15 C.F.R. Supplement No. 5 to Part 742—Checklist on Encryption and Other “Information Security” Functions


Title 15 - Commerce and Foreign Trade


Title 15: Commerce and Foreign Trade
PART 742—CONTROL POLICY—CCL BASED CONTROLS

Browse Previous |  Browse Next

Supplement No. 5 to Part 742—Checklist on Encryption and Other “Information Security” Functions

1. Does your product perform “cryptography”, or otherwise contain any parts or components that are capable of performing any of the following “information security” functions?

(Mark with an “X” all that apply)

a. __ encryption

b. __ decryption only (no encryption)

c. __ key management/public key infrastructure (PKI)

d. __ authentication (e.g., password protection, digital signatures)

e. __ copy protection

f. __ anti-virus protection

g. __ other (please

explain) :__________

h. __ NONE/NOT APPLICABLE

2. For items with encryption, decryption and/or key management functions (1.a, 1.b, 1.c above):

a. What symmetric algorithms and key lengths (e.g., 56-bit DES, 112/168-bit Triple-DES, 128/256-bit AES/Rijndael) are implemented or supported?

b. What asymmetric algorithms and key lengths (e.g., 512-bit RSA/Diffie-Hellman, 1024/2048-bit RSA/Diffie-Hellman) are implemented or supported?

c. What encryption protocols (e.g., SSL, SSH, IPSEC or PKCS standards) are implemented or supported?

d. What type of data is encrypted?

3. For products that contain an “encryption component”, can this encryption component be easily used by another product, or else accessed/re-transferred by the end-user for cryptographic use?

[68 FR 35785, June 17, 2003]

Browse Previous |  Browse Next























































chanrobles.com





ChanRobles Legal Resources:

ChanRobles On-Line Bar Review

ChanRobles Internet Bar Review : www.chanroblesbar.com

ChanRobles MCLE On-line

ChanRobles Lawnet Inc. - ChanRobles MCLE On-line : www.chanroblesmcleonline.com