Decrypting the Encryption Debate Decrypting the Encryption Debate

Decrypting the Encryption Debate

A Framework for Decision Makers

    • £32.99
    • £32.99

Publisher Description

Encryption protects information stored on smartphones, laptops, and other devices - in some cases by default. Encrypted communications are provided by widely used computing devices and services - such as smartphones, laptops, and messaging applications - that are used by hundreds of millions of users. Individuals, organizations, and governments rely on encryption to counter threats from a wide range of actors, including unsophisticated and sophisticated criminals, foreign intelligence agencies, and repressive governments. Encryption on its own does not solve the challenge of providing effective security for data and systems, but it is an important tool.

At the same time, encryption is relied on by criminals to avoid investigation and prosecution, including criminals who may unknowingly benefit from default settings as well as those who deliberately use encryption. Thus, encryption complicates law enforcement and intelligence investigations. When communications are encrypted "end-to-end," intercepted messages cannot be understood. When a smartphone is locked and encrypted, the contents cannot be read if the phone is seized by investigators.

Decrypting the Encryption Debate reviews how encryption is used, including its applications to cybersecurity; its role in protecting privacy and civil liberties; the needs of law enforcement and the intelligence community for information; technical and policy options for accessing plaintext; and the international landscape. This book describes the context in which decisions about providing authorized government agencies access to the plaintext version of encrypted information would be made and identifies and characterizes possible mechanisms and alternative means of obtaining information.

GENRE
Computing & Internet
RELEASED
2018
7 May
LANGUAGE
EN
English
LENGTH
118
Pages
PUBLISHER
National Academies Press
SIZE
1.1
MB

More Books Like This

Cryptography's Role in Securing the Information Society Cryptography's Role in Securing the Information Society
1996
Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext
2016
Dynamic Tensions: Essays on Balancing Privacy, Security and Identity in the 21st Century Dynamic Tensions: Essays on Balancing Privacy, Security and Identity in the 21st Century
2015
Cyberspace and Cybersecurity Cyberspace and Cybersecurity
2017
ISSE 2008 Securing Electronic Business Processes ISSE 2008 Securing Electronic Business Processes
2009
Toward Better Usability, Security, and Privacy of Information Technology Toward Better Usability, Security, and Privacy of Information Technology
2010

More Books by National Academies of Sciences, Engineering, and Medicine

Thriving on Our Changing Planet: A Decadal Strategy for Earth Observation from Space Thriving on Our Changing Planet: A Decadal Strategy for Earth Observation from Space
2019
The Integration of the Humanities and Arts with Sciences, Engineering, and Medicine in Higher Education The Integration of the Humanities and Arts with Sciences, Engineering, and Medicine in Higher Education
2018
In-Time Aviation Safety Management In-Time Aviation Safety Management
2018
Facilitating Health Communication with Immigrant, Refugee, and Migrant Populations Through the Use of Health Literacy and Community Engagement Strategies Facilitating Health Communication with Immigrant, Refugee, and Migrant Populations Through the Use of Health Literacy and Community Engagement Strategies
2017
Chemical Laboratory Safety and Security Chemical Laboratory Safety and Security
2016
An Assessment of the National Institute of Standards and Technology Center for Neutron Research An Assessment of the National Institute of Standards and Technology Center for Neutron Research
2024