1993-04-19 - Another forwarded message

Header Data

From: TO1SITTLER@APSICC.APS.EDU
To: cypherpunks@toad.com
Message Hash: 9d9b510caa8bbbe064aa28258e39261f41753242c000b3fb8c22463c51fc4566
Message ID: <930419142408.1d39@APSICC.APS.EDU>
Reply To: N/A
UTC Datetime: 1993-04-19 20:26:38 UTC
Raw Date: Mon, 19 Apr 93 13:26:38 PDT

Raw message

From: TO1SITTLER@APSICC.APS.EDU
Date: Mon, 19 Apr 93 13:26:38 PDT
To: cypherpunks@toad.com
Subject: Another forwarded message
Message-ID: <930419142408.1d39@APSICC.APS.EDU>
MIME-Version: 1.0
Content-Type: text/plain


From:	APSICC::GR2KITTRELL  "TOO MANY SECRETS" 18-APR-1993 21:52:10.16
To:	TO1SITTLER
CC:	
Subj:	Process

From:	SMTP%"igor@e5.ijs.si" 18-APR-1993 18:05:57.69
To:	gr2kittrell@apsicc.aps.edu
CC:	
Subj:	(fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]

Date: Mon, 19 Apr 1993 01:34:02 +0200
From: Igor Petrovski <igor@e5.ijs.si>
Message-Id: <199304182334.AA00721@kekec.e5.ijs.si>
To: gr2kittrell@apsicc.aps.edu
Subject: (fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Newsgroups: sci.crypt
Organization: Open Systems & Networks, ijs, Slovenia

Relay-Version: VMS News - V6.1 30/1/93 VAX/VMS V5.5-1; site cathy.ijs.si
Path: cathy.ijs.si!arnes.si!scsing.switch.ch!ira.uka.de!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!darwin.sura.net!haven.umd.edu!uunet!looking!brad
Newsgroups: sci.crypt
Subject: Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Message-ID: <1993Apr17.204850.26711@clarinet.com>
From: brad@clarinet.com (Brad Templeton)
Date: Sat, 17 Apr 1993 20:48:50 GMT
References: <strnlghtC5LGFI.JqA@netcom.com> <jhesseC5LuMC.2Ex@netcom.com> <rdippold.735042679@qualcom>
Organization: ClariNet Communications Corp.
Keywords: encryption, wiretap, clipper, key-escrow, Mykotronx
Lines: 24

One presumes the system could work as follows:

a) Blank clips are manufactured by Mykotronx and VLSI.  The number
produced is carefully audited and they are shipped to the first
escrow house.

It programs the chips with its half the key, and prints out a paper slip
with the key half and non-secret chip serial number.   The reams of paper
are filed in locked boxes in the vault, a fuse is burnt in the chip so
that the key is now unreadable.

The chip then goes to the next escrow house, where the same thing is
done.  This continues through N escrow houses, perhaps, could be more than
2.

The last one provides the chip to the cellular phone maker.

And yes, this has to be a public key system or it would be almost
impossible to handle.  It might not be RSA, but that does not mean
that PKP doesn't get paid.  Until 1997, PKP has the patent on the
general concept of public key encryption, as well as the particular
implementation known as RSA.
-- 
Brad Templeton, ClariNet Communications Corp. -- Sunnyvale, CA 408/296-0366





Thread