From: jim bell <jimbell@pacifier.com>
To: Black Unicorn <hua@XENON.chromatic.com>
Message Hash: c9ebde6e122e05e7f9347fd89a8da3278c216a09e7e0ae8348dcf3ae5121e50e
Message ID: <199605241914.MAA10326@mail.pacifier.com>
Reply To: N/A
UTC Datetime: 1996-05-25 06:37:11 UTC
Raw Date: Sat, 25 May 1996 14:37:11 +0800
From: jim bell <jimbell@pacifier.com>
Date: Sat, 25 May 1996 14:37:11 +0800
To: Black Unicorn <hua@XENON.chromatic.com>
Subject: Re: Layman's explanation for limits on escrowed encryption ...
Message-ID: <199605241914.MAA10326@mail.pacifier.com>
MIME-Version: 1.0
Content-Type: text/plain
At 11:47 AM 5/24/96 -0400, Black Unicorn wrote:
>On Wed, 22 May 1996, Ernest Hua wrote:
>
>> Could someone with some knowledge of NSA/DoS/FBI intentions please
>> explain why key length limitations are necessary for escrowed
>> encryption?
>
>To deal with the possibility that someone might slip through the cracks of
>the escrow process.
However, this escrow process is claimed to be _voluntary._ And good,
non-escrowed encryption already exists today, outside the US. It won't be
"slipping through the cracks," it'll be like opening the floodgates. So the
question is still open: Why key-length limitations on export?
Jim Bell
jimbell@pacifier.com
Return to May 1996
Return to “jim bell <jimbell@pacifier.com>”