Strong Encryption as a Social Convention Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

People can be divided according to different issues. In regards to “strong encryption” dependence, people are divided in those, who encrypt, and those, who do not encrypt. Nowadays, a number of discussions and misunderstandings take place around the term “strong encryption” and its importance for society. Many American states and several European countries support the idea of banning strong encryption. However, there are also such countries like Netherlands that are eager to give many facts in favor of strong encryption. The point is that not all people are aware of this term and its characteristics. Therefore, before defining strong encryption as a moral, legal, or even economic issue, it is necessary to comprehend it as a matter of social convention and make sure that all people know what social encryption means and how it may influence a human life.

General facts about strong encryption

It is easy to find a definition of strong encryption online and get an idea of what it means. However, even if the definition is memorized, not many people are able to comprehend its essence, worth, and possible impact on society. Strong encryption is a type of communication that can be protected and hidden against any kind of cryptographic analysis and available and readable to an intended group of people only. People try to invent and develop new programs and methods on how to recode information in such messages. However, strong encryption aims at creating a powerful protection. Much time and effort are necessary to decrypt the required portion of information. As a rule, not all attempts to decrypt information are successful.

Strong encryption and morality

The governments of many countries and the representatives of several American states admit that strong encryption is a serious threat to people and their security. In the light of the terroristic attacks in Paris and California, the Obama administration starts making several attempts to ban encrypted communication (Peterson par. 10). Politicians and military representatives want to change the conditions under which people may communicate and use the idea of safety measurements to support their positions. However, it is necessary to remember that the Internet belongs to people around the whole globe, and the governments do not have the rights to control it or define the conditions under which people may use it (Peterson par. 2). Many organizations try to raise the importance of moral issues in banning strong encryption.

Strong encryption as a matter of social convention

Still, it is necessary to understand that not all people know enough about strong encryption and the abilities people can get with it. Many people continue using the Internet as they did it several years ago and enjoy the possibilities they get. To make strong encryption an ethical issue, it is necessary to introduce strong encryption as a matter of social convention first. People should know as much as possible about the positive and negative aspects of strong encryption and make their independent decisions about the importance of its support or banning. American is one of the countries that have been promoting the idea of personal freedoms for a long period of time. As soon as the government of the country sees the threat of freedom, it tries to ban it in a short period. Such example should bother society and make people think about other opportunities that can be banned by the government as soon as they are identified as a threat.

Conclusion

In general, society should understand that the intentions to gain control over everything are useless. It is not an attempt to save people. It is just the way to make people think about other more dangerous ways to overcome the law and achieve the goals set.

References

Peterson, Andrea. “Debate over Encryption Isn’t just Happening in the US.” NZ Herald (2016). Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2020, June 13). Strong Encryption as a Social Convention. https://ivypanda.com/essays/strong-encryption-as-a-social-convention/

Work Cited

"Strong Encryption as a Social Convention." IvyPanda, 13 June 2020, ivypanda.com/essays/strong-encryption-as-a-social-convention/.

References

IvyPanda. (2020) 'Strong Encryption as a Social Convention'. 13 June.

References

IvyPanda. 2020. "Strong Encryption as a Social Convention." June 13, 2020. https://ivypanda.com/essays/strong-encryption-as-a-social-convention/.

1. IvyPanda. "Strong Encryption as a Social Convention." June 13, 2020. https://ivypanda.com/essays/strong-encryption-as-a-social-convention/.


Bibliography


IvyPanda. "Strong Encryption as a Social Convention." June 13, 2020. https://ivypanda.com/essays/strong-encryption-as-a-social-convention/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1