Cryptography and Democracy Cryptography and democracy are clearly related to each other when we talk about teledemocracy. Many answers of civilians to certain state institutions can already be posed on the Internet. Many bureaucratic duties can be fulfilled through the Internet as well. But on February 8th 2000 the worldwide first elections on the Internet were performed. The elections themselves were nothing important, students' elections at the University of Osnabrück, Germany. But the project, called i-vote, with a preparation time of 10 months, wrote history. For a correct result, there existed several different encryption processes at the same time, like the digital signature, a blinding for anonymizing the vote and a virtual election paper that had to be encrypted as well, as simple e-mails could have been traced back. The question whether teledemocracy can provide us with a more intensive democracy has to be answered within a different field of questions; here the question is rather about the role of cryptography in this area. The use of cryptography in teledemocracy is inevitable, but does it also re-influence cryptography? Or will it influence the different governments' laws again? The sentence "We are committed to protecting the privacy of your personal information" that can be read as the introduction-sentence at the Free-PC-homepage ( But still we find ourselves overruled by the issue that someone believes to know what is good for us. And our privacy is floating away ... Human Rights call for the right for privacy. We can go on fighting for privacy but anonymity has disappeared long ago. If we leave cookies and other data by visiting websites, we might be anything but surely not anonymous. for more information about privacy and Human Rights see: for re-anonymizing see: "The fight for privacy today will always include the fight for unrestricted access to cryptography tools, for at least getting a slight chance that the buying of a book or any other small thing turns into a chain of messages for someone else's purpose, whether it might be governmental or commercial." (Cypherpunk's Manifesto) for more information on the Cypherpunk's Manifesto see: This year again many conferences on the topic of cryptography take place. For further information see: |
|
Governmental Regulations The new U.S. regulations are based on the Wassenaar Arrangement Revision of 1998, where exports without license of 56 bit For more information see: Seven states stay excluded from the new freedom. These are states like Libya, Iraq, Iran, North Korea and Cuba, altogether states seen as terrorist supporting. No encryption tools may be exported into those countries. This is, what happened in the USA, whereas in Germany the issue of a cryptography-law is still on the agenda. Until now, in Germany, everyone can decide by her-/himself, whether she/he wants to encrypt electronic messages or not. Some organizations fear that this could get changed soon. Therefore an urgent action was organized in February 2000 to demonstrate the government that people want the freedom to decide on their own. One governmental argument is that only very few people actually use cryptography. Therefore the urgent action is organized as a campaign for using it more frequently. For more information on this see: Other European countries have more liberate laws on cryptography, like France. Austria doesn't have any restrictions at all, probably because of a governmental lack of interest more than accepting freedom. The (former) restrictions in the bigger countries influenced and hindered developments for safer key-systems, e.g. the key-length was held down extraordinarily. "Due to the suspicious nature of crypto users I have a feeling DES will be with us forever, we will just keep adding keys and cycles (...). There is a parallel between designing electronic commerce infrastructure today that uses weak cryptography (i.e. 40 or 56 bit keys) and, say, designing air traffic control systems in the '60s using two digit year fields. (...) Just because you can retire before it all blows up doesn't make it any less irresponsible." (Arnold G. Reinhold) The Chinese State Encryption Management Commission (SEMC) announced in March 2000 that only strong encryption tools will have to be registered in the future. Which sounds so nice on first sight, does not mean a lot in reality: any kind of useful encryption technique, like the The restrictions and prohibitions for cryptography are part of the states' wish to acquire more control - in the name of the battle against criminality, probably? Due to the emerging organized criminality the governments want to obtain more freedom of control over citizens. Organizations like the NSA appear as the leaders of such demands. What about civil rights or Human Rights? |
|
Artificial Intelligence Artificial Intelligence is concerned with the simulation of human thinking and emotions in information technology. AI develops "intelligent systems" capable, for example, of learning and logical deduction. AI systems are used for creatively handling large amounts of data (as in data mining), as well as in natural speech processing and image recognition. AI is also used as to support Yahoo AI sites: MIT AI lab: |
|
Expert system Expert systems are advanced computer programs that mimic the knowledge and reasoning capabilities of an expert in a particular discipline. Their creators strive to clone the expertise of one or several human specialists to develop a tool that can be used by the layman to solve difficult or ambiguous problems. Expert systems differ from conventional computer programs as they combine facts with rules that state relations between the facts to achieve a crude form of reasoning analogous to |
|