Abstracts - faqs.org

Abstracts

Business, general

Search abstracts:
Abstracts » Business, general

Industry split over computer data secrecy issue

Article Abstract:

An emerging rift between hardware and software makers is reducing the likelihood that the industry can present a united face on the encryption debate. Observers expect the government to release a new proposal on the export of encryption software. Encryption software currently has to be weakened before it can be exported, a legacy of the Cold War, when it was considered a military secret. Hardware makers urge a new standard, but they want strict limitations on the technology allowed out of the country. Software makes claim that the reduced security offered in their products reduces sales abroad and want a more lenient exportation standard. The industry wants to avoid any repeat of the 'Clipper Chip' proposal, which placed the key to decoding any data in the hands of the government. Observers believe that the proposal has not emerged because government officials had not yet reached a consensus on the standards to be imposed.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
Standards, Computer industry, Laws, regulations and rules, Government Regulation, Government Activity

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


U.S. data code is unscrambled in 56 hours

Article Abstract:

Two researchers broke the Government's Data Encryption Standard (DES) data-scrambling code in a record 56 hours, fueling debate on the US export policy on encryption technology. John Gilmore and Paul Kocher used a homemade computer valued at $250,000 to win the contest sponsored by computer-security software company RSA Data Security. They also defeated a network of nearly 20,000 computers, including some of the world's most powerful supercomputers, that utilized distributed computing. DES is a 56-bit key form that banks and other financial institutions traditionally use to safeguard funds transmission and other high-security transactions. The Government says its less secure 40-key bits code protects users that include numerous banks, financial institutions and Government agencies. Critics of the Government's encryption software policy believe the contest proves terrorists or other criminals can crack the code easily.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1998
Safety and security measures

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Taking a computer crime to heart

Article Abstract:

Computer hackers broke into a computer security expert's home system using a new break-in method that has prompted a government computer agency to issue a warning to users of the Internet. At least four computer systems at universities across the U.S. have been attacked by the computer hackers. The computer security expert, Tsutomu Shimomura, is developing a software program that will prevent similar break-ins and will distribute the program free on the Internet. Shimomura is also interested in helping the FBI to catch the hackers and says that although these hackers are pretty intelligent, they still made some mistakes that he believes will allow them to discovered. The hackers entered his home system through the network at his workplace and stole e-mail messages and files, leaving behind threatening voice mail.

Author: Markoff, John
Publisher: The New York Times Company
Publication Name: The New York Times
Subject: Business, general
ISSN: 0362-4331
Year: 1995
Internet, Crime, Computer crime, Computer crimes, Computer hackers, Hacker

User Contributions:

Comment about this article or add new information about this topic:

CAPTCHA


Subjects list: Encryption, Data encryption, Encryption software, Data security, Data security issue
Similar abstracts:
  • Abstracts: Dell Inc. . Computer and peripherals industry
  • Abstracts: Making it easier to enter the Web. In 1996, a World's Fair to be held in cyberspace
  • Abstracts: Stock prices end mostly higher, despite rout in technology issues. High-tech ills tied to corporate demand; firms are said to await new, upgraded computers
  • Abstracts: Dismissal of security expert adds fuel to Internet debate. Hacker case underscores Internet's vulnerability. Data network is found open to new threat
This website is not affiliated with document authors or copyright owners. This page is provided for informational purposes only. Unintentional errors are possible.
Some parts © 2025 Advameg, Inc.