Category Archives: Cryptography

Off to Anguilla

I’m off today to Anguilla, a beautiful small island in the Carribean (near St. Maarten), where I’ll be attending the annual Financial Cryptography ’06 conference sponsored by the International Financial Cryptography Association. I attended the very first Financial Crypto conference ten years ago, and had a great time. Now I’ve been invited back for a tenth-year retrospective.

Yes, I hear you thinking, it’s a tough life being a law professor. But consider: it takes seven hours just to get to Anguilla from Miami. And the forecast is for pretty solid rain all week.

Even if it rains, it will be wonderful to see some people I’d lost touch with as crypto moved off the front burner of my academic writing. I used to write a lot about the regulation of cryptography, including The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995), Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. Pitt. J. L. & Com. 395 (1996), It Came From Planet Clipper, 1996 U. Chi. L. Forum 15, and of course Digital Signatures Today in Financial Cryptography 287 (Rafael Hirschfeld ed., 1997) (Springer Lecture Notes in Computer Science vol. 1318), a write up of my talk at FC #1. Nowadays I write more about things that use crypto than about crypto itself.

Blogging may be quite light for the next few days. Meanwhile, to tide you over, here’s an abstract of the talk I’ll be giving, called “Are We All Cypherpunks Yet?”:

Continue reading

Posted in Cryptography, Talks & Conferences | 3 Comments

Is Round Two of the Crypto Wars Upon Us?

Last week I sent off a book review in which, among other things, I fretted about a possible second round to the Crypto Wars. (See my papers on the Clipper chip and its aftermath for info about round one.)

Although I believed what I wrote, I did worry, as I often do, that maybe I was being a little alarmist. Now this:

Symantec refuses to sell audit tool outside the US | The Register: Symantec has stopped selling a password auditing tool to customers outside the US and Canada, citing US Government export regulations.

The Reg says Symantic confirms this block is due to government regulations, but won’t give details. So we don’t know if they’re being over-cautious … or were leaned on.

Posted in Cryptography | Comments Off on Is Round Two of the Crypto Wars Upon Us?

Crypto Policy Reaches for the End of the Line

Security bosses seek to dissolve encryption bans: An international security consortium is set to lobby governments around the world to withdraw restrictions on encryption standards.

The Jericho Forum, whose membership includes many chief security officers from FTSE 100 companies, will push for the removal of encryption restrictions within the next three-to-five years.

The odd thing about this is that it comes at a time in which governments are making noises about wanting more wiretaps and more control (see e.g. the move to make VOIP and thus in effect every Internet communication easily tapped). And in the background are complaints about encryption.

On the other hand, one gets the impression that government cracking technology available to civilian law enforcement has taken some leaps forward lately, which can only make you wonder what the NSA is holding back.

Posted in Cryptography | 2 Comments

Bruce Schneier Has A Blog

Bruce Scheneier, author of “Applied Cryptography” and other wonderful books, has a blog called Schneier on Security. I'm sure it will be very good.

Posted in Blogs, Civil Liberties, Cryptography | Comments Off on Bruce Schneier Has A Blog

US Sued for Blocking International Editing

Almost a year ago I blogged the US Treasury export control rules being used to prevent publishers from editing certain foreign manuscripts.

I'm happy to report that a group of publishers are (finally) suing to end curbs on editing. They deserve to win.

Posted in Cryptography, Law: Free Speech | 1 Comment

Disinfo? Breakthrough? How Should I Know

The NSA is hinting hard that it has cracked the fiber optic barrier and finds encryption 'no more than speed bump'. As usual, might be true (esp. the parts about tracking phones and tapping undersea fiber), but bring truckload of salt to the party.

Posted in Cryptography | 2 Comments