This article focuses on reviewing the specific laws, regulations, and core policy measures for encryption regulation during the two US administrations, and analyzes the logic and impact behind the policy differences by combining typical cases, clearly presenting the evolution of encryption regulation in the United States.