Cryptography Reference
In-Depth Information
20 .
In certain jurisdictions, cryptographic technology is subject to export controls.
(a) Find an example of a country that currently has export controls on
cryptographic technology and summarise the extent of these controls.
(b) What potential problems do export controls present, given that cryptogra-
phy is deployed in everyday applications?
21 .
In contrast to our usage, the term 'proprietary'
is often used to describe
something that is subject to a patent.
(a) Find some examples of encryption algorithms that, using our terminology,
are:
i. publicly known and subject to patent issues;
ii. proprietary but not subject to patent issues;
iii. proprietary and subject to patent issues.
(b) Do you think that it is more, or less, likely that a proprietary encryption
algorithm is subject to patent issues than a publicly known encryption
algorithm?
Search WWH ::




Custom Search