[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Another forwarded message
From: APSICC::GR2KITTRELL "TOO MANY SECRETS" 18-APR-1993 21:52:10.16
To: TO1SITTLER
CC:
Subj: Process
From: SMTP%"[email protected]" 18-APR-1993 18:05:57.69
To: [email protected]
CC:
Subj: (fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Date: Mon, 19 Apr 1993 01:34:02 +0200
From: Igor Petrovski <[email protected]>
Message-Id: <[email protected]>
To: [email protected]
Subject: (fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Newsgroups: sci.crypt
Organization: Open Systems & Networks, ijs, Slovenia
Relay-Version: VMS News - V6.1 30/1/93 VAX/VMS V5.5-1; site cathy.ijs.si
Path: cathy.ijs.si!arnes.si!scsing.switch.ch!ira.uka.de!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!darwin.sura.net!haven.umd.edu!uunet!looking!brad
Newsgroups: sci.crypt
Subject: Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Message-ID: <[email protected]>
From: [email protected] (Brad Templeton)
Date: Sat, 17 Apr 1993 20:48:50 GMT
References: <[email protected]> <[email protected]> <rdippold.735042679@qualcom>
Organization: ClariNet Communications Corp.
Keywords: encryption, wiretap, clipper, key-escrow, Mykotronx
Lines: 24
One presumes the system could work as follows:
a) Blank clips are manufactured by Mykotronx and VLSI. The number
produced is carefully audited and they are shipped to the first
escrow house.
It programs the chips with its half the key, and prints out a paper slip
with the key half and non-secret chip serial number. The reams of paper
are filed in locked boxes in the vault, a fuse is burnt in the chip so
that the key is now unreadable.
The chip then goes to the next escrow house, where the same thing is
done. This continues through N escrow houses, perhaps, could be more than
2.
The last one provides the chip to the cellular phone maker.
And yes, this has to be a public key system or it would be almost
impossible to handle. It might not be RSA, but that does not mean
that PKP doesn't get paid. Until 1997, PKP has the patent on the
general concept of public key encryption, as well as the particular
implementation known as RSA.
--
Brad Templeton, ClariNet Communications Corp. -- Sunnyvale, CA 408/296-0366