- 영문명
- The Encryption Policy against Cybercrime
- 발행기관
- 개인저작물
- 저자명
- 정완(Choung, Wan)
- 간행물 정보
- 『개인저작물 - 법학·행정』제12권 제1호, 71~93쪽, 전체 23쪽
- 주제분류
- 법학 > 개인저작물
- 파일형태
- 발행일자
- 2008.02.01

국문 초록
영문 초록
A variety of `key recovery`, `key escrow,` and `trusted-party` encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies.
This research examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys.
The deployment of key-recovery-based encryption infrastructures to meet law enforcement`s stated specifications will result in substantial sacrifices in security and greatly increased costs to the end-user. Building the secure computer-communication infrastructures necessary to provide adequate technological underpinnings demanded by these requirements would be enormously complex and is far beyond the experience and current competency of the field. Even if such infrastructures could be built, the risks and costs of such an operating environment may ultimately prove unacceptable. In addition, these infrastructures would generally require extraordinary levels of human trustworthiness.
These difficulties are a function of the basic government access requirements proposed for key-recovery encryption systems. They exist regardless of the design of the recovery systems - whether the systems use private-key cryptography or public-key cryptography ; whether the databases are split with secret-sharing techniques or maintained in a single hardened secure facility; whether the recovery services provide private keys, session keys, or merely decrypt specific data as needed; and whether there is a single centralized infrastructure, many decentralized infrastructures, or a collection of different approaches.
Attempts to force the widespread adoption of key-recovery encryption through export controls, import or domestic use regulations, or international standards should be considered in light of these factors. The public must carefully consider the costs and benefits of embracing government-access key recovery before imposing the new security risks and spending the huge investment required (potentially many billions of dollars, in direct an indirect costs) to deploy a global key recovery infrastructure.
목차
Ⅰ. 서언
Ⅱ. 정보사회와 암호기술의 필요성
Ⅲ. 암호기술의 순기능과 역기능(부정사용)
Ⅳ. 법집행력 확보의 필요성과 타당성
Ⅴ. 암호정책의 개선방안
Ⅵ. 결어
참고문헌
ABSTRACT
키워드
해당간행물 수록 논문
참고문헌
최근 이용한 논문
교보eBook 첫 방문을 환영 합니다!
신규가입 혜택 지급이 완료 되었습니다.
바로 사용 가능한 교보e캐시 1,000원 (유효기간 7일)
지금 바로 교보eBook의 다양한 콘텐츠를 이용해 보세요!
