An encryption chip designed under the auspices of the U.S. government. The government's idea was to enforce use of this chip in all devices that might use encryption, including computers, modems, telephones, and televisions. The government would control the encryption algorithm, thereby giving it the ability to decrypt any messages it recovered.
The Goal of Clipper Chip
The purported goal of this plan was to enable the U.S. government to carry out surveillance on enemies of the state even if they used encryption to protect their messages. However, the Clipper chip created a fierce backlash from both public interest organizations and the computer industry in general. The government eventually retracted its original plan but has since promoted two other plans called Clipper 2 and Clipper 3, respectively.
The Clipper 3 plan allows the use of any encryption technology but stipulates that government law enforcement agencies be able to recover any keys exported out of the country.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
We look at a few of the more troubling aspects of statistics and how these may be used to advance an agenda or skew the facts to someone's... Read More »29 Free Android Apps for Cash-Strapped Students
From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »Sharing Threat Intelligence
A growing number of startups make the sharing of threat intelligence a key part of their solutions. Read More »
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »Computer Architecture Study Guide
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »