• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The United States Government argues that without proper regulation of encryption, national security is threatened.

Extracts from this document...


As the medium for communication has transitioned from traditional to digital means, cryptography has transpired into a controversial issue. Recent terrorist attacks have sparked a mass array of political activism in many forms in a plea to prevent future tragedies from occurring. Heightened sensitivity furthermore has emitted strengthened political regulation in the form of national security. Recent Senate initiatives involving cryptography have reiterated both sides of the ethical debate. No compromise currently exists in which cryptography can be safely be regulated while ceasing to overstep the boundaries outlined by the United States constitution. One side of the issue derives the interest of national security. The United States Government argues that without proper regulation of encryption, national security is threatened. On the other side, the rights of privacy are at stake. Advocates argue that Governmental regulation would open a new venue for invasion of personal privacy. Within Cryptology exists the the study of the encryption and decryption of data. Plaintext is the original document that is stored or transmitted via a computer. Ciphertext is the actual encrypted document. Encryption transfers the plaintext into ciphertext, whereas decryption performs the reverse operation. During the encoding, plaintext is combined with "keys" which are numbers or strings of characters known only to the sender and recipient. Ciphertext uses these "keys" to convert the data back into its original form. ...read more.


SKIPJACK's unique structure disallows today's shortcut methods of attack while still providing internal structure to protect national security objectives. With 1 trillion possible keys, SKIPJACK would take 400 billion years to try all of its keys amid today's modern processing power. Key Management Infrastructure (KMI) or Clipper III tried to reform certain aspects to allow private and public keys. KMI relied on certificate authorities to meet government access requirements. However like its antecedent, the KMI proposal was discarded. Despite these events the U.S. Government continues to argue that regulation of cryptography is essential to national security. After the September 11th attacks, Senator Gregg of New Hampshire stated "I am hopeful we can set up a regime that will be fair, that will be subject to the judicial controls necessary to protect the Constitutional rights of people who are law-abiding but will also give our intelligence community the access to the information they need when they know there is somebody out there using encryption technology for the purposes of pursuing a terrorist act in the United States." Although regulation of such encryption could possibly limit some of its uses for illegality, many argue that government has no right to interfere with private digital information. Cryptography is essential for online businesses to provide security to its users. ...read more.


By implementing this act, citizens are protected from the invasions of privacy that could result from the regulation of encryption. Cryptography will remain a controversial issue. Future tragedies involving ethical issues based on encryption will continue to ignite debate on whether cryptography should be regulated. Many mediums across digital firms can be used for both protective as well as criminal activities. Means of security originally used to protect will persistently be twisted by those seeking to harm. The underlying question that remains is whether regulation is more beneficial then deregulation. Personally I believe that the notion of regulating encryption at this phase of the global network is not feasible. Encryption is currently so widely distributed that regulation would hurt more people then it would protect. Regulating such a powerful tool for security in light of a few who abuse its power is unhealthy. The Fourth Amendment is applicable to a home file cabinet just as it is to files within a home computer. It would be elusive to believe that a standardized encryption could possibly be implemented and regulated in a way that eliminates its illegal usages. Although the digital age creates ambiguity within new constitutional mythology and interpretation, our foundational principles should continue to be taken in their original proper meaning. As the United States continues to expand its technological boundaries, it must nevertheless cease to preserve the constitution in its literal context. 1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Politics section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Politics essays

  1. British Government and the Constitution "Government without a Constitution is power without a right."

    And so parliament endured and grew in power. The Protestant Monarch, William of Orange, securing with parliament the preserved legal ruling that only a protestant, in future, could be crowned and promote the views of government policy.

  2. citizenship data task

    we learnt that we were not allowed to have much physical contact with the children, and that they needed to have a qualified teacher present with them at all times. We make sure we followed these laws when we were volunteering at Turnfurlong School.

  1. A Critical Evaluation of UK's ID Card schemeA Government's proposal to monitor its Citizens

    is also considered to be an area in which an ID card would assist the authorities. The home secretary explains that "The UK looses more than �1.3 Billion every year through people falling victim to identity fraud" [8] 5.3. ILLEGAL IMMIGRATION The subject of illegal immigration is very sensitive one,

  2. The Drug Policy in the United States

    Under the CSA there are also laws that control who can have certain drugs in their possession, and who can distribute certain drugs as well as in what amounts, "the CSA also creates a closed system of distribution for those authorized to handle controlled substances.

  1. WWI, The Twenty-One Demands and The May Fourth Movement

    The discussion of the entire corpus of the proposals was practically at an end at the twenty-fourth conference; that is on the 17th of the last month. The Imperial Government, taking a broad view of the negotiation and in consideration of the points raised by the Chinese Government, modified the

  2. When is government interference with an individual's freedom justified?

    his irrational compulsion and allowing him to make a genuinely free choice in the future. Even keen supporters of negative freedom recognise that in a modern day society there has to be at least some level of government interference with the freedom of an individual in order to preserve the freedom of the community at whole.

  1. The conflict may be classified as a strike for power between Taliban government and ...

    rivalries has reflected not only local animosities but also the interests of various sponsor states, each seeking to establish its own predominance.9 In addition, Afghanistan has in recent years been responsible for around three-quarters of total global opium production, with a street value of some $80 billion.

  2. Who Holds Power in the United Kingdom Today?

    'Egalatarian' ideas (i.e. socialism and democracy) are merely illusions, far from the truth of reality. Rather, elite theorists put forward the idea that elitism is the by-product of political apathy amongst the majority of the population. This lack of interest in politics is, and always has been an inherent characteristic within the structure of society.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work