What are the risks of having the US government select a cryptosystem for widespread commercial use (both inside and outside the United States). How could users from outside the United States overcome some or all of these risks?

What will be an ideal response?

Cryptosystems
are
extremely
complex,
and
it
therefore
can
take
years,
or
longer,
to
identify
their
vulnerabilities.
Sophisticated
governments
may
be
able
to
promote
theuse
of
cryptosystems
that
those
governments,
and
only
those
governments,
know
they
can
break.
Given
that
many
governments
have
historically
shown
great
interest
in
intercepting
foreign
communications,
using
cryptosystems
promoted
by
governments
can
be
a
risky
proposition.
This
risk
can
be
somewhat
mitigated
by
adding
a
second
layer
of
encryption
using
a
different
cryptosystem.

Computer Science & Information Technology

You might also like to view...

RGB stands for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

IPsec encompasses three functional areas: authentication, key management, and __________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology