[9309] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: crypto backdoors = terrorisms free reign

daemon@ATHENA.MIT.EDU (Matt Blaze)
Sat Sep 15 17:29:21 2001

Message-Id: <200109151742.f8FHg3A17665@fbi.crypto.com>
To: Jim McCoy <mccoy@io.com>
Cc: nathan@fains.com, cryptography@wasabisystems.com
In-Reply-To: Message from Jim McCoy <mccoy@io.com> 
   of "Fri, 14 Sep 2001 20:34:09 PDT." <B7C81A41.AAD4%mccoy@io.com> 
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Sat, 15 Sep 2001 13:42:03 -0400
From: Matt Blaze <mab@research.att.com>

mccoy@io.com writes:
...
> 
> Incorrect.  While it is possible that such a backdoor can be found it is by
> no means as simple as you imply, particularly for non-state entities.  While
> such secrets can eventually leak out this task is not easy for even trained
> professionals, to claim that it is going to be a simple task for radicals
> and hostile countries is not consistent with the facts.  While some secrets
> are hard to protect (especially over time) it is possible to build a system
> for key scrow that makes abuse difficult, albeit not impossible, and still
> provides the law enforcement assistance that the public may demand.
...

Although the subtleties of the problem may not be completely obvious, the
security risks introduced by key escrow mechanisms are quite significant.
See, e.g., our 1998 report:

	http://www.crypto.com/papers/escrowrisks98.pdf

If anything, the risks we studied three years ago would be amplified
considerably today, given that encryption is now increasingly used as a
central component of the security of many critical services and systems.






---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post