Week 3: Law & Internet Seminar
The Cryptography Wars
Cryptography is important to many of the activities we will discussing
this semester. It plays a role in securing communications, in hiding information
(thus enabling privacy and anonymity), and in Internet commerce, digital
cash, secure digital signatures. There are applications to intellectual
property too, such as "digital watermarks". .
Reading:
-
Philip
Zimmermann, Why Do You Need PGP?
-
A. Michael Froomkin, The
Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution,
143 U. Penn. L. Rev. 709 (1995)). There is more than you need
to know about the Clipper Chip here. I suggest you skim Part 1 but pay
special attention to the section called "How
Clipper Works", try skipping Part 2, and concentrate on parts 3 &
4.
-
A. Michael Froomkin, It
Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow"
-
Compare the decisions in the Bernstein
I, Bernstein
II, and Bernstein
III cases with the decision in Karn
v. U.S. (Note: you need to page down a little to find the text of the
decision).
EXTRA EXTRA
The Bernstein stay decision is now on-line. Also, here is an
unofficial but much more readable version of Bernstein III
-
Skim the "key escrow" rules added
to the EAR early this year [the EAR replaced the ITAR].
-
Dr. Denning's analysis of the (non?)dangers of cryptography (not available
on the web: handout available from distribution center).
Doing:
-
Visit the web pages of all seminar participants as they become available.
-
Add a new hypertext link to your homepage.
-
Add a "mailto" link to your homepage that allows readers to send you an
email message.
-
Put a "last modified" date on your page(s). Please keep these accurate
as the seminar progresses.
Late-breaking news
This is not required reading.
Optional
Seminar
homepage.
Last week's
assignment.
Next week's
assignment.
Version 2.1b Oct. 9, 1997.