Security - Global Cryptography
Tar pit
- Changing Export Controls
- Differing Domestic Use Controls
- Changing Algorithms
Flexibility is key
- Emergence of MS/CAPI, CDSA
- Key recovery for stored data
- “Operator Action” alternative for network encryption
- Policy based cryptography infrastructures
Author | Title | Track | Home