From: Martin Minow <minow@apple.com>
To: risks@csl.sri.com
Message Hash: 937dab3e23e9cbe9d7fe37c6f05f0ccb0c9e7985a66a9d0f9bc37eb7dac8802a
Message ID: <v03102800b05aaebebd1c@[17.219.102.47]>
Reply To: N/A
UTC Datetime: 1997-10-03 15:00:59 UTC
Raw Date: Fri, 3 Oct 1997 23:00:59 +0800
From: Martin Minow <minow@apple.com>
Date: Fri, 3 Oct 1997 23:00:59 +0800
To: risks@csl.sri.com
Subject: New PGP "Everything the FBI ever dreamed of"
Message-ID: <v03102800b05aaebebd1c@[17.219.102.47]>
MIME-Version: 1.0
Content-Type: text/plain
An article in today's (Fri, Oct 3) New York Times (CyberTimes)
<http://www.nytimes.com/library/cyber/week/100397pgp.html>
describes the new release of "PGP for Business Security 5.5," which
contains mechanisms that incorporate key recovery mechanism that can either
be volontary or be enforced by using PGP's software for controlling a
company's SMTP server -- the server can verify that all encrypted messages
include the corporate public key (or conform to other corporate policies):
"The new version also includes some of the most sophisticated techniques
for enforcing this policy through the corporation. The most novel may be a
new version of software controlling a company's SMTP server, the machine
that acts as the central mailroom for a corporation. PGP provides a
software agent that will read all of the mail to make sure that it complies
with the corporate policy. This may include requiring all messages to be
signed with digital signatures or include a backdoor that the management
can use to read the message. If the software agent discovers a message
violates the policy, it can either return it to sender or simply log a copy.
"PGP implements the backdoor with a central key. Each message is encrypted
with both the public key of the recipient and the public key of the
management. The message can only be read by someone holding the
corresponding private keys, in this case the recipient and the management.
The software allows the management to use different master keys for
different departments by customizing the software.
... "Bruce Schneier, an encryption expert and author of the popular book
Applied Cryptography, said that the new announcement "sounds like
everything the FBI ever dreamed of." He also predicts that criminals will
find ways to circumvent the restrictions while honest people may be more
vulnerable to illicit use of the master key."
---
Coincidently, the same issue of the New York Times has an editorial
<http://www.nytimes.com/yr/mo/day/editorial/03fri4.html> attacking
FBI director Louis Freeh's request that Congress "outlaw the
manufacture and distribution of encryption programs the Government cannot
instantly crack.
Martin Minow minow@apple.com
Return to October 1997
Return to ““William H. Geiger III” <whgiii@invweb.net>”