It is generally assumed that electronic cryptography benefits democracy because it can be instrumental in protecting free speech, which is considered a cornerstone for democracy. The author argues, however, that a close look at some aspects of democratic theory suggests that matters are not really as clear-cut. The fact that encryption can be abused in many ways also poses a threat to democracy. This paradox is examined in detail.
Get full access to this article
View all access options for this article.
References
1.
Fraenkel, E. (1968). Der Pluralismus als Strukturelement der freiheitlich-rechtsstaatlichen Demokratie [Pluralism as an element of the liberal democracy]. In E. Fraenkel (Ed.), Deutschland und die westlichen Demokratien (pp. 165-189). Stuttgart, Germany: Nomos.
2.
Heller, H. (1934). Staatslehre [Science of the state]. Leyden, the Netherlands: DTV.
3.
Hobbes, T. (1651). Leviathan. London: Reclam.
4.
Hoffmann, L. J. (Ed.). (1995). Building in Big Brother—The cryptographic policy debate. New York: Springer-Verlag.
5.
Locke, J. (1689). Two treatises of government. London: Reclam.
6.
Montesquieu, C. L. de. (1748). De l'esprit des lois [The spirit of the law]. Genf: Haselman.
7.
Müller, G., & Rannenberg, K. (Eds.). (1999). Multilateral security in communications—Technology, infrastructure, economy. New York: Addison & Wesley.
8.
Organization for Economic Cooperation and Development. (Eds.). (1998). Cryptography policy. Paris: Author.
9.
Rousseau, J.-J. (1762). Du contract social [Social contract]. Amsterdam: Reclam.
10.
Waltermann, J., & Machill, M. (Eds.). (2001). Verantwortung im Internet [Responsibility on the Internet]. Gütersloh, Germany: Bertelsmann.
11.
Winkel, O. (1997). Private Verschlüsselung als öffentliches Problem [Privacy-protecting cryptography as a public problem]. In T. Hobbes, Leviathan (pp. 567-586). Wiesbaden, Germany: Westdeutscher-Verlag.
12.
Winkel, O. (2001). The democratic potentials of interactive information technologies under discussion—Problems, viewpoints, and perspectives. International Journal of Communications Law and Policy, 6, 10-25.