Master of nuggets, chicken bones and all other kinky food!

Security Engineering




Cryptography is science of mapping readable text which is called plaintext into unreadable format called ciphertext with using various mathematical functions to provide authenticity, integrity, non-repudiation, and secrecy. (Bennett L, 2001)

United States of America is one of the countries who have strict policy about exporting cryptographic products. Their policy is not as strict as before now, but they still do not export to some certain countries (Rogue States). Back in 90’s, rules were allowing American companies to export only 15 European Union countries and 8 other allowed ones. In 1999, previous president Bill Clinton’s administration made changes on these rules. (Reavis J, 1999) Although new publications by U.S. Department Of Commerce don’t mention any countries, it is clear that American corporations are not allow to in touch with companies from those countries which are totally banned from their government.

In logical way, to earn money from a product, private companies need to sell them as many clients as possible. That was one of the reasons why software lobby in the US pushed Clinton administration to ease those regulations. Right now those products could be sold many companies and we can presume that American Software Lobby is having much better time than before. Anyway if we need to think about dangers which may occur from selling those products to other countries; we should realize that as long as we are using internet, anything would stay as a secret. For instance if we don’t sell our product to a North Korean company, it doesn’t mean that they could reach blue-prints of the product and may decrypt it as they also working on technology and getting help from other countries. There are still strict regulations about cryptography used in Warplanes or weapons. E.g. Turkey had to fight long time to get access to F16’s source codes that they have purchased from the U.S. (Strategypage, 2011)

In 2001, Larry Bennett mentioned that cryptography is not the silver bullet for information security systems. In this sense we can imagine that, controlled commercial use of cryptography or sensible products wouldn’t harm any countries national security or defence more than having a rogue employee in their HQ’s.


‘Bennett L’, ‘2001’ ‘Cryptographic Services – A Brief Overview’, ‘SANS’, [Online], available from viewed 23 June 2012

Reavis J. 1999, ‘Pros and cons of the Clinton administration’s encryption export announcement’, ‘NetworkWorldFusion’, [Online] available from  viewed 23 june 2012

‘Turkey Gets F-16 Source Code’, (2011), ‘Strategy Page’, [Online] available from  viewed 23 June 2012

Leave a Reply

Your email address will not be published. Required fields are marked *