Export of cryptography

Last updated

The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.

In the early days of the Cold War, the United States and its allies developed an elaborate series of export control regulations designed to prevent a wide range of Western technology from falling into the hands of others, particularly the Eastern bloc. All export of technology classed as 'critical' required a license. CoCom was organized to coordinate Western export controls.

Many countries, notably those participating in the Wassenaar Arrangement, introduced restrictions. The Wassenaar restrictions were largely loosened in the late 2010s. [1] [2]

See also

Related Research Articles

<span class="mw-page-title-main">Phil Zimmermann</span> Creator of Pretty Good Privacy (PGP)

Philip R. Zimmermann is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption protocols, notably ZRTP and Zfone. Zimmermann is co-founder and Chief Scientist of the global encrypted communications firm Silent Circle.

A cypherpunk is any individual advocating widespread use of strong cryptography and privacy-enhancing technologies as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups aimed to achieve privacy and security through proactive use of cryptography. Cypherpunks have been engaged in an active movement since at least the late 1980s.

<span class="mw-page-title-main">Wassenaar Arrangement</span> 1996 multilateral export control regime

The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies is a multilateral export control regime established on 12 July 1996, in Wassenaar, near The Hague, Netherlands. The Wassenaar Arrangement was established to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilizing accumulations. Participating states seek, through their national policies, to ensure that transfers of these items do not contribute to the development or enhancement of military capabilities which undermine these goals, and are not diverted to support such capabilities.

_NSAKEY was a variable name discovered in Windows NT 4 SP5 in 1999 by Andrew D. Fernandes of Cryptonym Corporation. The variable contained a 1024-bit public key; such keys are used in public-key cryptography for encryption and authentication. Because of the name, however, it was speculated that the key would allow the United States National Security Agency (NSA) to subvert any Windows user's security. Microsoft denied the speculation and said that the key's name came from the fact that NSA was the technical review authority for U.S. cryptography export controls.

<span class="mw-page-title-main">Clipper chip</span> Encryption device promoted by the NSA in the 1990s

The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured "voice and data messages" with a built-in backdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.

The Coordinating Committee for Multilateral Export Controls (CoCom) was established by the Western Bloc in the first five years after the end of World War II, during the Cold War, to put an embargo on Comecon countries. CoCom ceased to function on March 31, 1994, and the then-current control list of embargoed goods was retained by the member nations until the successor, the Wassenaar Arrangement, was established in 1996.

International Traffic in Arms Regulations (ITAR) is a United States regulatory regime to restrict and control the export of defense and military related technologies to safeguard U.S. national security and further U.S. foreign policy objectives.

<span class="mw-page-title-main">Export of cryptography from the United States</span> Transfer from the United States to another country of technology related to cryptography

The export of cryptography from the United States to other countries has experienced various levels of restrictions over time. World War II illustrated that code-breaking and cryptography can play an integral part in national security and the ability to prosecute war. Changes in technology and the preservation of free speech have been competing factors in the regulation and constraint of cryptographic technologies for export.

<span class="mw-page-title-main">Dual-use technology</span> Technology that can be used for both peaceful and military purposes

In politics, diplomacy and export control, dual-use items refer to goods, software and technology that can be used for both civilian and military applications.

<span class="mw-page-title-main">Missile Technology Control Regime</span> 1987 arms control understanding among 35 nations including the G7

The Missile Technology Control Regime (MTCR) is a multilateral export control regime. It is an informal political understanding among 35 member states that seek to limit the proliferation of missiles and missile technology. The regime was formed in 1987 by the G-7 industrialized countries. The MTCR seeks to limit the risks of proliferation of weapons of mass destruction (WMD) by controlling exports of goods and technologies that could make a contribution to delivery systems for such weapons. In this context, the MTCR places particular focus on rockets and unmanned aerial vehicles capable of delivering a payload of at least 500 kilograms (1,100 lb) to a range of at least 300 kilometres (190 mi) and on equipment, software, and technology for such systems.

<span class="mw-page-title-main">United States sanctions</span> Trade restrictions levied by the United States government

United States sanctions are financial and trade restrictions imposed against individuals, entities, and jurisdictions whose actions contradict U.S. foreign policy or national security goals. Financial sanctions are primarily administered by the U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC), while export controls are primarily administered by the U.S. Department of Commerce's Bureau of Industry and Security (BIS).

In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to implement strong user authentication or for secure email.

Cryptography is the practice and study of encrypting information, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or encryption algorithms or cryptoanalysis methods. Some countries require decryption keys to be recoverable in case of a police investigation.

<span class="mw-page-title-main">Arms Export Control Act</span> United States law

The Arms Export Control Act of 1976 gives the President of the United States the authority to control the import and export of defense articles and defense services. The H.R. 13680 legislation was passed by the 94th Congressional session and enacted into law by the 38th President of the United States Gerald R. Ford on June 30, 1976.

A number of countries have attempted to restrict the import of cryptography tools.

Export control is legislation that regulates the export of goods, software and technology. Some items could potentially be useful for purposes that are contrary to the interest of the exporting country. These items are considered to be controlled. The export of controlled item is regulated to restrict the harmful use of those items. Many governments implement export controls. Typically, legislation lists and classifies the controlled items, classifies the destinations, and requires exporters to apply for a licence to a local government department.

<span class="mw-page-title-main">Multilateral export control regime</span> International organization which member states use to organize their export control system

A multilateral export control regime is an informal group of like-minded supplier countries that seek to contribute to the non-proliferation of weapons of mass destruction, delivery systems, and advanced conventional weapons through national implementation of guidelines and control lists for exports. For a chart of national membership in different regimes, see the SIPRI Yearbook chapter on "Transfer controls".

<span class="mw-page-title-main">Cryptography</span> Practice and study of secure communication techniques

Cryptography, or cryptology, is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security are also central to cryptography. Practical applications of cryptography include electronic commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.

<span class="mw-page-title-main">Bullrun (decryption program)</span> Code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the Bullrun classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

<span class="mw-page-title-main">Crypto Wars</span> Attempts to limit access to strong cryptography

Attempts, unofficially dubbed the "Crypto Wars", have been made by the United States (US) and allied governments to limit the public's and foreign nations' access to cryptography strong enough to thwart decryption by national intelligence agencies, especially the National Security Agency (NSA).

References

  1. Meyer, Venable LLP-Lindsay B.; McMullan, Carrie Kroll; Sudduth, Wes S. (October 19, 2016). "Top Five Takeaways: Wassenaar Arrangement Updates to Commerce's Encryption-Related Export Controls". Lexology.
  2. O'Keefe, Amanda (January 3, 2018). "Why the EU's call to remove crypto-tech from dual-use export controls is encouraging". IAPP.