From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
To: cypherpunks@toad.com
Message Hash: 54811519b6f267cffc3a38c49aece9a765d1e4fab0e305b0438d383394e87127
Message ID: <9407302328.AA01368@anchor.ho.att.com>
Reply To: N/A
UTC Datetime: 1994-07-30 23:31:47 UTC
Raw Date: Sat, 30 Jul 94 16:31:47 PDT
From: wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)
Date: Sat, 30 Jul 94 16:31:47 PDT
To: cypherpunks@toad.com
Subject: Re: No SKE in Daytona and other goodies
Message-ID: <9407302328.AA01368@anchor.ho.att.com>
MIME-Version: 1.0
Content-Type: text/plain
Eric Hughes, replying to somebody, wrote:
> As a previous
> poster mentioned, users could select null or locally controlled key
> escrow agents, and effectively have a non-escrowed system.
>
> The system I've seen (Whit's recollection of Steve Walker's) did not
> allow a cooperating party to interoperate with a non-cooperating
> party. In other words, both correspondents must comply with gov't key
> surrender, or neither.
It's a little better than that, but not much.
There are three sides to the process - writing the wiretap field,
verifying the wiretap field, and using the field to wiretap.
The receiver can definitely verify the wiretap field, but has a choice
about whether to do the verification or accept conversations with an
invalid field. If a conformist receiver refuses to accept conversations
without a verified wiretap field, the sender has to include it to talk.
(This is the opposite of Clipper, where the receiver has no control over
the system, but the sender can construct a fake wiretap block with some work.)
The sender has a choice of what keymaster agencies to use, but the receiver
can choose whether or not those agencies are acceptable.
It's easy to turn off software key escrow, but only on your own machines.
Unfortunately, the most interesting cases are applications like cellphones,
where the sender is the occasionally non-conformist phone user,
the receiver is the phone company, and the government can bully the phone
company into being conformist about both verifying the block and
only accepting politically correct keymasters.
For other cases, like encrypting fax machines, they'll probably accept
any keymaster, so you can probably use "Dev Null Key Security Inc."
(The government *could* get nasty and insist that encrypting fax machines
can only be imported if they verify that the keymaster's key is signed by
the Key Generation Bureau, but it's a lot harder to control millions
of fax machine users than a few hundred phone companies.)
Bill
Return to July 1994
Return to “wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)”
1994-07-30 (Sat, 30 Jul 94 16:31:47 PDT) - Re: No SKE in Daytona and other goodies - wcs@anchor.ho.att.com (bill.stewart@pleasantonca.ncr.com +1-510-484-6204)