Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
is the practice and study of encrypting
information
Information is an Abstraction, abstract concept that refers to something which has the power Communication, to inform. At the most fundamental level, it pertains to the Interpretation (philosophy), interpretation (perhaps Interpretation (log ...
, or in other words, securing information from unauthorized access. There are many different cryptography laws in different nations. Some countries prohibit the export of cryptography software and/or
encryption algorithm
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
s or
cryptoanalysis methods. Some countries require decryption keys to be recoverable in case of a police investigation.
Overview
Issues regarding cryptography law fall into four categories:
* Export control, is the restriction on the
export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.
In the early days of the Cold War, the United States and its allies developed an elaborate series of export control regulat ...
methods within a country to other countries or commercial entities. There are international export control agreements, the main one being the
Wassenaar Arrangement
The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, also known simply as the Wassenaar Arrangement, is a multilateral export control regime governing the international transfer of conventional ...
. The Wassenaar Arrangement was created after the dissolution of
COCOM
The Coordinating Committee for Multilateral Export Controls (CoCom) was established in 1949 at the beginning of the Cold War to coordinate controls on exports from Western Bloc countries to the Soviet Union and its allies. Operating through inform ...
(Coordinating Committee for Multilateral Export Controls), which in 1989 "decontrolled password and authentication-only cryptography."
* Import controls, which is the restriction on using certain types of cryptography within a country.
*
Patent
A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
issues, deal with the use of cryptography tools that are patented.
*
Search and seizure
Search and seizure is a procedure used in many Civil law (legal system), civil law and common law legal systems by which police or other authorities and their agents, who, suspecting that a crime has been committed, commence a search of a person ...
issues, on whether and under what circumstances, a person can be compelled to decrypt data files or reveal an encryption key.
Legal issues
Prohibitions
Cryptography has long been of interest to intelligence gathering and
law enforcement agencies
A law enforcement agency (LEA) is any government agency responsible for law enforcement within a specific jurisdiction through the employment and deployment of law enforcement officers and their resources. The most common type of law enforcement ...
.
Secret communications may be criminal or even
treasonous . Because of its facilitation of
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
, and the diminution of privacy attendant on its prohibition, cryptography is also of considerable interest to civil rights supporters. Accordingly, there has been a history of controversial legal issues surrounding cryptography, especially since the advent of inexpensive computers has made widespread access to high-quality cryptography possible.
In some countries, even the domestic use of cryptography is, or has been, restricted. Until 1999,
France
France, officially the French Republic, is a country located primarily in Western Europe. Overseas France, Its overseas regions and territories include French Guiana in South America, Saint Pierre and Miquelon in the Atlantic Ocean#North Atlan ...
significantly restricted the use of cryptography domestically, though it has since relaxed many of these rules. In
China
China, officially the People's Republic of China (PRC), is a country in East Asia. With population of China, a population exceeding 1.4 billion, it is the list of countries by population (United Nations), second-most populous country after ...
and
Iran
Iran, officially the Islamic Republic of Iran (IRI) and also known as Persia, is a country in West Asia. It borders Iraq to the west, Turkey, Azerbaijan, and Armenia to the northwest, the Caspian Sea to the north, Turkmenistan to the nort ...
, a license is still required to use cryptography.
Many countries have tight restrictions on the use of cryptography. Among the more restrictive are laws in
Belarus
Belarus, officially the Republic of Belarus, is a landlocked country in Eastern Europe. It is bordered by Russia to the east and northeast, Ukraine to the south, Poland to the west, and Lithuania and Latvia to the northwest. Belarus spans an a ...
,
Kazakhstan
Kazakhstan, officially the Republic of Kazakhstan, is a landlocked country primarily in Central Asia, with a European Kazakhstan, small portion in Eastern Europe. It borders Russia to the Kazakhstan–Russia border, north and west, China to th ...
,
Mongolia
Mongolia is a landlocked country in East Asia, bordered by Russia to the north and China to the south and southeast. It covers an area of , with a population of 3.5 million, making it the world's List of countries and dependencies by po ...
,
Pakistan
Pakistan, officially the Islamic Republic of Pakistan, is a country in South Asia. It is the List of countries and dependencies by population, fifth-most populous country, with a population of over 241.5 million, having the Islam by country# ...
,
Singapore
Singapore, officially the Republic of Singapore, is an island country and city-state in Southeast Asia. The country's territory comprises one main island, 63 satellite islands and islets, and one outlying islet. It is about one degree ...
,
Tunisia
Tunisia, officially the Republic of Tunisia, is a country in the Maghreb region of North Africa. It is bordered by Algeria to the west and southwest, Libya to the southeast, and the Mediterranean Sea to the north and east. Tunisia also shares m ...
, and
Vietnam
Vietnam, officially the Socialist Republic of Vietnam (SRV), is a country at the eastern edge of mainland Southeast Asia, with an area of about and a population of over 100 million, making it the world's List of countries and depende ...
.
In the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, cryptography is legal for domestic use, but there has been much conflict over legal issues related to cryptography.
One particularly important issue has been the
export of cryptography
The export of cryptography is the transfer from one country to another of devices and technology related to cryptography.
In the early days of the Cold War, the United States and its allies developed an elaborate series of export control regulat ...
and cryptographic software and hardware. Probably because of the importance of cryptanalysis in
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
and an expectation that cryptography would continue to be important for national security, many Western governments have, at some point, strictly regulated export of cryptography. After World War II, it was illegal in the US to sell or distribute encryption technology overseas; in fact, encryption was designated as auxiliary military equipment and put on the
United States Munitions List.
Until the development of the
personal computer
A personal computer, commonly referred to as PC or computer, is a computer designed for individual use. It is typically used for tasks such as Word processor, word processing, web browser, internet browsing, email, multimedia playback, and PC ...
, asymmetric key algorithms (i.e., public key techniques), and the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
, this was not especially problematic. However, as the Internet grew and computers became more widely available, high-quality encryption techniques became well known around the globe.
Export controls
In the 1990s, there were several challenges to US export regulation of cryptography. After the
source code
In computing, source code, or simply code or source, is a plain text computer program written in a programming language. A programmer writes the human readable source code to control the behavior of a computer.
Since a computer, at base, only ...
for
Philip Zimmermann's
Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption software, encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for digital signature, signing, encrypting, and decrypting texts, Email, e-mail ...
(PGP) encryption program found its way onto the Internet in June 1991, a complaint by
RSA Security
RSA Security LLC, formerly RSA Security, Inc. and trade name RSA, is an American computer security, computer and network security company with a focus on encryption and decryption standards. RSA was named after the initials of its co-founders, ...
(then called RSA Data Security, Inc.) resulted in a lengthy criminal investigation of Zimmermann by the US Customs Service and the
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
, though no charges were ever filed.
Daniel J. Bernstein, then a graduate student at
UC Berkeley
The University of California, Berkeley (UC Berkeley, Berkeley, Cal, or California), is a public land-grant research university in Berkeley, California, United States. Founded in 1868 and named after the Anglo-Irish philosopher George Berkele ...
, brought a lawsuit against the US government challenging some aspects of the restrictions based on
free speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
grounds. The 1995 case ''
Bernstein v. United States
''Bernstein v. United States'' was a series of court cases filed by Daniel J. Bernstein, then a mathematics Ph.D. student at the University of California, Berkeley, challenging U.S. government restrictions on the export of cryptographic sof ...
'' ultimately resulted in a 1999 decision that printed source code for cryptographic algorithms and systems was protected as
free speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
by the United States Constitution.
In 1996, thirty-nine countries signed the
Wassenaar Arrangement
The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies, also known simply as the Wassenaar Arrangement, is a multilateral export control regime governing the international transfer of conventional ...
, an arms control treaty that deals with the export of arms and "dual-use" technologies such as cryptography. The treaty stipulated that the use of cryptography with short key-lengths (56-bit for symmetric encryption, 512-bit for RSA) would no longer be export-controlled.
Cryptography exports from the US became less strictly regulated as a consequence of a major relaxation in 2000;
there are no longer very many restrictions on key sizes in US-
exported
An export in international trade is a good produced in one country that is sold into another country or a service provided in one country for a national or resident of another country. The seller of such goods or the service provider is a ...
mass-market software. Since this relaxation in US export restrictions, and because most personal computers connected to the
Internet
The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
include US-sourced
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
s such as
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
or
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
, almost every Internet user worldwide has potential access to quality cryptography via their browsers (e.g., via
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
). The
Mozilla Thunderbird
Mozilla Thunderbird is a free and open-source email client that also functions as a personal information manager with a Digital calendar, calendar and contactbook, as well as an RSS feed reader, chat client (IRC/XMPP/Matrix (protocol), Matrix), ...
and
Microsoft Outlook
Microsoft Outlook is a personal information manager software system from Microsoft, available as a part of the Microsoft 365 software suites. Primarily popular as an email client for businesses, Outlook also includes functions such as Calendari ...
E-mail client
An email client, email reader or, more formally, message user agent (MUA) or mail user agent is a computer program used to access and manage a user's email.
A web app, web application which provides message management, composition, and receptio ...
programs can similarly transmit and receive emails via TLS, and can send and receive emails encrypted with
S/MIME. Many Internet users don't realize that their basic application software contains such extensive
cryptosystem
In cryptography, a cryptosystem is a suite of cryptographic algorithms needed to implement a particular security service, such as confidentiality (encryption).
Typically, a cryptosystem consists of three algorithms: one for key generation, one ...
s. These browsers and email programs are so ubiquitous that even governments whose intent is to regulate civilian use of cryptography generally don't find it practical to do much to control distribution or use of cryptography of this quality, so even when such laws are in force, actual enforcement is often effectively impossible.
NSA involvement
Another contentious issue connected to cryptography in the United States is the influence of the
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
on cipher development and policy.
The NSA was involved with the design of
DES during its development at
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
and its consideration by the
National Bureau of Standards
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical sc ...
as a possible Federal Standard for cryptography.
DES was designed to be resistant to
differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can a ...
,
a powerful and general cryptanalytic technique known to the NSA and IBM, that became publicly known only when it was rediscovered in the late 1980s.
According to
Steven Levy
Steven Levy (born 1951) is an American journalist and editor at large for '' Wired'' who has written extensively for publications on computers, technology, cryptography, the internet, cybersecurity, and privacy. He is the author of the 1984 boo ...
, IBM discovered differential
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
,
but kept the technique secret at the NSA's request. The technique became publicly known only when Biham and Shamir re-discovered and announced it some years later. The entire affair illustrates the difficulty of determining what resources and knowledge an attacker might actually have.
Another instance of the NSA's involvement was the 1993
Clipper chip affair, an encryption microchip intended to be part of the
Capstone cryptography-control initiative. Clipper was widely criticized by cryptographers for two reasons. The cipher algorithm (called
Skipjack) was then classified (declassified in 1998, long after the Clipper initiative lapsed). The classified cipher caused concerns that the NSA had deliberately made the cipher weak in order to assist its intelligence efforts. The whole initiative was also criticized based on its violation of
Kerckhoffs's Principle
Kerckhoffs's principle (also called Kerckhoffs's desideratum, assumption, axiom, doctrine or law) of cryptography was stated by the Dutch cryptographer Auguste Kerckhoffs in the 19th century. The principle holds that a cryptosystem should be secu ...
, as the scheme included a special
escrow key held by the government for use by law enforcement (i.e.
wiretapping
Wiretapping, also known as wire tapping or telephone tapping, is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connecti ...
).
Digital rights management
Cryptography is central to digital rights management (DRM), a group of techniques for technologically controlling use of
copyright
A copyright is a type of intellectual property that gives its owner the exclusive legal right to copy, distribute, adapt, display, and perform a creative work, usually for a limited time. The creative work may be in a literary, artistic, ...
ed material, being widely implemented and deployed at the behest of some copyright holders. In 1998,
U.S. President
The president of the United States (POTUS) is the head of state and head of government of the United States. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal government of t ...
Bill Clinton
William Jefferson Clinton (né Blythe III; born August 19, 1946) is an American politician and lawyer who was the 42nd president of the United States from 1993 to 2001. A member of the Democratic Party (United States), Democratic Party, ...
signed the
Digital Millennium Copyright Act
The Digital Millennium Copyright Act (DMCA) is a 1998 United States copyright law that implements two 1996 treaties of the World Intellectual Property Organization (WIPO). It criminalizes production and dissemination of technology, devices, or ...
(DMCA), which criminalized all production, dissemination, and use of certain cryptanalytic techniques and technology (now known or later discovered); specifically, those that could be used to circumvent DRM technological schemes.
This had a noticeable impact on the cryptography research community since an argument can be made that any cryptanalytic research violated the DMCA. Similar statutes have since been enacted in several countries and regions, including the implementation in the
EU Copyright Directive. Similar restrictions are called for by treaties signed by
World Intellectual Property Organization
The World Intellectual Property Organization (WIPO; (OMPI)) is one of the 15 specialized agencies of the United Nations (UN). Pursuant to the 1967 Convention Establishing the World Intellectual Property Organization, WIPO was created to pr ...
member-states.
The
United States Department of Justice
The United States Department of Justice (DOJ), also known as the Justice Department, is a United States federal executive departments, federal executive department of the U.S. government that oversees the domestic enforcement of Law of the Unite ...
and
FBI
The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and Federal law enforcement in the United States, its principal federal law enforcement ag ...
have not enforced the DMCA as rigorously as had been feared by some, but the law, nonetheless, remains a controversial one.
Niels Ferguson
Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, including Bruce Schneier, designing cryptographic algorithms, testing algorithms and protoco ...
, a well-respected cryptography researcher, has publicly stated that he will not release some of his research into an
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
security design for fear of prosecution under the DMCA.
Cryptologist
Bruce Schneier
Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
has argued that the DMCA encourages
vendor lock-in
In economics, vendor lock-in, also known as proprietary lock-in or customer lockin, makes a customer dependent on a vendor for products, unable to use another vendor without substantial switching costs.
The use of open standards and alternati ...
, while inhibiting actual measures toward cyber-security.
Both
Alan Cox (longtime
Linux kernel
The Linux kernel is a Free and open-source software, free and open source Unix-like kernel (operating system), kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds in 1991 and was soon adopted as the k ...
developer) and
Edward Felten (and some of his students at Princeton) have encountered problems related to the Act.
Dmitry Sklyarov was arrested during a visit to the US from Russia, and jailed for five months pending trial for alleged violations of the DMCA arising from work he had done in Russia, where the work was legal. In 2007, the cryptographic keys responsible for
Blu-ray
Blu-ray (Blu-ray Disc or BD) is a digital optical disc data storage format designed to supersede the DVD format. It was invented and developed in 2005 and released worldwide on June 20, 2006, capable of storing several hours of high-defin ...
and
HD DVD
HD DVD (short for High Density Digital Versatile Disc) is an obsolete high-density optical disc format for storing data and playback of high-definition video. content scrambling were
discovered and released onto the Internet. In both cases, the
Motion Picture Association of America
The Motion Picture Association (MPA) is an American trade association representing the Major film studios, five major film studios of the Cinema of the United States, United States, the Major film studios#Mini-majors, mini-major Amazon MGM Stud ...
sent out numerous DMCA takedown notices, and there was a massive Internet backlash triggered by the perceived impact of such notices on
fair use
Fair use is a Legal doctrine, doctrine in United States law that permits limited use of copyrighted material without having to first acquire permission from the copyright holder. Fair use is one of the limitations to copyright intended to bal ...
and
free speech
Freedom of speech is a principle that supports the freedom of an individual or a community to articulate their opinions and ideas without fear of retaliation, censorship, or legal sanction. The right to freedom of expression has been recognise ...
.
Forced disclosure of encryption keys
In the United Kingdom, the
Regulation of Investigatory Powers Act gives UK police the powers to force suspects to decrypt files or hand over passwords that protect encryption keys. Failure to comply is an offense in its own right, punishable on conviction by a two-year jail sentence or up to five years in cases involving national security.
Successful prosecutions have occurred under the Act; the first, in 2009,
resulted in a term of 13 months' imprisonment.
Similar forced disclosure laws in Australia, Finland, France, and India compel individual suspects under investigation to hand over encryption keys or passwords during a criminal investigation.
In the United States, the federal criminal case of ''
United States v. Fricosu'' addressed whether a search warrant can compel a person to reveal an
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
passphrase
A passphrase is a sequence of words or other text used to control access to a computer system, program or data. It is similar to a password in usage, but a passphrase is generally longer for added security. Passphrases are often used to control ...
or password.
The
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
(EFF) argued that this is a violation of the protection from self-incrimination given by the
Fifth Amendment.
In 2012, the court ruled that under the
All Writs Act, the defendant was required to produce an unencrypted hard drive for the court.
In many jurisdictions, the legal status of forced disclosure remains unclear.
The 2016
FBI–Apple encryption dispute concerns the ability of courts in the United States to compel manufacturers' assistance in unlocking cell phones whose contents are cryptographically protected.
As a potential counter-measure to forced disclosure some cryptographic software supports
plausible deniability
Plausible deniability is the ability of people, typically senior officials in a formal or informal chain of command, to deny knowledge or responsibility for actions committed by or on behalf of members of their organizational hierarchy. They may ...
, where the encrypted data is indistinguishable from unused random data (for example such as that of a
drive which has been securely wiped).
Cryptography law in different countries
China
In October 1999, the
State Council promulgated the ''
Regulations on the Administration of Commercial Cryptography''. According to these regulations, commercial cryptography was treated as a
state secret.
On 26 October 2019, the
Standing Committee of the National People's Congress
The Standing Committee of the National People's Congress (NPCSC) is the permanent body of the National People's Congress (NPC), the national legislature of the People's Republic of China. It exercises the powers of the NPC when it is not in s ...
promulgated the ''
Cryptography Law of the People's Republic of China''. This law went into effect at the start of 2020.
The law categorizes cryptography into three categories:
* ''Core cryptography'', which is a state secret and suitable for information up to
''top secret'';
* ''Ordinary cryptography'', which is also a state secret and suitable for information up to ''secret'';
* ''Commercial cryptography'', which protects information that is not a state secret.
The law also states that there should be a "mechanism of both in-process and ex-post supervision on commercial cryptography, which combines routine supervision with random inspection" (implying that the
Chinese government
The government of the People's Republic of China is based on a system of people's congress within the parameters of a Unitary state, unitary communist state, in which the ruling Chinese Communist Party (CCP) enacts its policies through people's ...
should get access to encrypted servers).
It also states that foreign providers of commercial encryption need some sort of state approval.
Cryptosystems authorized for use in China include SM2,
SM3,
SM4 and
SM9.
France
As of 2011 and since 2004, the (; abbreviated LCEN) mostly liberalized the use of cryptography.
* As long as cryptography is only used for authentication and integrity purposes, it can be freely used. The cryptographic key or the nationality of the entities involved in the transaction do not matter. Typical e-business websites fall under this liberalized regime.
* Exportation and importation of cryptographic tools to or from foreign countries must be either declared (when the other country is a member of the European Union) or requires an explicit authorization (for countries outside the EU).
India
Section 69 of the
Information Technology Act, 2000
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.
Secon ...
(as amended in 2008) authorizes Indian government officials or policemen to listen in on any phone calls, read any SMS messages or emails, or monitor the websites that anyone visits, without requiring a warrant.
(However, this is a violation of
article 21 of the
Constitution of India
The Constitution of India is the supreme law of India, legal document of India, and the longest written national constitution in the world. The document lays down the framework that demarcates fundamental political code, structure, procedures ...
.
) This section also enables the
central government of India
The Government of India (ISO: Bhārata Sarakāra, legally the Union Government or Union of India or the Central Government) is the national authority of the Republic of India, located in South Asia, consisting of 36 states and union territor ...
or a
state government of India to compel any agency to decrypt information.
According to the
Information Technology (Intermediaries Guidelines) Rules, 2011, intermediaries are required to provide information to Indian government agencies for investigative or other purposes.
ISP license holders are freely allowed to use encryption keys up to
40 bits. Beyond that, they are required to obtain written permission and to deposit the
decryption key
A key in cryptography is a piece of information, usually a string of numbers or letters that are stored in a file, which, when processed through a cryptographic algorithm, can encode or decode cryptographic data. Based on the used method, the key ...
with the
Department of Telecommunications
The Department of Telecommunications, abbreviated to DoT, is a department of the Ministry of Communications of the executive branch of the Government of India
The Government of India (ISO 15919, ISO: Bhārata Sarakāra, legally the Union ...
.
Per the 2012
SEBI Master Circular for Stock Exchange or Cash Market (issued by the
Securities and Exchange Board of India
The Securities and Exchange Board of India (SEBI) is the Regulatory agency, regulatory body for securities and commodity market in India under the administrative domain of Ministry of Finance (India), Ministry of Finance within the Government ...
), it is the responsibility of
stock exchanges
A stock exchange, securities exchange, or bourse is an Exchange (organized market), exchange where stockbrokers and stock trader, traders can buy and sell security (finance), securities, such as share (finance), shares of stock, Bond (finance) ...
to maintain
data reliability and
confidentiality
Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information.
Legal confidentiality
By law, la ...
through the use of encryption.
Per
Reserve Bank of India
Reserve Bank of India, abbreviated as RBI, is the central bank of the Republic of India, and regulatory body responsible for regulation of the Indian banking system and Indian rupee, Indian currency. Owned by the Ministry of Finance (India), Min ...
guidance issued in 2001,
banks must use at least 128-bit
SSL to protect browser-to-bank communication; they must also encrypt sensitive data internally.
Electronics, including cryptographic products, is one of the categories of
dual-use items in the
Special Chemicals, Organisms, Materials, Equipment and Technologies (SCOMET; part of the
Foreign Trade (Development & Regulation Act), 1992). However, this regulation does not specify ''which'' cryptographic products are subject to export controls.
United States
In the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
, the
International Traffic in Arms Regulation
International Traffic in Arms Regulations (ITAR) is a set of U.S. Department of State regulations that control the export of defense and military technologies to safeguard national security and further its foreign policy objectives.
Overvi ...
restricts the export of cryptography.
See also
*
Official Secrets Act
An Official Secrets Act (OSA) is legislation that provides for the protection of Classified information, state secrets and official information, mainly related to national security. However, in its unrevised form (based on the UK Official Secret ...
- (
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
,
India
India, officially the Republic of India, is a country in South Asia. It is the List of countries and dependencies by area, seventh-largest country by area; the List of countries by population (United Nations), most populous country since ...
,
Ireland
Ireland (, ; ; Ulster Scots dialect, Ulster-Scots: ) is an island in the North Atlantic Ocean, in Northwestern Europe. Geopolitically, the island is divided between the Republic of Ireland (officially Names of the Irish state, named Irelan ...
,
Malaysia
Malaysia is a country in Southeast Asia. Featuring the Tanjung Piai, southernmost point of continental Eurasia, it is a federation, federal constitutional monarchy consisting of States and federal territories of Malaysia, 13 states and thre ...
and formerly
New Zealand
New Zealand () is an island country in the southwestern Pacific Ocean. It consists of two main landmasses—the North Island () and the South Island ()—and List of islands of New Zealand, over 600 smaller islands. It is the List of isla ...
)
*
Regulation of Investigatory Powers Act 2000
The Regulation of Investigatory Powers Act 2000 (citation of United Kingdom legislation, c. 23) (RIP or RIPA) is an Act of parliament, Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillanc ...
(
United Kingdom
The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Northwestern Europe, off the coast of European mainland, the continental mainland. It comprises England, Scotlan ...
)
*
Restrictions on the import of cryptography
* ''
United States v. Boucher'' (2009), on the right of a criminal defendant not to reveal a passphrase
*
FBI–Apple encryption dispute on whether cellphone manufacturers can be compelled to assist in their unlocking
References
External links
Bert-Jaap Koops' Crypto Law Survey- existing and proposed laws and regulations on cryptography
{{DEFAULTSORT:Cryptography Laws In Different Nations