From: Paul Bradley <paul@fatmans.demon.co.uk>
To: John Smith <jsmith58@hotmail.com>
Message Hash: 6f38cb65f12cacd19e5b527676b3e4144211fbe1b1c9f263b211729db09044da
Message ID: <Pine.LNX.3.91.970615121118.2171B-100000@fatmans.demon.co.uk>
Reply To: <199706150054.RAA05736@f23.hotmail.com>
UTC Datetime: 1997-06-15 14:45:54 UTC
Raw Date: Sun, 15 Jun 1997 22:45:54 +0800
From: Paul Bradley <paul@fatmans.demon.co.uk>
Date: Sun, 15 Jun 1997 22:45:54 +0800
To: John Smith <jsmith58@hotmail.com>
Subject: Re: IBM sues critics?
In-Reply-To: <199706150054.RAA05736@f23.hotmail.com>
Message-ID: <Pine.LNX.3.91.970615121118.2171B-100000@fatmans.demon.co.uk>
MIME-Version: 1.0
Content-Type: text/plain
> Can someone explain the difference between key recovery and key
> escrow? The IBM white paper describes it at
> http://www.ibm.com/security/html/pp_global5.html in terms of
> giving a keys or a combination to your neighbors, but the
> analogy was hard to follow.
Key escrow is where your keys are held by one or more trusted and
supposedly independent third parties, on reciept of a court order they
would release the keys.
Key recovery is more like the clipper scheme where there was a LEAF (law
enforcement access field) which allowed the LEA to decrypt communications.
But in the end it all comes down to GAK (government access to keys), same
shit, different name. Forgive me if this explanation is a little hazy, I
have a mighty hangover (still only 12:15 sunday morning here).
Datacomms Technologies data security
Paul Bradley, Paul@fatmans.demon.co.uk
Paul@crypto.uk.eu.org, Paul@cryptography.uk.eu.org
Http://www.cryptography.home.ml.org/
Email for PGP public key, ID: FC76DA85
"Don`t forget to mount a scratch monkey"
Return to June 1997
Return to “Paul Bradley <paul@fatmans.demon.co.uk>”