From the course: Cryptography: Technologies for Securing Data and Communications
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Policy challenges
From the course: Cryptography: Technologies for Securing Data and Communications
Policy challenges
(upbeat music) (text whooshes) (screen whooshes) - There are a number of policy challenges around the idea of cryptographic back doors. With encryption becoming widespread and being very strong, there are parties who object to this and want to find ways to decrypt information. These may be individuals in law enforcement who are concerned with enforcing laws against terrorism, crime, human trafficking, and want to be able to access information with a valid warrant. These may also be national agencies who are interested in monitoring communication for issues of anti-terrorism encountering espionage. However, the algorithms have been designed to be strong, and they're not easily broken. (upbeat music) The agencies and individuals who want to have access to encrypted communication advocate for building in back doors or sometimes called golden keys. The idea is with valid reasons, they can use these back doors or golden keys to access the information and communication that is encrypted…