1996-08-31 - GAK by TIS

Header Data

From: jya@pipeline.com (John Young)
To: cypherpunks@toad.com
Message Hash: 1c44eb32d097558567e51755d01739eb8811e5944b672f8dbad87b991a884532
Message ID: <199608302326.XAA02261@pipe2.t1.usa.pipeline.com>
Reply To: N/A
UTC Datetime: 1996-08-31 01:51:59 UTC
Raw Date: Sat, 31 Aug 1996 09:51:59 +0800

Raw message

From: jya@pipeline.com (John Young)
Date: Sat, 31 Aug 1996 09:51:59 +0800
To: cypherpunks@toad.com
Subject: GAK by TIS
Message-ID: <199608302326.XAA02261@pipe2.t1.usa.pipeline.com>
MIME-Version: 1.0
Content-Type: text/plain


   Network World, August 26, 1996, Page 1 
 
 
   Key-escrow firewall ready to leave the country 
 
   by Ellen Messner, Washington D.C. 
 
 
   After months of talk about exporting encryption software, 
   there will finally be action. 
 
   Fulfilling the Clinton Administration's vow to end export 
   restrictions on strong encryption products if they use 
   key-escrow features, the U.S. government this week is 
   expected to permit Trusted Information Systems, Inc. 
   (TIS) to sell its Data Encryption Standard (DES)-equipped 
   Gauntlet firewall overseas. 
 
   Such exports will allow U.S.-based companies to 
   standardize on an encrypting firewall for all global 
   operations. 
 
   The Department of Commerce is granting mass-market export 
   status to a specific version of the Gauntlet firewall 
   based on a key-escrow scheme that gives U.S. law 
   enforcement access to a master key for decrypting IP 
   datastreams. 
 
   The master key for each firewall will reside at Oakland, 
   Calif.-based Source Files, Inc., the third-party private 
   key holder chosen under the government's groundbreaking 
   plan. 
 
   Vice President Al Gore has supported the Defense 
   Department's view that unbreakable encryption should be 
   controlled because it is a powerful weapon and subject to 
   misuse by criminals and terrorists. However, Gore 
   recently said the government will allow mass export of 
   64-bit encryption products if they use key escrow. The 
   agreement with TIS is the first evidence that the policy 
   is being put into practice. 
 
   Until now, few companies other than banks could get the 
   State Department and National Security Agency (NSA) to 
   let them export 56-bit and higher Data Encryption 
   Standard (DES) products. Only 40-bit products, easily 
   broken with available computer resources, were allowed 
   for mass-market export. 
 
   "We're on the verge of a major shift," said TIS president 
   Steve Walker last week. TIS expects to unveil a raft of 
   other vendors in the network industry that will license 
   the TIS data recovery method for accessing data encrypted 
   with a session key. 
 
   The government is also considering approving other third- 
   party keyholders in addition to Source File, which has 
   traditionally held source code in escrow on behalf of 
   companies worried about the long-term viability of their 
   suppliers. 
 
   Just say no 
 
   Not all are key-escrow converts, however. In fact, it is 
   painfully clear that corporations will continue to balk 
   at the prospect of their encryption keys being held by a 
   third party or the government. 
 
   Netherlands-based Royal Dutch Petroleum Co., with 
   hundreds of subsidiaries and offices all over the world, 
   is looking to ditch dedicated private lines and send 
   encrypted IP traffic over the Internet instead. 
 
   The State Department's mass-market license for the 
   Gauntlet means TIS can compete to provide Royal Dutch 
   Petroleum with its encrypting firewall. But Homayoon 
   Tajalli, TIS vice president, acknowledged that the Dutch 
   oil conglomerate is unwilling to hand its encryption keys 
   over to Source File. 
 
   Hence, as part of negotiations with the U.S. and Dutch 
   governments, Royal Dutch Petroleum agreed to operate its 
   own data recovery center for the Gauntlet master keys. 
   Royal Dutch Petroleum would hand over the master 
   encryption keys to to Dutch law enforcement, which in 
   turn would give the keys to U.S. authorities "if the 
   government shows up with a valid warrant," Tajalli said. 
 
   TIS went to great lengths to broker the international 
   arrangement, and hopes that not every firewall export 
   will entail such laborious negotiations. 
 
   Some firewall users are extremely ambiguous about the 
   government's key-escrow plan. 
 
   "I'm not sure I want the government to have that 
   ability," said Doug Miller, information systems manager 
   at Bluestone Corp. "At all cost, we've got to keep the 
   government out of business operations." 
 
   [End] 
 
   Thanks to BC. 
 
 
 
 
 
 





Thread