Breadcrumbs

Deciphering the encryption dilemma

2 February 2018

Dr Michael Dizon.

To address the contentious issues surrounding access to and use of encryption, researchers at the University of Waikato plan to examine not just laws but also the other relevant rules that apply to the technology.

Their approach is in sharp contrast to the position of government leaders like Australian Prime Minister Malcolm Turnbull who believe that the law trumps the mathematics that underlie encryption. Mr Turnbull has been quoted as saying, “The laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia.”

Waikato researchers Associate Professor Wayne Rumbles, Associate Professor Ryan Ko and Dr Michael Dizon believe that a hard and inflexible stance is not supported by the research and is not conducive for finding an acceptable solution to the encryption dilemma. Scholars from diverse fields such as technology law, cybercrime, socio-legal studies, science and technology studies, and computer science have convincingly established that, together with law, social norms, market forces, scientific principles, and technical code all play important parts in the regulation of technology.

Previous studies have also shown that laws do not exist in a vacuum and they must be studied in context.  Dr Dizon says if governments wish to enact a law or policy to regulate a technology like encryption, it is essential to have a proper understanding of the technology itself as well as the norms and values of the relevant stakeholders who use it. If not, he says the law may prove ineffective or its legitimacy may be questioned.

Building on the Faculty of Law’s strength in the study of law in context and the Faculty of Computing and Mathematical Sciences’ expertise in cybersecurity, the researchers plan to examine the legal and technical principles and the social values that are pertinent to encryption. They are actively seeking participation and input from members of the general public, businesses, government and other stakeholders.

Their research on encryption is funded by the New Zealand Law Foundation’s Information Law and Policy Project, which is intended to explore and develop law and policy to help New Zealand adapt to changes in the information age.

Related stories

Counting Ourselves survey for trans and non-binary people getting strong response

Researchers have been overwhelmed by the huge response to Counting Ourselves, a community-led survey on…

Swarms, Artificial Intelligence and New Zealand’s Security

Dr Reuben Steff is looking at how Artificial Intelligence is going to have immense implications…

Major Endeavours for researchers

University of Waikato academics have been awarded funding for a broad range of major research…

The seeds of inspiration

University of Waikato researchers have been awarded funding to investigate new ways of reducing earthquake…

Disgusting, grotesque and offensive

Dr Dan Weijers is looking at how to deal with the public rejection of new…

Te Wiki o te Reo Māori, ka pai!

New research indicates people are using more Māori words in English, as well as understanding…

Don Klinger web

To measure or not to measure

Professor of Education Don Klinger says large-scale testing has its place.

A philosopher in the economist’s den

Dr Dan Weijers is heading to Wellington to contribute his optimistic vision for politics, and…

What's holding women back?

A group of geoscientists, including Karin Bryan from the University of Waikato, have taken the…

Armed to the teeth: do military animals deserve protection in war?

University of Waikato’s Dr Anna Marie Brennan is looking at whether animals on the front-line…

Valmaine Toki for web

Indigenous courts, the way of the future

A new book supports the introduction of marae-based courts to deal with Māori offenders.

Researchers argue backdoors violate encryption principles

Based on an ongoing project, University of Waikato researchers contend that building backdoors into encryption…