From: “Pat Farrell” <pfarrell@netcom.com>
To: cypherpunks@toad.com
Message Hash: d42059eceab8dceca0fbc1ca8350f2d87adbdc3fa3f7429a524d052829a60011
Message ID: <80361.pfarrell@netcom.com>
Reply To: N/A
UTC Datetime: 1995-12-13 03:34:00 UTC
Raw Date: Wed, 13 Dec 1995 11:34:00 +0800
From: "Pat Farrell" <pfarrell@netcom.com>
Date: Wed, 13 Dec 1995 11:34:00 +0800
To: cypherpunks@toad.com
Subject: RE: ViaCrypt supports CKE in PGP
Message-ID: <80361.pfarrell@netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
In message Mon, 11 Dec 1995 14:45:55 -0600,
"Robichaux, Paul E" <perobich@ingr.com> writes:
> In today's mailbox I got a pack of marketing slicks from ViaCrypt.
[liberally elided]
> The biggie, though, are these:
> "Encryption automatically includes Corporate Access Key as
> additional recipient (option)" and
> "Key selection/display dialogs show only keys certified by
> Corporate Access Key (option)"
> So, real CKE will soon be available from an unexpected source. I'm not
> sure whether to be excited or dismayed.
I believe this is a good thing (tm).
This is a vendor with strong crypto implementing Key Escrow for
the only known commercially viable market: data recovery of long
term storage.
In all of the NIST meetings that I've attended, industry says
there is a market for key escrow for data recovery when your
key programmer "falls in love and moves to a warm water island"
They also say there is no market for key escrow for communication,
we can simply resend lost messages.
Commercial Key Escrow is, by definition, voluntary. You have to pay
to get it escrowed, stored, and returned. CKE is not GAK.
I bet its not exportable.
Pat
Pat Farrell Grad Student http://www.isse.gmu.edu/students/pfarrell
Info. Systems & Software Engineering, George Mason University, Fairfax, VA
PGP key available on homepage #include <standard.disclaimer>
Return to December 1995
Return to ““Pat Farrell” <pfarrell@netcom.com>”
1995-12-13 (Wed, 13 Dec 1995 11:34:00 +0800) - RE: ViaCrypt supports CKE in PGP - “Pat Farrell” <pfarrell@netcom.com>