Abstract

ABSTRACT This article examines the foundational principles and protocols that guide the development, implementation and use of encryption and their relevance and impact on technology law and policy. It first focuses on the technical aspects of encryption and explains the meanings of key terms and the different kinds and uses of this technology. It then expounds on the technical principles and protocols of encryption including information security, openness, provable security, and its adversarial nature. The article thereafter analyses the significance and import of these standards and rules on the proposed ghost protocol in encrypted messaging services and encryption law and policy more generally. It argues that technical principles such as information security, primacy of keys and resistance to attacks should be recognised and upheld in the development and adoption of encryption regulation.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.