Skip to main content

Saving dollars makes sense of crypto export controls

  • Conference paper
  • First Online:
Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

  • 233 Accesses

Abstract

This analysis looks at the economic basis of US crypto export controls. The financial implications to policy makers and policy targets are considered. From an economic point of view, US crypto export controls are well founded, but risky for the US in the longer term. Prospects for change depend on the reactions of key players targeted by the policies and the perception of long term risk by the policy makers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Kent, et al, “Codes, Keys and Conflicts: Issues in U.S. Crypto Policy,” Report of a Special Panel of the ACM U.S. Public Policy Committee (USACM) June 1994

    Google Scholar 

  2. Ross Anderson, “Crypto in Europe — Markets, Law, and Policy”, Cryptography Policy and Algorithms Conference, Brisbane, Australia (Pre-Proceedings), July 1995.

    Google Scholar 

  3. “Key Vote Nears On Encryption Exports”, newsbytes@clarinet.com, 18 Jul 94.

    Google Scholar 

  4. Peter Drucker, “The Coming of the New Organisation,” Harvard Business Review, January–February 1988

    Google Scholar 

  5. “Exports propel the U.S. electronics industry to new heights,” Electronic Engineering Times, May 29, 1995, v850 p46

    Google Scholar 

  6. “Vendors say U.S. encryption export restrictions threaten Internet Security,” InfoWorld, Mar 06, 1995, v17, no 10, p 10)

    Google Scholar 

  7. “Lotus Notes Security White Paper”, Lotus development Corporation, 1992.

    Google Scholar 

  8. W. Madsen, “Data Privacy: Legislation and Intelligence Agency Threats,” Computer Security and Information Integrity, Elsevier, Amsterdam, 1991, (IFIP/Sec '90 Proceedings).

    Google Scholar 

  9. David G. Major, FBI Intelligence Division, “Economic Espionage and the Future of U.S. National Competitiveness,” reprinted by Datapro Information Services Group, Delran, N.J.

    Google Scholar 

  10. L. Hoffman, et al, “Cryptography: Policy and Technology Trends,” National Institute of Standards, Gaitersberg, MD.

    Google Scholar 

  11. Organisation for Economic Co-Operation and Development, Committee for Information, Computer, and Communications Policy, Guidelines for the Security of Information Systems, Paris, 1992.

    Google Scholar 

  12. DR. RON RIVEST ON THE DIFFICULTY OF FACTORING, ftp://rsa.com/pub/ciphertext/vol1n1.txt.

    Google Scholar 

  13. “GUIDELINES FOR PREPARING COMMODITY JURISDICTION REQUESTS”, US Dept of State, Bureau of Politico-Military Affairs, Office of Defense Trade Controls, 17 Sep 1992

    Google Scholar 

  14. Michael Wiener, “Efficient DES Key Search”, presented at Crypto '93.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ames, M. (1996). Saving dollars makes sense of crypto export controls. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032348

Download citation

  • DOI: https://doi.org/10.1007/BFb0032348

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics