Encryption: Who Holds the Keys?

The Free essays given on our site were donated by anonymous users and should not be viewed as samples of our custom writing service. You are welcome to use them to inspire yourself for writing your own term paper. If you need a custom term paper related to the subject of Computers or Encryption: Who Holds the Keys?, you can hire a professional writer here in just a few clicks.
Encryption: Who Holds the Keys? In an opinion that prophetically predated the computer age, Supreme Court Justice Louis Brandeis warned, "Ways may some day be developed by which the government, without removing papers from secret drawers, can reproduce them in court" (Bamford 3). For Bandeis and the rest of 1920's society, such technology would seem almost magical. However, for some time now the government and everyone else can examine papers without removing them from "secret drawers." How is this possible? It is possible because the days of secret drawers for documents and information are long gone. Consider this scenario: A report written by a businessperson in New York must be discussed over the phone with an associate in Tokyo, examined by the company lawyers in Washington D.C., and finally submitted by e-mail to the companies vice president in San Francisco. All of this happens in a matter of hours. In the meantime, however, elements of the report bounce off countless computer networks and satellites. As it travels down the information super highway it can easily be hijacked by anyone with the technical know-how. This report is no more secure than if it were printed on the front page of the Washington Post. The answer to this situation is the encryption of voice and data. "Encryption is the altering of data so that it is not usable unless the changes are undone" (Williams 553). When data and voice are properly encrypted, the parties involved can be fairly certain their information will not be hijacked. That is as long as the Clinton administration doesn't get their way. The U.S. government has acknowledged the importance of encryption to businesses, industries, and citizens. It also observes that criminal elements of society also see encryption's importance as well and could use it to evade the law. So, the Clinton administration has announced a public policy, which as Dorothy Denning explains it gives Americans the highest level of data security, but denies it to criminals. This policy lead to the development of the Clipper chip. The Clipper chip is a device that can encrypt voice and data, but contains a "back door," so that if criminals are using it, law enforcement agencies can decode the information (Levy 3). This encryption chip would use the SKIPJACK encryption algorithm. It contains a "back door" that allows security agents the means to decipher and monitor secure messages. The National Security Agency developed the Clipper chip. The algorithms for the Clipper chip have been made classified by the N.S.A. (Electronic Privacy 1). When activated the Clipper chip would encode the conversation or data. Only the Clipper device on the other end could decode it. If the message were intercepted it would be unintelligible (Levy 8). The National Institute of Standards and Technology and the Automated Systems Division of the Department of the Treasury hold the keys to the "back door" of the Clipper chip. Both of which are agencies of the executive branch of government. These keys were divided among the above agencies to prevent government abuse (Wired 1-2). The Clinton administrations plan to secure the information super highway while cracking down on crime turned into an explosive controversy. With the government and select cryptographers on the side of the Clipper chip and civil rights advocates opposing it. Those who side with the governments planed use of the Clipper chip feel its benefits clearly out way any harm it may cause. They believe that catching criminals is more important than our most basic freedoms. Is the catching a few criminals worth giving up any freedom? Encryption is a very important way of protecting our information, but the government should not be allowed the keys to decode it. As John Perry Barlow puts it, "trusting the government with your privacy is like trusting a peeping tom to install your window blinds (Wired 2)." Many of the arguments against the Clipper chip deal with its actual ability to catch criminals. Most experts feel its crime fighting abilities are way over rated. Since Clipper is voluntary, it is unlikely that serious criminals will even use it. Criminals can use one of any number of other encryption devices. These other types of encryption may be weaker than the Clipper chip, but the government will not hold the keys to unlocking them so easily (Wired 2). So if this chip will not halt crime, what will it do? Stunt industry and commerce say Clipper opponents. The U.S. encryption industry has become a billion-dollar a year industry. If the Clipper chip were to become mandatory this industry would all but wither away (Vesely 2). Consumers should be wary of an encryption algorithm that is classified. Using an undisclosed algorithm is simply poor policy for a consumer. Without intense scrutiny it is impossible to know how secure an algorithm really is. Even though one study shows it to be superior encryption device, it takes hundreds of cryptologists investigating an algorithm for serious consumers to be sure of its quality. It only makes sense for a policy such as the Clipper chip, which will effect millions of people for decades, to undergo the h

Our inspirational collection of essays and research papers is available for free to our registered users

Related Essays on Computers

Programming is just problem solving

A computer cannot think, so this means that in order to get it to do any useful work, a user must provide it with a program. A program is a list of instructions that describe how to solve a particular...

read more
Bill Gates and His computer Empire

Bill Gates and His Computer Empire Just past 9 PM on October 28, 1955, the man who would revolutionize the computer industry as we know it, was born. The son of Bill Jr. and Mary Gates was named ...

read more
The Field of Artificial Intelligence

The Field of Artificial Intelligence: Biological 'Thinking' Machines Attempting to Create Mechanical 'Thinking' Machines Artificial intelligence, abbreviated AI, is a combination of the fields...

read more
computer ethics and crime

Introduction Legality, piracy, ethics, effects, moral dilemmas, motives, age, involvement, types - encryption are all main issues in Computer Crimes in todays world. How do we determine someone f...

read more
Geographic Information Systems

GIS: Strategic Planning and Management Through The Application of Computer Technology On the walls of caves near Lascaux, France, Cro-Magnon hunters drew pictures of the animals they hunted 35,...

read more
History of the Internet

Many years ago a network was born it only had several computers were connected and now that same network has millions of computers connected at all times, it's called the Internet. This paper will ex...

read more