From: smb@research.att.com
To: cypherpunks@toad.com
Message Hash: 8da4286a74434a29a1fb9f4be2ffec62acfaceda2bd4ff90eb260d3422b98fa1
Message ID: <9403142253.AA01834@toad.com>
Reply To: N/A
UTC Datetime: 1994-03-14 22:53:27 UTC
Raw Date: Mon, 14 Mar 94 14:53:27 PST
From: smb@research.att.com
Date: Mon, 14 Mar 94 14:53:27 PST
To: cypherpunks@toad.com
Subject: LEAF field encryption
Message-ID: <9403142253.AA01834@toad.com>
MIME-Version: 1.0
Content-Type: text/plain
As promised, I asked Steve Kent -- a member of the review panel -- about
how the LEAF is encrypted. Here's his answer, reposted with permission.
------- Forwarded Message
To: smb@research.att.com
Subject: Re: Key escrow review
In-reply-to: Your message of Mon, 14 Mar 94 15:54:22 -0500.
Date: Mon, 14 Mar 94 17:03:18 -0500
From: Steve Kent <kent@BBN.COM>
Steve,
You are right.... SKIPJACK is used to encipher the LEAF, but employing
a complex mode. The FBI can decode the "outer layer" of the LEAF to
get the chip ID, by using the "family key" but it cannot get at the
traffic key which is encrpted using the device unique key, the splits
for which are held by the escrow agents.
Steve
------- End of Forwarded Message
Return to March 1994
Return to “smb@research.att.com”
1994-03-14 (Mon, 14 Mar 94 14:53:27 PST) - LEAF field encryption - smb@research.att.com