Should governments regulate which encryption technology can
Should governments regulate which encryption technology can be used so that government law enforcement agents can always read material generated by terrorists and other criminals?
Solution
There are multiple methods that a government can use to gain access to encryted information.some methods breaking encryption,some involve circumventing it,some involve gaining access to the keys.
•Banning strong Encryption.
•Weaking Encryption standards.
•Creating software and hardware backdoors.
•Government can attempt to hack into products.hacking can create new vulnerabilities which other attackers could exploit.
•Mandatory key escrow.
•prohibiting client side encryption.
•Traditional metho of obtaining information.
And government and as well as noraml organizations can use below encryption for secure transactions.
Symmetric Encryption:In the late 1960\'s,as business started to use computers to share and store information in digital form,they needed a way to easily secure that information.
•These first forms of commercial encrytion used symmetric algorithms.
•In symmetric algorithms sender and receiver uses the same cryptographic key for encrypting and decrypting.
•When storing data locally with symmetric encryption,only individuals holding the key can decrypt the data.
•governments have to acquire the key from the source of the data.
•In 1960\'s encryption algorithm was developed cash-dispensing system.which encrypted 128-bit blocks of data with a 128-bit key.
•The NSA interfered with process,tamering with the strength of the original algorithm and reducing the key length to 56-bits.
•The biggest limitation of symmetric key algorithns like AES and DES is that they are poorly suited for sharing information securely between multiple parties.
Public Key Encryption:
The limitations of symmetric encrytion became more pronounced in the 1980\'s as academics and business needed to securely communicate with others on public networks but had no easy way to distribute keys.
•Public key encryption uses two keys,one is public key and one is private key.
•In public key encryption in order to exchange information securely.
•After that Internet became in 1994 netscape developed the secure sockets layer.
Advanced Encryption Standard:
Advanced Encrytion standard is a specification for the encryption of electronic data established by the U.S.National Institute of Standards and Technology(NIST) in 2001.
•In AES each block size is 128 bits,but three different key lengths 128,192 and 256 bits.
•In AES is a symmetric key algorithm,in AES the same key is used for encrytiing and decryting the data.
•AES is based on a design principle known as a substitution-permutation network.
•AES operates on a 4*4 colums-major order matrix of bytes.
•The key size for an AES ciher
10 cycles of repetition for 128-bit keys.
12 cycles of repetition for 192-bit keys.
14 cycles of repetition for 256-bit keys.

