1996-05-25 - Re: Layman’s explanation for limits on escrowed encryption …

Header Data

From: jim bell <jimbell@pacifier.com>
To: Black Unicorn <hua@XENON.chromatic.com>
Message Hash: c9ebde6e122e05e7f9347fd89a8da3278c216a09e7e0ae8348dcf3ae5121e50e
Message ID: <199605241914.MAA10326@mail.pacifier.com>
Reply To: N/A
UTC Datetime: 1996-05-25 06:37:11 UTC
Raw Date: Sat, 25 May 1996 14:37:11 +0800

Raw message

From: jim bell <jimbell@pacifier.com>
Date: Sat, 25 May 1996 14:37:11 +0800
To: Black Unicorn <hua@XENON.chromatic.com>
Subject: Re: Layman's explanation for limits on escrowed encryption ...
Message-ID: <199605241914.MAA10326@mail.pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain


At 11:47 AM 5/24/96 -0400, Black Unicorn wrote:
>On Wed, 22 May 1996, Ernest Hua wrote:
>
>> Could someone with some knowledge of NSA/DoS/FBI intentions please
>> explain why key length limitations are necessary for escrowed
>> encryption?
>
>To deal with the possibility that someone might slip through the cracks of
>the escrow process.

However, this escrow process is claimed to be _voluntary._  And good, 
non-escrowed encryption already exists today, outside the US.  It won't be 
"slipping through the cracks," it'll be like opening the floodgates.  So the 
question is still open:  Why key-length limitations on export?

Jim Bell
jimbell@pacifier.com





Thread