Paper Details  
 
   

Has Bibliography
11 Pages
2748 Words

 
   
   
    Filter Topics  
 
     
   
 

Computer Crime and Ethics

easy-to-use, highly secure computer program that encrypts and decrypts data. Unlike DES or RSA, PGP software gives the user a choice. He can use a single-key cryptography (useful for files that only he will read) or a public-key / secret-key (useful for encrypting e-mail and files that other people will read). Many people are fooled by the expression Pretty Good Privacy. The name simply reflects the humor of PGPs creator, Phillip Zimmerman. PGP is strong stuff, and is virtually uncrackable. Even U.S. Government snoopers cant break it. Critics of PGP like to state that the package is too sophisticated and too secure for anybody but paranoids. These naysayers are probably of the type who would dismiss an employee for being too educated.Data encryption has a few legal barriers restricting it. The U. S. government fears the wide spread usage of encryption because they are afraid that they will not be able to crack encrypted transmissions. As a result, the government would not be able to snoop as effectively as in the past. The Clipper Chip, an encryption chip, was proposed by the U. S. government to allow people to use encrypted device while still allowing the government to break the codes if necessary. The initiative behind this chip may be the boldest, practical technological assault against privacy ever proposed by a government. The U.S. Government alleges that the Clipper has two purposes: 1) to prohibit (non-government) citizens and companies from eavesdropping on our voice communications, and 2) to permit U.S. law enforcement agents to eavesdrop on all voice communications, if these agents have legal authorization. The Clipper Chip is placed into devices such as digital phones. The key to decoding the encrypted messages would be kept by two separate government agencies. Each agency would have half of the key to prevent abuse. Law enforcement agencies would be able to obtain the keys by obtaining a warrant. When considering secur...

< Prev Page 8 of 11 Next >

    More on Computer Crime and Ethics...

    Loading...
 
Copyright © 1999 - 2025 CollegeTermPapers.com. All Rights Reserved. DMCA