp.html
http://all.net/books/ip/Chap2-1.html
http://cryptome.org/ukpk-alt.htm
http://www.iwm.org.uk/online/enigma/eni-intro.htm
http://www.achiever.com/freehmpg/cryptology/cryptofr.html
http://www.cdt.org/crypto/milestones.shtml

for information about hacker's history see:
http://www.farcaster.com/sterling/chronology.htm:

TEXTBLOCK 3/3 // URL: http://world-information.org/wio/infostructure/100437611776/100438658960
 
IDEA

IDEA is another symmetric-key system. It is a block cipher, operating on 64-bit plaintext blocks, having a key-length of 128 bits.

INDEXCARD, 1/3
 
Leonard M. Adleman

Leonard M. Adleman was one of three persons in a team to invent the RSA public-key cryptosystem. The co-authors were Adi Shamir and Ron Rivest.

INDEXCARD, 2/3
 
McCann Erickson

Alfred W. Erickson founded the advertising agency McCann Erickson in 1902. In1913 McCann opened a San Francisco office and a Detroit office that moved to Cleveland in 1915. With operations in 127 countries, McCann reaches across the globe and continues to expand its capabilities through start-up units and acquisitions. McCann has recently added creative resources in the local, pan-regional and global arenas and also extended its expertise in specialized marketing categories, such as business-to-business and high-tech communications.

INDEXCARD, 3/3