Skip to main content

Encryption and the Global Information Infrastructure: An Australian perspective

  • Conference paper
  • First Online:
  • 232 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Abstract

Debate on encryption in Global Information Infrastructures has been complicated by issues relating to law enforcement. This paper looks at a technique for limiting the use of anonymous cash for illicit purposes to an acceptable level. It also argues that the majority of users will not require high level encryption systems to protect their privacy and hence would not require the keys to their encryption schemes to be escrowed. It proposes a scheme of Differential Key Escrow (DKE) where only the keys of high level encryption systems used by government and larger corporations would be held in escrow by the organisation.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. P. Barrett. Long-term Cost Effectiveness of Telecommunications Interception Australian Attorney-General's Department, Canberra, March 1994.

    Google Scholar 

  2. Australian Government Publishing Service.Networking Australia's Future, The Final Report of the Broadband Services Expert Group December 1994, (also available from http://www.dca.gov.au or anonymous FTP from www.dca.gov.au (using your e-mail address for password))

    Google Scholar 

  3. DPUBS:7003/93.Australian Controls on the Export of Defence and Related Goods Guidelines for Exporters Department of Defence, Canberra, March 1994

    Google Scholar 

  4. Department of Defence. Australian Controls on the Export of Technology With Civil and Military Applications A Guide for Exporters and Importers Department of Defence, Canberra, November 1994.

    Google Scholar 

  5. Australian Minister for Justice. The High Road to Security Policing the Information Superhighway Speech to the Australian Share/Guide Conference, March 1994, Available from the Australian Attorney-General's Department Canberra

    Google Scholar 

  6. Document Number OCDE/GD(92)190. Guidelines for the Security of Information Systems Organisation for Economic Co-operation and Development Paris 1992 Document Number OCDE/GD(92)190.

    Google Scholar 

  7. Unpublished Working Paper, Public Key Authentication Framework (PKAF) Australian Attorney-General's Department, Canberra, July 1993.

    Google Scholar 

  8. S.T.Walker, Software Key Escrow A better Solution for Law Enforcementt's Needs Trusted Information Systems, Inc, August 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Orlowski, S. (1996). Encryption and the Global Information Infrastructure: An Australian perspective. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032346

Download citation

  • DOI: https://doi.org/10.1007/BFb0032346

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics