Browse > Article
http://dx.doi.org/10.13089/JKIISC.2021.31.1.99

A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic  

Kim, Dong-hoon (Korea University)
Kwon, Hun-yeong (Korea University)
Hong, Seokhie (Korea University)
Abstract
With the recent development of ICT, information exchange through data communication network is increasing. Cryptography is widely used as the base technology to protect it. The initial cryptography technology was developed for military use and authorized only by the nation in the past. However, nowadays, much of the authority was unwillingly transferred to the private due to the pervasive use of ICT. As a result, there have been conflicts between the private demand to use cryptography and the nation's authority. In this paper, we survey the conflicts between nations and the private in the process of formulating the cryptography policy. Morever, we investigate the reality of the cryptography policy in Korea. Our investigations are expected to help the government apply cryptographic control policy in a balanced manner and plan development of cryptography industries. Lastly, we propose a need to establish a cryptanalysis organization and to legislate a legal sanction against fraudulent use of cryptography.
Keywords
cryptanalysis; cryptography policy; national security; misuse cryptograph;
Citations & Related Records
연도 인용수 순위
  • Reference
1 PUB, NIST FIPS. "46-3. Data Encryption Standard." Federal Information Processing Standards, National Bureau of Standards, US Department of Commerce (1977).
2 Diffie, Whitfield. "New direction in cryptography." IEEE Trans. Inform. Theory 22 (1976): pp. 472-492.
3 Campbell, Ryan. "Brademas Intern August 18, 2019 Keeping it Cryptic: The Enduring Debate on Privacy and Lawful Access On July 23, at the International Conference on Cyber Security in New York City." (2019).
4 OECD legal instrument, "Recommendation of the Council OECD Legal Instruments concerning Guidelines for Cryptography Policy" Workshop on Cryptography Policy, Paris, 1997
5 Schulze, Matthias. "Clipper meets Apple vs. FBI: a comparison of the cryptography discourses from 1993 and 2016." Media and Communication 5.1 (2017): pp. 54-62.   DOI
6 Segell, Glen M. "French cryptograph policy: The turnabout of 1999." International Journal of Intelligence and CounterIntelligence 13.3 (2000): pp. 345-358.   DOI
7 Saper, Nathan. "International cryptography regulation and the global information economy." Nw. J. Tech. & Intell. Prop. 11 (2012): xv.
8 Baker, Stewart A. "Decoding OECD Guidlines for Cryptography Policy." Int'l L.. Vol. 31. 1997.
9 Herson, David. "The Changing Face of International Cryptography Policy: Part 20-OECD Security Guidelines." Computer Fraud & Security 2001.9 (2001): pp. 8-9.   DOI
10 Hyun Joe Kwon, Kilsoo Chun, Jae-il Lee "Current status of domestic and foreign Cryptography legal and Polices." Korea Institute Of Information Security And Cryptology 15.2 (2005): pp. 37-53.
11 Korea Information Protection Center, "A Study on the Cryptographic Use Policy in the Domestic Private Sector" Technical Policy Study, 1998.12.
12 Davies, Donald. "A brief history of cryptography." Information Security Technical Report 2.2 (1997): pp. 14-17.   DOI
13 Sook-yeon Lee. "Search and Seizure, Fundamental Rights, and Doctrine of Warrants Concerning Electronic Information" constitutional studies 18 (2012): pp. 1-44.
14 Hee Won, Han, "A Legal Study on The Intelligence/Investigation Combination Phenomena According to The Security Paradigms Shift After Cold War Era - From Warfighting To Crimefighting" Korean Association of Laws study of law 2017.6.
15 Chosun Ilbo "'Cho Ju-bin's cell phone password was released in two months." (2020. 5. 15.) https://news.mt.co.kr/mtview.php?no=2020051511022977954
16 Lin, Herbert S. "Cryptography and public policy." Journal of Government Information 25.2 (1998): pp. 135-148.   DOI