"Self
Incrimination and Cryptographic
"When does public security come before
fifth amendment rights?"
the Department of Justice's "Federal Guidelines for
Searching and Seizing Computers".
Encryption and the Fifth Amendment |
Introduction
Modern cryptography can make it virtually impossible
to decipher
documents without the cryptographic key, thus making the
availability of the contents of those documents depend on the
availability of the key. I will examine the Fifth Amendments'
protection against compulsory production of the key.
Compulsory Production of Cryptographic Keys
and
the Fifth Amendment
Fifth Amendment analysis must focus on the disclosure
A non-cryptographic key is physical evidence, not A cryptographic key need not have testimonial content.
Although the key has no testimonial content, a statement One unique property of a cryptographic key is that it
Another unique property of a cryptographic key is that it |
Derivative Use Immunity
Immunity as a result of unique properties of
|
Authentication will be impossible without the key.
Back to the list of student paper topics
Back to the CCP home page