Free Speech Online Campaign
"LAWFUL USE OF ENCRYPTION.-It shall be lawful for any person within any State of the United States... to use any encryption, regardless of encryption algorithm selected, encryption key length chosen, or implementation technique or medium used...
except as provided in this Act... or in any other law."
-- Senate Bill S.1587 - The Encrypted Communications Privacy Act
introduced 5 March 1996 by Sen. Leahy (D-VT) and Rep. Goodlatte (R-VA)
details & analysis available from Electronic Privacy Information Center
and Voters Telecommunications Watch


The Main Page:
CRYPTO•LOG TM
The Internet Guide to Cryptography


Updated Friday 29 March 1996

WELCOME PAGE | FEEDBACK | DISCLAIMER | COPYRIGHT

Table of Contents:

Algorithms & Mathematics for Cryptography - under construction
Archives (FTP & WWW access to documents, programs & source code)
Bibliographies, Periodicals, E-Journals, Books, Databases, Internet Searchers
Calendar (conferences, meetings, and workshops on cryptography & related fields)
Disk & File System Encryption
Key Escrow - Clipper and "GAK" (government access to crypto keys)
Laws & Regulations (ITAR, export issues, etc.)
Links - to more cryptography resources:
Network & Internet Security
Newsgroups, FAQs and Mailing Lists
Organizations, Academic (universities & institutes, in alphabetical order by country)
Organizations, Commercial
Organizations, Government
Organizations, Policy & Public Interest
Organizations, Technical & Professional
Policy Discussions
Protocols & Standards
Software (products, programs and source code)
Steganography - hiding information within noise; a way to supplement (not replace) encryption, to prevent the existence of encrypted data from being detected
Voice Encryption (telephone security, wiretapping threats) - 3 software programs listed below turn a computer (with modem and sound card) into a secure telephone, using speech compression and strong encryption protocols to provide a secure real-time voice channel over the public telephone system or Internet:
Vulnerabilities - risks & defects in cryptography-based security systems


FEEDBACK is welcome:
E-mail your comments and suggested additions to Bob Flower at
chronos@enter.net

COPYRIGHT (C) 1996 Robert G. Flower. All rights reserved.
Permission is granted to any nonprofit nongovernment organization to reproduce any portion of this document, provided that this copyright notice is reproduced. Any other reproduction in part or in whole in any form or medium without explicit written permission of the copyright owner is prohibited.
Trademarks are the property of their respective owners.

DISCLAIMER:
This information is provided for research and educational purposes only. No warranty is made as to its accuracy, completeness, or suitability for any particular purpose. Cryptography technology is regulated in some countries. The reader is responsible for compliance with applicable laws.

NOTE to Web Meisters and bookmarkers:
Please link to the Crypto•Log Welcome Page at URL:
http://www.enter.net/~chronos/cryptolog.html
Crypto•Log is served by ENTER.NET, the premier Internet Service Provider in eastern Pennsylvania