Communications and Computer Surveillance, Privacy, and Security: Hearing Before the Subcommittee on Technology, Environment, and Aviation of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred Third Congress, Second Session, May 3, 1994, Volume 4U.S. Government Printing Office, 1994 - 208 pages |
À l'intérieur du livre
Résultats 1-5 sur 8
Page 37
... bits per second , which is very high , and not likely to be a limitation in the near future . The first imple- mentation in the product uses 4,800 bits per second , so we have some growing room . With respect to technical soundness , in ...
... bits per second , which is very high , and not likely to be a limitation in the near future . The first imple- mentation in the product uses 4,800 bits per second , so we have some growing room . With respect to technical soundness , in ...
Page 93
... bit keys are 24 bits longer than those used by the Data Encryption Standard ( DES ) , under an assumption that the cost of processing power continues to be halved every year and a half , it will be 36 years before the cost of breaking ...
... bit keys are 24 bits longer than those used by the Data Encryption Standard ( DES ) , under an assumption that the cost of processing power continues to be halved every year and a half , it will be 36 years before the cost of breaking ...
Page 120
... bits of each pixel , you know , you code the pixel , the last few bits really make no dif- ference what you put there , because your eye can't see it anyway . So what they are starting to do , and there is an operational ver- sion ...
... bits of each pixel , you know , you code the pixel , the last few bits really make no dif- ference what you put there , because your eye can't see it anyway . So what they are starting to do , and there is an operational ver- sion ...
Page 131
... bits has 2 possibilities . SKIPJACK uses 80 - bit keys , which means there are 20 ( approximately 1024 ) or more than 1 trillion trillion possible keys . An implementation of SKIPJACK optimized for a single processor on the 8 ...
... bits has 2 possibilities . SKIPJACK uses 80 - bit keys , which means there are 20 ( approximately 1024 ) or more than 1 trillion trillion possible keys . An implementation of SKIPJACK optimized for a single processor on the 8 ...
Page 133
... bits or plaintext bits from the ciphertext bits ( except by exhaustive search ) . We ran two sets of tests aimed at determining whether SKIPJACK is a good pseudo random number generator . These tests were run on a Cray YMP at NSA . The ...
... bits or plaintext bits from the ciphertext bits ( except by exhaustive search ) . We ran two sets of tests aimed at determining whether SKIPJACK is a good pseudo random number generator . These tests were run on a Cray YMP at NSA . The ...
Autres éditions - Tout afficher
Expressions et termes fréquents
ability Administration Administration's authorized call setup information Clipper Chip Committee common carrier compliance Computer Security Act concerns Congress cordless telephone cost court orders court-authorized electronic surveillance crime criminal cryptographic cryptographic policy Data Encryption Standard decryption devices differential cryptanalysis Digital Telephony electronic communications Electronic Frontier Foundation encryption policy encryption products Encryption Standard encryption systems encryption technology enforcement and national ensure escrow agents export controls government agencies impediments implementation intercept investigations issue Kallstrom Kammer key escrow encryption key escrow system key escrow/Skipjack key-escrow law enforcement law enforcement agencies law enforcement's legislation meeting national cryptographic national security National Security Agency needs networks NIST NSA's pen register privacy and security privacy protection problem proposal requirements ROHRABACHER security and privacy SJ(k SKIPJACK algorithm solution Subcommittee technical techniques terrorists transmission trap and trace unique key users VALENTINE voluntary wiretaps
Fréquemment cités
Page 52 - Materials, a major international society for the development of voluntary standards for materials, products, systems, and services. His awards include both the Gold and Silver Medals of the Department of Commerce, the William A. Jump Award for Exceptional Achievement in Public Administration, the Federal Government Meritorious Executive Award, and the Roger W. Jones Award for Executive Leadership. Mr. Kammer received his Bachelor of Arts degree from the University of Maryland in 1969.
Page 80 - they that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.
Page 52 - Kammer has chaired several important evaluation committees for the Department of Commerce, including reviews of satellite systems for weather monitoring and the US LANDSAT program, and of the next generation of weather radar used by the US government.
Page 103 - The act also established a Computer System Security and Privacy Advisory Board within the Department of Commerce, and required Commerce to promulgate regulations based on NIST guidelines.
Page 52 - ... ability to enhance the competitiveness of American industry while maintaining its traditional function as lead national laboratory for providing the measurements, calibrations, and quality assurance techniques which underpin United States commerce, technological progress, improved product reliability and manufacturing processes, and public safety...
Page 103 - (b) The duties of the Board shall be— "(1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy...
Page 197 - ... Identifies the origin and destination of a wire or electronic communication placed to, or received by, the facility or service that is the subject of the court order or lawful authorization, including information associated with any telecommunications system dialing or calling features or services. For voice communications, this information is typically the electronic pulses, audio tones, or signaling messages that identify the numbers dialed or otherwise transmitted, or caused to be transmitted....
Page 183 - ... landlord, custodian or other person shall furnish the applicant forthwith all information, facilities, and technical assistance necessary to accomplish the interception...
Page 103 - (1) to identify emerging managerial, technical, administrative, and physical safeguard issues relative to computer systems security and privacy; "(2) to advise the Bureau of Standards and the Secretary of Commerce on security and privacy issues pertaining to Federal computer systems; and "(3) to report its findings to the Secretary of Commerce, the Reports.
Page 103 - Board shall be composed of twelve additional members appointed by the Secretary of Commerce as follows: "(1) four members from outside the Federal Government who are eminent in the computer or telecommunications industry, at least one of whom is representative of small or medium sized companies in such...