30

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

Footnote 30

Although generally beyond the scope of these Guidelines, we note that current U.S. export restrictions, Department of State, "International Traffic in Arms Regulations (ITAR)," Office of Munitions Control, 22 C.F.R. §§ 120-130 (Nov. 1989), on software which possesses both confidentiality encryption and digital signature capability (or which can be converted into confidentiality encryption software) has caused software providers to intentionally emasculate ("dumb down") algorithms in some of their domestic as well as international products. This is considered by some to have cast doubt upon the "computational infeasibility" assumed by the standards, for digital signature as well as confidentiality encryption software. See generally, Schneier, supra note 18, at § 25.14, 610-16.