3. Designed for installation by the user without further substantial support by the supplier; and



Similar documents
How To Get A License To Sell A Computer In Iran

Table of Contents INTRODUCTION (CCL) STRUCTURE

Encryption Simplification and the October 3 rd rule. Michael Pender Senior Engineer Information Technology Controls Division

Introduction To Commerce Department. Export Controls U.S. DEPARTMENT OF COMMERCE BUREAU OF INDUSTRY AND SECURITY OFFICE OF EXPORTER SERVICES

Encryption Export Controls: A Comparative Analysis between the EU and the US

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

OpenWay Radio Frequency FAQ

Top 10 Questions to Ask Before Exporting Software Containing Encryption

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

ANNEX. to the. Commission Delegated Regulation

Information and Communications Technology Courses at a Glance

1.Context What is the problem with current cryptographic techniques? Current Quantum Key Distribution (QKD)... 4

Security in Wireless Local Area Network

Rules and Regulations

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Lukasz Pater CMMS Administrator and Developer

RSA. Frequently Asked Questions. RSA Data Security, Inc. About Cryptography Export Laws. Answers to THE KEYS TO PRIVACY AND AUTHENTICATION

Fundamentals of Network Security - Theory and Practice-

Cryptography and Network Security: Summary

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

HANDBOOK 8 NETWORK SECURITY Version 1.0

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Secure Network Communications FIPS Non Proprietary Security Policy

Mobile Office Security Requirements for the Mobile Office

Savitribai Phule Pune University

ELECTRONIC COMMERCE WORKED EXAMPLES

COMPUTER & INTERNET. Westlaw Journal. Expert Analysis Software Development and U.S. Export Controls

Properties of Secure Network Communication

A Simulation Game for Teaching Secure Data Communications Protocols


Chapter 1: Introduction

Department of Commerce

Chapter 23. Database Security. Security Issues. Database Security

DRAFT Standard Statement Encryption

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES

Demystifying Wireless for Real-World Measurement Applications

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Neutralus Certification Practices Statement

Freescale Security Backgrounder Page 1

SecureStore I.CA. User manual. Version 2.16 and higher

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

National Security Agency Perspective on Key Management

Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

The Mathematics of the RSA Public-Key Cryptosystem

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Network Security Protocols

U.S. Department of Commerce Bureau of Industry and Security. How to Classify Your Item

Guide to Data Field Encryption

Cuban Regulations and Recent Easing of Activities in Cuba

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

Central Agency for Information Technology

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.

Forward Secrecy: How to Secure SSL from Attacks by Government Agencies

Technical Standards for Information Security Measures for the Central Government Computer Systems

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Security in Near Field Communication (NFC)

White Paper. Enhancing Website Security with Algorithm Agility

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

Wireless Network Standard and Guidelines

Framework of e-commerce

Module 7 Security CS655! 7-1!

Figure 1: Application scheme of public key mechanisms. (a) pure RSA approach; (b) pure EC approach; (c) RSA on the infrastructure

An Efficient data storage security algorithm using RSA Algorithm

Security Policy Revision Date: 23 April 2009

ITL BULLETIN FOR AUGUST 2012

Computer Security: Principles and Practice

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

Advanced Authentication

Mobility and cellular networks

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

SecureAge SecureDs Data Breach Prevention Solution

Applications that Benefit from IPv6

High Performance VPN Solutions Over Satellite Networks

In-Flight Encryption. Jim Theodoras. Feb 2014

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Table of Contents. Bibliografische Informationen digitalisiert durch

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

Study of algorithms for factoring integers and computing discrete logarithms

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

Scheme to Secure Communication of SCADA Master Station and Remote HMI s through Smart Phones

PCI Security Standards Council

Wireless Local Area Network Deployment and Security Practices

Secure Navigation and Authentication. Sherman Lo November 2008

between and U.S. CUSTOMS AND BORDER PROTECTION (CBP)

Transcription:

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 1 CATEGORY 5 TELECOMMUNICATIONS AND INFORMATION SECURITY Part 2 INFORMATION SECURITY Note 1: The control status of information security items or functions is determined in Category 5, Part 2 even if they are components, software or functions of other systems or equipment. N.B. to Note 1: Commodities and software specially designed for medical end-use that incorporate an item in Category 5, part 2 are not classified in any ECCN in Category 5, part 2. Note 2: Category 5, part 2, encryption products, when accompanying their user for the user's personal use or as tools of trade, are eligible for License Exceptions TMP or BAG, subject to the terms and conditions of these License Exceptions. Note 3: Cryptography Note: ECCNs 5A002 and 5D002 do not control items as follows: a. Items meeting all of the following: 1. Generally available to the public by being sold, without restriction, from stock at retail selling points by means of any of the following: a. Over-the-counter transactions; b. Mail order transactions; c. Electronic transactions; or d. Telephone call transactions; 2. The cryptographic functionality cannot be easily changed by the user; 3. Designed for installation by the user without further substantial support by the supplier; and 4. [RESERVED] 5. When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter s country in order to ascertain compliance with conditions described in paragraphs 1. through 3. of this Note a.; b. Hardware components or executable software, of existing items described in paragraph a. of this Note, that have been designed for these existing items, and meeting all of the following: 1. Information security is not the primary function or set of functions of the component or executable software ; 2. The component or executable software does not change any cryptographic functionality of the existing items, or add new cryptographic functionality to the existing items; 3. The feature set of the component or executable software is fixed and is not designed or modified to customer specification; and 4. When necessary, as determined by the appropriate authority in the exporter s country, details of the component or executable software, and details of relevant end-items are accessible and will be provided to the authority upon request, in order to ascertain compliance with conditions described above. Technical Note: For the purpose of the Cryptography Note, executable software means software in executable form, from an existing hardware component excluded from 5A002 by the Cryptography Note.

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 2 Note: Executable software does not include complete binary images of the software running on an end-item. Note to the Cryptography Note: 1. To meet paragraph a. of Note 3, all of the following must apply: a. The item is of potential interest to a wide range of individuals and businesses; and b. The price and information about the main functionality of the item are available before purchase without the need to consult the vendor or supplier. 2. In determining eligibility of paragraph a. of Note 3, BIS may take into account relevant factors such as quantity, price, required technical skill, existing sales channels, typical customers, typical use or any exclusionary practices of the supplier. N.B. to Note 3 (Cryptography Note): You must submit a classification request or encryption registration to BIS for mass market encryption commodities and software eligible for the Cryptography Note employing a key length greater than 64 bits for the symmetric algorithm (or, for commodities and software not implementing any symmetric algorithms, employing a key length greater than 768 bits for asymmetric algorithms or greater than 128 bits for elliptic curve algorithms) in accordance with the requirements of 742.15(b) of the EAR in order to be released from the EI and NS controls of ECCN 5A002 or 5D002. Note 4: Category 5, Part 2 does not apply to items incorporating or using cryptography and meeting all of the following: a. The primary function or set of functions is not any of the following: 1. Information security ; 2. A computer, including operating systems, parts and components therefor; 3. Sending, receiving or storing information (except in support of entertainment, mass commercial broadcasts, digital rights management or medical records management); or 4. Networking (includes operation, administration, management and provisioning); b. The cryptographic functionality is limited to supporting their primary function or set of functions; and c. When necessary, details of the items are accessible and will be provided, upon request, to the appropriate authority in the exporter's country in order to ascertain compliance with conditions described in paragraphs a. and b. above. A. END ITEMS, EQUIPMENT, ACCESSORIES, ATTACHMENTS, PARTS, COMPONENTS, AND SYSTEMS 5A002 Information security systems, equipment and components therefor, as follows (see ). Reason for Control: NS, AT, EI

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 3 NS applies to entire entry NS Column 1 EI applies to 5A002.a.1,.a.2,.a.5,.a.6,.a.9 and.b. Refer to 742.15 of the EAR. Note: See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. LVS: Yes: $500 for components. for systems and equipment. GBS: CIV: ENC: Yes for certain EI controlled commodities, see 740.17 of the EAR for eligibility. Related Controls(1) ECCN 5A002.a controls components providing the means or functions necessary for information security. All such components are presumptively specially designed and controlled by 5A002.a. (2) 5A002 does not control the commodities listed in paragraphs (a), (d), (e), (f), (g), (i), (j), (k), (l) and (m) in the Note in the items paragraph of this entry. These commodities are instead classified under ECCN 5A992, and related software and technology are classified under ECCNs 5D992 and 5E992 respectively. (3) After encryption registration to or classification by BIS, mass market encryption commodities that meet eligibility requirements are released from EI and NS controls. These commodities are classified under ECCN 5A992.c. See 742.15(b) of the EAR. Related Definitions: Note: 5A002 does not control any of the following. However, these items are instead controlled under 5A992: (a) Smart cards and smart card readers/writers as follows: (1) A smart card or an electronically readable personal document (e.g., token coin, e- passport) that meets any of the following: a. The cryptographic capability is restricted for use in equipment or systems excluded from 5A002 by Note 4 in Category 5 - Part 2 or entries (b) to (i) of this Note, and cannot be reprogrammed for any other use; or b. Having all of the following: 1. It is specially designed and limited to allow protection of personal data stored within; 2. Has been, or can only be, personalized for public or commercial transactions or individual identification; and 3. Where the cryptographic capability is not user-accessible; Technical Note: 'personal data includes any data specific to a particular person or entity, such as the amount of money stored and data necessary for authentication. (2) Readers/writers specially designed or modified, and limited, for items specified by (a)(1) of this Note; Technical Note: Readers/writers include equipment that communicates with smart cards

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 4 or electronically readable documents through a network. (b) [RESERVED] N.B.: See Note 4 in Category 5 - Part 2 for items previously specified in 5A002 Note (b). (c) [RESERVED] N.B.: See Note 4 in Category 5 - Part 2 for items previously specified in 5A002 Note (c). (d) Cryptographic equipment specially designed and limited for banking use or money transactions ; Technical Note: The term money transactions includes the collection and settlement of fares or credit functions. (e) Portable or mobile radiotelephones for civil use (e.g., for use with commercial civil cellular radio communication systems) that are not capable of transmitting encrypted data directly to another radiotelephone or equipment (other than Radio Access Network (RAN) equipment), nor of passing encrypted data through RAN equipment (e.g., Radio Network Controller (RNC) or Base Station Controller (BSC)); (f) Cordless telephone equipment not capable of end-to-end encryption where the maximum effective range of unboosted cordless operation (i.e., a single, unrelayed hop between terminal and home base station) is less than 400 meters according to the manufacturer's specifications; (g) Portable or mobile radiotelephones and similar client wireless devices for civil use, that implement only published or commercial cryptographic standards (except for anti-piracy functions, which may be non-published) and also meet the provisions of paragraphs a.2. to a.5. of the Cryptography Note (Note 3 in Category 5 - Part 2), that have been customized for a specific civil industry application with features that do not affect the cryptographic functionality of these original non-customized devices; (h) [RESERVED] N.B.: See Note 4 in Category 5 - Part 2 for items previously specified in 5A002 Note (h). (i) Wireless personal area network equipment that implement only published or commercial cryptographic standards and where the cryptographic capability is limited to a nominal operating range not exceeding 30 meters according to the manufacturer s specifications, or not exceeding 100 meters according to the manufacturer s specifications for equipment that cannot interconnect with more than seven devices; (j) Equipment, having no functionality specified by 5A002.a.2, 5A002.a.4, 5A002.a.7, 5A002.a.8 or 5A002.b, meeting all of the following: 1. All cryptographic capability specified by 5A002.a meets any of the following: a. It cannot be used; or b. It can only be made useable by means of cryptographic activation ; and 2. When necessary as determined by the appropriate authority in the exporter s country, details of the equipment are accessible and will be provided to the authority upon request, in order to ascertain compliance with conditions described above; N.B.1: See 5A002.a for equipment that has undergone cryptographic activation. N.B.2: See also 5A002.b, 5D002.d and 5E002.b. (k) Mobile telecommunications Radio Access Network (RAN) equipment designed for civil use,

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 5 which also meet the provisions 2. to 5. of part a. of the Cryptography Note (Note 3 in Category 5, Part 2), having an RF output power limited to 0.1W (20 dbm) or less, and supporting 16 or fewer concurrent users; (l) Routers, switches or relays, where the information security functionality is limited to the tasks of Operations, Administration or Maintenance ( OAM ) implementing only published or commercial cryptographic standards; or (m) General purpose computing equipment or servers, where the information security functionality meets all of the following: 1. Uses only published or commercial cryptographic standards; and 2. Is any of the following: a. Integral to a CPU that meets the provisions of Note 3 to Category 5-Part 2; b. Integral to an operating system that is not specified by 5D002; or c. Limited to OAM of the equipment. a. Systems, equipment and components, for information security, as follows: N.B.: For the control of Global Navigation Satellite Systems (GNSS) receiving equipment containing or employing decryption, see ECCN 7A005, and for related decryption software and technology see 7D005 and 7E001. a.1. Designed or modified to use cryptography employing digital techniques performing any cryptographic function other than authentication, digital signature, or execution of copy-protected software, and having any of the following: Technical Notes: 1. Functions for authentication, digital signature and the execution of copy-protected software include their associated key management function. 2. Authentication includes all aspects of access control where there is no encryption of files or text except as directly related to the protection of passwords, Personal Identification Numbers (PINs) or similar data to prevent unauthorized access. a.1.a. A symmetric algorithm employing a key length in excess of 56-bits; or Technical Note: Parity bits are not included in the key length. a.1.b. An asymmetric algorithm where the security of the algorithm is based on any of the following: a.1.b.1. Factorization of integers in excess of 512 bits (e.g., RSA); a.1.b.2. Computation of discrete logarithms in a multiplicative group of a finite field of size greater than 512 bits (e.g., Diffie- Hellman over Z/pZ); or a.1.b.3. Discrete logarithms in a group other than mentioned in 5A002.a.1.b.2 in excess of 112 bits (e.g., Diffie-Hellman over an elliptic curve); a.2. Designed or modified to perform cryptanalytic functions ; Note: 5A002.a.2 includes systems or equipment, designed or modified to perform cryptanalytic functions by means of reverse engineering. Technical Note: Cryptanalytic functions are functions designed to defeat cryptographic

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 6 mechanisms in order to derive confidential variables or sensitive data, including clear text, passwords or cryptographic keys. a.3. [RESERVED] a.4. Specially designed or modified to reduce the compromising emanations of information-bearing signals beyond what is necessary for health, safety or electromagnetic interference standards; a.5. Designed or modified to use cryptographic techniques to generate the spreading code for spread spectrum systems, not controlled in 5A002.a.6., including the hopping code for frequency hopping systems; a.6. Designed or modified to use cryptographic techniques to generate channelizing codes, scrambling codes or network identification codes, for systems using ultra-wideband modulation techniques and having any of the following: or a.6.a. A bandwidth exceeding 500 MHz; a.6.b. A fractional bandwidth of 20% or more; a.7. Non-cryptographic information and communications technology (ICT) security systems and devices that have been evaluated and certified by a national authority to exceed class EAL-6 (evaluation assurance level) of the Common Criteria (CC) or equivalent; a.8. Communications cable systems designed or modified using mechanical, electrical or electronic means to detect surreptitious intrusion; Note: 5A002.a.8 applies only to physical layer security. a.9. Designed or modified to use or perform quantum cryptography. Technical Note: Quantum cryptography is also known as Quantum Key Distribution (QKD). b. Systems, equipment and components, designed or modified to enable, by means of cryptographic activation, an item to achieve or exceed the controlled performance levels for functionality specified by 5A002.a that would not otherwise be enabled. 5A992 Equipment not controlled by 5A002 (see ). Reason for Control: AT Note: See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. LVS: GBS: CIV:

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 7 Related Controls: Related Definitions: a. Telecommunications and other information security equipment containing encryption. b. Information security equipment, n.e.s., (e.g., cryptographic, cryptanalytic, and cryptologic equipment, n.e.s.) and components therefor. Note: 5A992 does not control products with cryptographic functionality limited to copy protection. c. Commodities that BIS has received an encryption registration or that have been classified as mass market encryption commodities in accordance with 742.15(b) of the EAR. LVS: GBS: CIV: ENC: Yes for certain EI controlled equipment, see 740.17 of the EAR for eligibility. Related Controls: Related Definitions: a. Equipment specially designed for the development or production of equipment controlled by 5A002 or 5B002.b; b. Measuring equipment specially designed to evaluate and validate the information security functions of equipment controlled by 5A002 or software controlled by 5D002.a or 5D002.c. B. TEST, INSPECTION AND PRODUCTION EQUIPMENT 5B002 Information Security test, inspection and production equipment, as follows (see ). Reason for Control: NS, AT NS applies to entire entry NS Column 1 C. MATERIALS - [RESERVED] D. SOFTWARE 5D002 Software as follows (see List of Items Controlled). Reason for Control: NS, AT, EI NS applies to entire entry NS Column 1 EI applies to software in 5D002.a, c.1 or.d for equipment controlled for EI reasons in ECCN

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 8 5A002. Refer to 742.15 of the EAR. Note: See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. Note: Encryption software is controlled because of its functional capacity, and not because of any informational value of such software; such software is not accorded the same treatment under the EAR as other software ; and for export licensing purposes, encryption software is treated under the EAR in the same manner as a commodity included in ECCN 5A002. Note: Encryption source code classified under this entry remains subject to the EAR even when made publicly available in accordance with part 734 of the EAR. However, publicly available encryption object code software classified under ECCN 5D002 is not subject to the EAR when the corresponding source code meets the criteria specified in 740.13(e), see also 734.3(b)(3) of the EAR. CIV: TSR: ENC: Yes for certain EI controlled software, see 740.17 of the EAR for eligibility. Related Controls: (1) This entry does not control software required for the use of equipment excluded from control under the Related Controls paragraph or the Technical Notes in ECCN 5A002 or software providing any of the functions of equipment excluded from control under ECCN 5A002. This software is classified as ECCN 5D992. (2) After an encryption registration has been submitted to BIS or classification by BIS, mass market encryption software that meet eligibility requirements are released from EI and NS controls. This software is classified under ECCN 5D992.c. See 742.15(b) of the EAR. Related Definitions: 5D002.a controls software designed or modified to use cryptography employing digital or analog techniques to ensure information security. a. Software specially designed or modified for the development, production or use of equipment controlled by 5A002 or software controlled by 5D002.c; b. Software specially designed or modified to support technology controlled by 5E002; c. Specific software as follows: c.1. Software having the characteristics, or performing or simulating the functions of the equipment, controlled by 5A002; c.2. Software to certify software controlled by 5D002.c.1; Note: 5D002.c does not apply to software limited to the tasks of OAM implementing only published or commercial cryptographic standards. d. Software designed or modified to enable, by means of cryptographic activation, an item to achieve or exceed the controlled performance levels for functionality specified by 5A002.a that would not otherwise be enabled.

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 9 5D992 Information Security software not controlled by 5D002 as follows (see List of Items Controlled). 5A992.b. b. Software having the characteristics, or performing or simulating the functions of the equipment controlled by ECCN 5A992.a or 5A992.b. Reason for Control: AT c. Software that BIS has received an encryption registration or that have been classified as mass market encryption software in accordance with 742.15(b) of the EAR. Note: See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. CIV: TSR: Related Controls: This entry does not control software designed or modified to protect against malicious computer damage, e.g., viruses, where the use of cryptography is limited to authentication, digital signature and/or the decryption of data or files. Related Definitions: a. Software specially designed or modified for the development, production, or use of equipment controlled by ECCN 5A992.a or E. TECHNOLOGY 5E002 Technology as follows (see List of Items Controlled). Reason for Control: NS, AT, EI NS applies to entire entry NS Column 1 EI applies to technology for the development, production, or use of commodities or software controlled for EI reasons in ECCNs 5A002 or 5D002. Refer to 742.15 of the EAR. Notes: 1) See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. 2) When a person performs or

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 10 provides technical assistance that incorporates, or otherwise draws upon, technology that was either obtained in the United States or is of USorigin, then a release of the technology takes place. Such technical assistance, when rendered with the intent to aid in the development or production of encryption commodities or software that would be controlled for EI reasons under ECCN 5A002 or 5D002, may require authorization under the EAR even if the underlying encryption algorithm to be implemented is from the public domain or is not of U.S. origin. CIV: TSR: ENC: Yes for certain EI controlled technology, see 740.17 of the EAR for eligibility. Related Controls: See also 5E992. This entry does not control technology required for the use of equipment excluded from control under the Related Controls paragraph or the Technical Notes in ECCN 5A002 or technology related to equipment excluded from control under ECCN 5A002. This technology is classified as ECCN 5E992. Related Definitions: a. Technology according to the General Technology Note for the development, production or use of equipment controlled by 5A002 or 5B002 or software controlled by 5D002.a or 5D002.c. b. Technology to enable, by means of cryptographic activation, an item to achieve or exceed the controlled performance levels for functionality specified by 5A002.a that would not otherwise be enabled. Note: 5E002 includes information security technical data resulting from procedures carried out to evaluate or determine the implementation of functions, features or techniques specified in Category 5-Part 2. 5E992 Information Security technology according to the General Technology Note, not controlled by 5E002, as follows (see List of Items Controlled). Reason for Control: AT Note: See 744.17 of the EAR for additional license requirements for microprocessors having a processing speed of 5 GFLOPS or more and an arithmetic logic unit with an access width of 32 bit or more, including those incorporating information security functionality, and associated software and technology for the production or development of such microprocessors. CIV: TSR: Related Controls: Related Definitions: a. Technology n.e.s., for the development,

Commerce Control List Supplement No. 1 to Part 774 Category 5 - Info. Security page 11 production or use of equipment controlled by 5A992.a, information security or cryptologic equipment controlled by 5A992.b or software controlled by 5D992.a or b. b. Technology, n.e.s., for the use of mass market commodities controlled by 5A992.c or mass market software controlled by 5D992.c. EAR99 Items subject to the EAR that are not elsewhere specified in this CCL Category or in any other category in the CCL are designated by the number EAR99.