When.com Web Search

  1. Ad

    related to: cryptography laws in the us

Search results

  1. Results From The WOW.Com Content Network
  2. Cryptography law - Wikipedia

    en.wikipedia.org/wiki/Cryptography_law

    In the United States, the federal criminal case of United States v. Fricosu addressed whether a search warrant can compel a person to reveal an encryption passphrase or password. [22] The Electronic Frontier Foundation (EFF) argued that this is a violation of the protection from self-incrimination given by the Fifth Amendment. [23]

  3. Export of cryptography from the United States - Wikipedia

    en.wikipedia.org/wiki/Export_of_cryptography...

    Crypto law survey; Bureau of Industry and Security — An overview of the US export regulations can be found in the licensing basics page. Whitfield Diffie and Susan Landau, The Export of Cryptography in the 20th and the 21st Centuries. In Karl de Leeuw, Jan Bergstra, ed. The history of information security. A comprehensive handbook.

  4. Bernstein v. United States - Wikipedia

    en.wikipedia.org/wiki/Bernstein_v._United_States

    Bernstein v. United States was a series of court cases filed by Daniel J. Bernstein, a mathematics Ph.D. student at the University of California, Berkeley, challenging U.S. government restrictions on the export of cryptographic software. In the early 1990s, the U.S. government classified encryption software as a "munition," imposing strict ...

  5. Export of cryptography - Wikipedia

    en.wikipedia.org/wiki/Export_of_cryptography

    The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.. In the early days of the Cold War, the United States and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc.

  6. Computer Security Act of 1987 - Wikipedia

    en.wikipedia.org/wiki/Computer_Security_Act_of_1987

    Signed into law by President Ronald Reagan on January 8, 1988 The Computer Security Act of 1987 , Public Law No. 100-235 (H.R. 145), (Jan. 8, 1988), is a United States federal law enacted in 1987. It is intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable ...

  7. Restrictions on the import of cryptography - Wikipedia

    en.wikipedia.org/wiki/Restrictions_on_the_import...

    Countries may wish to restrict import of cryptography technologies for a number of reasons: Imported cryptography may have backdoors or security holes (e.g. the FREAK vulnerability), intentional or not, which allows the country or group who created the backdoor technology, for example the National Security Agency (NSA), to spy on persons using the imported cryptography; therefore the use of ...

  8. NSA cryptography - Wikipedia

    en.wikipedia.org/wiki/NSA_Cryptography

    A Type 1 Product refers to an NSA endorsed classified or controlled cryptographic item for classified or sensitive U.S. government information, including cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed.

  9. Electronic Signatures in Global and National Commerce Act

    en.wikipedia.org/wiki/Electronic_Signatures_in...

    The Electronic Signatures in Global and National Commerce Act (ESIGN, Pub. L. 106–229 (text), 114 Stat. 464, enacted June 30, 2000, 15 U.S.C. ch. 96) is a United States federal law, passed by the U.S. Congress to facilitate the use of electronic records and electronic signatures in interstate and foreign commerce.