1994-03-14 - LEAF field encryption

Header Data

From: smb@research.att.com
To: cypherpunks@toad.com
Message Hash: 8da4286a74434a29a1fb9f4be2ffec62acfaceda2bd4ff90eb260d3422b98fa1
Message ID: <9403142253.AA01834@toad.com>
Reply To: N/A
UTC Datetime: 1994-03-14 22:53:27 UTC
Raw Date: Mon, 14 Mar 94 14:53:27 PST

Raw message

From: smb@research.att.com
Date: Mon, 14 Mar 94 14:53:27 PST
To: cypherpunks@toad.com
Subject: LEAF field encryption
Message-ID: <9403142253.AA01834@toad.com>
MIME-Version: 1.0
Content-Type: text/plain


As promised, I asked Steve Kent -- a member of the review panel -- about
how the LEAF is encrypted.  Here's his answer, reposted with permission.

------- Forwarded Message

To: smb@research.att.com
Subject: Re: Key escrow review 
In-reply-to: Your message of Mon, 14 Mar 94 15:54:22 -0500.
Date: Mon, 14 Mar 94 17:03:18 -0500
From: Steve Kent <kent@BBN.COM>

Steve,

You are right....  SKIPJACK is used to encipher the LEAF, but employing
a complex mode.  The FBI can decode the "outer layer" of the LEAF to
get the chip ID, by using the "family key" but it cannot get at the
traffic key which is encrpted using the device unique key, the splits
for which are held by the escrow agents.

Steve

------- End of Forwarded Message






Thread