본문 바로가기

추천 검색어

실시간 인기 검색어

학술논문

사이버공간상 암호기술의 부정사용에 관한 고찰

이용수 21

영문명
The Encryption Policy against Cybercrime
발행기관
개인저작물
저자명
정완(Choung, Wan)
간행물 정보
『개인저작물 - 법학·행정』제12권 제1호, 71~93쪽, 전체 23쪽
주제분류
법학 > 개인저작물
파일형태
PDF
발행일자
2008.02.01
5,560

구매일시로부터 72시간 이내에 다운로드 가능합니다.
이 학술논문 정보는 (주)교보문고와 각 발행기관 사이에 저작물 이용 계약이 체결된 것으로, 교보문고를 통해 제공되고 있습니다.

1:1 문의
논문 표지

국문 초록

영문 초록

A variety of `key recovery`, `key escrow,` and `trusted-party` encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This research examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys. The deployment of key-recovery-based encryption infrastructures to meet law enforcement`s stated specifications will result in substantial sacrifices in security and greatly increased costs to the end-user. Building the secure computer-communication infrastructures necessary to provide adequate technological underpinnings demanded by these requirements would be enormously complex and is far beyond the experience and current competency of the field. Even if such infrastructures could be built, the risks and costs of such an operating environment may ultimately prove unacceptable. In addition, these infrastructures would generally require extraordinary levels of human trustworthiness. These difficulties are a function of the basic government access requirements proposed for key-recovery encryption systems. They exist regardless of the design of the recovery systems - whether the systems use private-key cryptography or public-key cryptography ; whether the databases are split with secret-sharing techniques or maintained in a single hardened secure facility; whether the recovery services provide private keys, session keys, or merely decrypt specific data as needed; and whether there is a single centralized infrastructure, many decentralized infrastructures, or a collection of different approaches. Attempts to force the widespread adoption of key-recovery encryption through export controls, import or domestic use regulations, or international standards should be considered in light of these factors. The public must carefully consider the costs and benefits of embracing government-access key recovery before imposing the new security risks and spending the huge investment required (potentially many billions of dollars, in direct an indirect costs) to deploy a global key recovery infrastructure.

목차

Ⅰ. 서언
Ⅱ. 정보사회와 암호기술의 필요성
Ⅲ. 암호기술의 순기능과 역기능(부정사용)
Ⅳ. 법집행력 확보의 필요성과 타당성
Ⅴ. 암호정책의 개선방안
Ⅵ. 결어
참고문헌
ABSTRACT

키워드

해당간행물 수록 논문

참고문헌

교보eBook 첫 방문을 환영 합니다!

신규가입 혜택 지급이 완료 되었습니다.

바로 사용 가능한 교보e캐시 1,000원 (유효기간 7일)
지금 바로 교보eBook의 다양한 콘텐츠를 이용해 보세요!

교보e캐시 1,000원
TOP
인용하기
APA

정완(Choung, Wan). (2008).사이버공간상 암호기술의 부정사용에 관한 고찰. 개인저작물 - 법학·행정, , 71-93

MLA

정완(Choung, Wan). "사이버공간상 암호기술의 부정사용에 관한 고찰." 개인저작물 - 법학·행정, .(2008): 71-93

결제완료
e캐시 원 결제 계속 하시겠습니까?
교보 e캐시 간편 결제