Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

6/27/2018
09:00 AM
50%
50%

IEEE Calls for Strong Encryption

Newly issued position statement by the organization declares backdoor and key-escrow schemes could have 'negative consequences.'

The IEEE this week issued a position statement in support of strong encryption and in opposition to government efforts to require backdoors.

"IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications. We oppose efforts by governments to restrict the use of strong encryption and/or to mandate exceptional access mechanisms such as 'backdoors' or 'key escrow schemes' in order to facilitate government access to encrypted data," the organization's statement reads.

Backdoors and key escrow apporaches would open the door for vulnerabilities and other negative impacts on encryption, according to the IEEE. Law enforcement has other options besides backdoors, including legal action, forensic analysis, and requiring suspects to hand over keys and passwords, it said.

Read the full statement here

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2018 | 2:38:47 PM
IEEE supports the use of unfettered strong encryption to protect confidentiality and integrity of data and communications
Good to see the IEEE is taking a stand to support data protection. Regardless of which side of the fence you fall on, if you support the core CIA principles you realize that strong encryption is the answer. And you can't have strong data protections if you are storing the keys in many locations.
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/29/2018 | 2:36:10 PM
Backdoors and key escrow apporaches
This defeats the purpose of encryption. If there is a need for this data by the government then due process should be followed to work with the provider of the data to decrypt. It is ill advised to have the government always have the keys to your house, no matter how good their intentions may be.
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
5 Common Errors That Allow Attackers to Go Undetected
Matt Middleton-Leal, General Manager and Chief Security Strategist, Netwrix,  2/12/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-16994
PUBLISHED: 2020-02-18
An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices. Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is no...
CVE-2020-7796
PUBLISHED: 2020-02-18
Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.
CVE-2020-8633
PUBLISHED: 2020-02-18
An issue was discovered in Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7. When grantors revoked a shared calendar in Outlook, the calendar stayed mounted and accessible.
CVE-2020-9268
PUBLISHED: 2020-02-18
SoPlanning 1.45 is vulnerable to SQL Injection in the OrderBy clause, as demonstrated by the projets.php?order=nom_createur&by= substring.
CVE-2020-9269
PUBLISHED: 2020-02-18
SOPlanning 1.45 is vulnerable to authenticated SQL Injection that leads to command execution via the users parameter, as demonstrated by export_ical.php.