support structure of Internet must be able to be protected
encryption is key to this
encryption technology is not secret
export & use controls counterproductive to security
key escrow weakens security
identification keys should never be escrowed
can impersonate user - could void prosecution
| Previous slide | Next slide | Back to first slide | View graphic version |