Does your application support, support, contain or use cryptography or encryption?
This question will help you determine if your application uses the type of cryptography that is governed by the Export Administration Rules. The question includes examples from this list; but remember that this list does not include all the possible uses of cryptography.
It is important . When you answer this question, consider not only the code that you wrote for your application, but also all the software libraries, utilities, and operating system components that your application or links relate to.
- Any use of a digital signature, such as authentication or integrity verification
- Encryption of any data or files that your application uses or uses.
- Key management, certificate management, or anything that interacts with a public key infrastructure.
- Using a secure communication channel such as NTLM, Kerberos, Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
- Encryption of passwords or other forms of information security
- Copy Protection or Digital Rights Management (DRM)
- Antivirus protection
For a complete and current list of cryptographic applications, see EAR controls for items that use encryption.
Is cryptography or encryption limited to one or more of the tasks listed here?
If you answered yes to the first question, then the second question lists some of the applications of cryptography that are not limited. Here are unlimited tasks:
- Password encryption
- Copy protection
- Authentication
- Digital Rights Management
- Using digital signatures
If your application calls, supports, contains or uses cryptography or encryption for any task that is not on this list, then your answer to this question is No.