About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

20 J. Tech. L. & Pol'y 39 (2015)
Breaking Encryption and Gathering Data: International Law Applications

handle is hein.journals/jtlp20 and id is 45 raw text is: 



    BREAKING ENCRYPTION AND GATHERING DATA:
          INTERNATIONAL LAW APPLICATIONS


                        Grant Hodgson*



1.   INTRODUCTION     .........................................................................  40

11.  ENCRYPTION AND ROUTE SELECTION FOR DATA
     TRAVELING ON THE INTERNET ................................................... 42
     A. How Data Is Encrypted ..................................................... 42
     B. Use of Cryptography on the Internet-Secure Sockets
        Layer (SSL) ........................................................................  44
     C. Networking and How Data Travels Over the Internet ..... 46
        1. Routing Between Networks: Border
           Gate-w ay Protocol ......................................................  47
        2. R outing Policy  ............................................................  47

III. SUMMARY OF THE LAW OF SOVEREIGNTY ............................... 48
     A. Rights and Obligations of Sovereignty .............................. 49
     B. Protections for Diplomatic Communications .................... 51

IV.  How SOVEREIGNTY APPLIES TO GATHERING DATA AND
     BREAKING ENCRYPTION GENERALLY ....................................... 52

V.   HOW THE LAW OF SOVEREIGNTY APPLIES TO SPECIFIC
     METHODS OF BREAKING ENCRYPTION ..................................... 54
     A . Brute  Force Attacks  ..........................................................  54
         1. H ow it W orks ............................................................... 54
         2. How the Law Applies ................................................. 55
     B. Defeating Cryptography by Obtaining the Key ................. 56
         1. H ow it W orks ............................................................... 56
         2. How the Law Applies ................................................. 57
     C. Man in the Middle Attacks ................................................. 57
         1. H ow it W orks ............................................................... 57
         2. How the Law Applies ................................................. 59
     D. Take Advantage of Predictable Random
        Number  Generators ..........................................................  60
        1.  H ow it W orks ............................................................... 60
        2. How the Law Applies ................................................. 61

     * Grant Hodgson, J.D. Candidate, J. Reuben Clark Law School, 2016. The Author would
 like to thank Eric Talbot Jensen for his guidance.
                               39

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Short-term subscription options include 24 hours, 48 hours, or 1 week to HeinOnline.

Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most