Cryptography's role in securing the information society /

Saved in:
Bibliographic Details
Imprint:Washington, DC : National Academy Press, 1996.
Description:xxx, 688 pages ; 24 cm
Language:English
Subject:Telecommunication systems -- Security measures -- Government policy -- United States.
Cryptography.
Télécommunications, Systèmes de -- Sécurité -- Mesures -- Politique gouvernementale -- États-Unis.
Cryptographie.
Cryptography.
United States.
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/2539535
Hidden Bibliographic Details
Other authors / contributors:Dam, Kenneth W.
Lin, Herbert.
National Research Council (U.S.). Committee to Study National Cryptography Policy.
ISBN:0309054753
9780309054751
Notes:"Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council."
Includes bibliographical references and index.
Online version available via National Academies Press home page.
Summary:"For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions."--BOOK JACKET. "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket.
Other form:Online version: Cryptography's role in securing the information society. Washington, D.C. : National Academy Press, 1996
Online version: Cryptography's role in securing the information society. Washington, D.C. : National Academy Press, 1996
Govt.docs classification:NA 2.2/2:C 88
LEADER 06461cam a2200649 a 4500
001 2539535
003 ICU
005 20200923133011.3
008 960705s1996 dcu b 001 0 eng
010 |a 96068943 
019 |a 36039399  |a 963270308 
020 |a 0309054753 
020 |a 9780309054751 
035 |a (OCoLC)34932315  |z (OCoLC)36039399  |z (OCoLC)963270308 
040 |a DLC  |b eng  |c DLC  |d SCW  |d GZM  |d ASL  |d BAKER  |d NLGGC  |d BTCTA  |d YDXCP  |d LVB  |d ZNL  |d HSA  |d ZWZ  |d GEBAY  |d BDX  |d DEBBG  |d UII  |d OCLCQ  |d COF  |d CVM  |d OCLCA  |d OCLCQ  |d IOG  |d OCLCO  |d OCLCF  |d CPO  |d OCLCQ  |d BGU  |d CGU 
043 |a n-us--- 
049 |a CGUA 
050 0 0 |a TK5102.94  |b .C78 1996 
082 0 4 |a 005.82  |b Cry 
084 |a 54.62  |2 bcl 
084 |a PZ 4900  |2 rvk 
084 |a ST 276  |2 rvk 
084 |a DAT 465f  |2 stub 
086 0 |a NA 2.2/2:C 88 
245 0 0 |a Cryptography's role in securing the information society /  |c Kenneth W. Dam and Herbert S. Lin, editors. 
260 |a Washington, DC :  |b National Academy Press,  |c 1996. 
300 |a xxx, 688 pages ;  |c 24 cm 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a unmediated  |b n  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/n 
338 |a volume  |b nc  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/nc 
500 |a "Committee to Study National Cryptography Policy, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council." 
504 |a Includes bibliographical references and index. 
505 0 0 |g 1.  |t Growing Vulnerability in the Information Age --  |g 2.  |t Cryptography: Roles, Market, and Infrastructure --  |g 3.  |t Needs for Access to Encrypted Information --  |g 4.  |t Export Controls --  |g 5.  |t Escrowed Encryption and Related Issues --  |g 6.  |t Other Dimensions of National Cryptography Policy --  |g 7.  |t Policy Options for the Future --  |g 8.  |t Synthesis, Findings, and Recommendations --  |g App. A.  |t Contributors to the NRC Project on National Cryptography Policy --  |g App. B.  |t Glossary --  |g App. C.  |t Brief Primer on Cryptography --  |g App. D.  |t Overview of Electronic Surveillance: History and Current Status --  |g App. E.  |t Brief History of Cryptography Policy --  |g App. F.  |t Brief Primer on Intelligence --  |g App. G.  |t International Scope of Cryptography Policy --  |g App. H.  |t Summary of Important Requirements for a Public-Key Infrastructure --  |g App. I.  |t Industry-Specific Dimensions of Security --  |g App. J.  |t Examples of Risks Posed by Unprotected Information --  |g App. K.  |t Cryptographic Applications Programming Interfaces --  |g App. L.  |t Other Looming Issues Related to Cryptography Policy --  |g App. M.  |t Federal Information Processing Standards --  |g App. N.  |t Laws, Regulations, and Documents Relevant to Cryptography. 
520 1 |a "For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. What is the nature of business markets for cryptography in the United States and abroad? What is the impact of encryption on law enforcement and national security interests? How can cryptography help protect the nation's information infrastructure? This important book provides answers to these and other questions."--BOOK JACKET. "Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence. The book presents a comprehensive examination of U.S. national cryptography policy and the evolution of cryptography from a national security tool a key component of the global information superhighway. It enlarges the scope of policy options and offers specific conclusions and recommendations. The major themes of the book are illustrated throughout with many examples from the worlds of government and business as well as the international network of hackers."--Jacket. 
530 |a Online version available via National Academies Press home page. 
650 0 |a Telecommunication systems  |x Security measures  |x Government policy  |z United States. 
650 0 |a Cryptography.  |0 http://id.loc.gov/authorities/subjects/sh85034453 
650 6 |a Télécommunications, Systèmes de  |x Sécurité  |x Mesures  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Cryptographie. 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
700 1 |a Dam, Kenneth W.  |1 http://isni.org/isni/0000000383011452  |0 http://id.loc.gov/authorities/names/n50038986  |1 http://viaf.org/viaf/267950187 
700 1 |a Lin, Herbert.  |0 http://id.loc.gov/authorities/names/n86039872  |1 http://viaf.org/viaf/112241 
710 2 |a National Research Council (U.S.).  |b Committee to Study National Cryptography Policy.  |0 http://id.loc.gov/authorities/names/no96066835  |1 http://viaf.org/viaf/152749768 
776 0 8 |i Online version:  |t Cryptography's role in securing the information society.  |d Washington, D.C. : National Academy Press, 1996  |w (OCoLC)605360316 
776 0 8 |i Online version:  |t Cryptography's role in securing the information society.  |d Washington, D.C. : National Academy Press, 1996  |w (OCoLC)609921600 
903 |a HeVa 
903 |a Hathi 
929 |a cat 
999 f f |i bf449c48-605f-5f0d-b402-b59cdb1bbb2b  |s 0329c851-04f8-505c-9c24-ab65fb219a1c 
928 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l DLL  |c DLL-Law  |i 3211504 
928 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l DLL  |c DLL-LawC  |i 3211506 
928 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l JCL  |c JCL-Sci  |i 3211507 
927 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l DLL  |c DLL-Law  |b 50899168  |i 4720244 
927 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l DLL  |c DLL-Law  |b 43434857  |i 4720243 
927 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l DLL  |c DLL-LawC  |b 43434775  |i 4720245 
927 |t Library of Congress classification  |a QA76.9.A35C8442 1996  |l JCL  |c JCL-Sci  |e CRERAR  |b 44396874  |i 4720246