Cover of book: Ethik der Kryptographie
Book Titles Open Access Full access

Ethik der Kryptographie

Authors:
Series:
Ethik | Ethics, Volume 3
Publisher:
 2025

Summary

Cryptography has been an integral part of everyday digital life for several decades. Information transmitted on the internet must be confidential, health data should remain private, and messenger services utilise end-to-end encryption. However, such technologies are also the subject of ongoing political debate. Should we restrict their use in the interest of national security? What do the cypherpunks have to do with this? And what role do human rights play in dealing with encryption? The “ethics of cryptography” provides technological, social, and ethical answers to these questions—ultimately arguing for the free and unregulated use of cryptography. This Title is also Available as Open Access.

Keywords



Bibliographic data

Copyright year
2025
ISBN-Print
978-3-7560-3158-0
ISBN-Online
978-3-7489-5500-9
Publisher
Nomos, Baden-Baden
Series
Ethik | Ethics
Volume
3
Language
German
Pages
309
Product type
Book Titles

Table of contents

ChapterPages
  1. Download chapter (PDF)
    1. Danksagung
    2. Inhaltsverzeichnis
  2. EinführungPages 9 - 14 Download chapter (PDF)
  3. Download chapter (PDF)
      1. 1.1 Die Anfänge von Kryptographie und Kryptoanalyse
      2. 1.2 Die Mechanisierung der Kryptographie
      1. 2.1 Ein neues Paradigma durch die Mathematik
      2. 2.2 Der Data Encryption Standard (DES)
      3. 2.3 Diffie-Hellman und RSA
        1. Vertraulichkeit
        2. Integrität
        3. Verfügbarkeit
        4. Authentizität
        5. Rechtsverbindlichkeit & Zurechenbarkeit
      4. 2.5 Quantum Computing und Verschlüsselung
  4. Download chapter (PDF)
      1. 3.1 Pretty Good Privacy (PGP)
      2. 3.2 Cryptoaktivismus
      3. 3.3 Cypherpunks und Crypto-Anarchie
      1. 4.1 Internet und Kryptographie
      2. 4.2 Warum das Internet doch regulierbar ist
        1. Beeinflussung der Forschung
        2. Exportbeschränkungen
        3. Backdoors
        4. Client-Side-Scanning
  5. Download chapter (PDF)
        1. Konsequentialismus
        2. Pflichtethik
      1. 5.2 Menschenrechte und Kryptographie
      2. 5.3 Werte, Normen und latent ambiguities
      1. 6.1 Kryptographie und Dual Use
      2. 6.2 Privacy vs. Sicherheit
      3. 6.3 Überwachung vs. Kryptographie
      1. 7.1 Transparenz und Verschlüsselung
      2. 7.2 Egalitäre Kryptographie
      3. 7.3 Identifikation mithilfe von Kryptographie
      1. 8.1 Client-Side-Scanning (CSS)
      2. 8.2 Regulierung über Intermediäre
      3. 8.3 Zukunft (einer Ethik) der Kryptographie
    1. Schluss und Ausblick
    2. Literatur

Similar publications

from the topics "Business Informatics", "Ethics", "Christian Theology", "Political Philosophy"
Cover of book: Langzeitpflege in der digitalen Gesundheitsökonomie
Book Titles Full access
Andreas Mayert
Langzeitpflege in der digitalen Gesundheitsökonomie
Cover of book: Instrumente Gottes
Edited Book Full access
Lukas Brand, Martin Kutz, Dominik Winter
Instrumente Gottes
Cover of book: Cultivating Character
Book Titles Full access
Tuba Işık
Cultivating Character
Cover of book: Philosophy after Auschwitz
Book Titles No access
Rolf Zimmermann
Philosophy after Auschwitz