[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: a bit more information on key escrow
-----BEGIN PGP SIGNED MESSAGE-----
In list.cypherpunks, [email protected] writes:
> I and a few others sent a short list of questions to Dorothy Denning
> and Steve Kent, with a request that they forward them to the other review
> panel members. Here are Denning's answers. I do not know if they
> represent the view of the other committee members, or if more details
> will be forthcoming. In particular, I do not know if anyone on the
> committee will ask NSA to declassify any information relative to these
> questions. I did ask that if the answer to anything was ``it's
> classified'', that a persuasive rationale for the classification
> status be given.
First off, thanks for passing this along. Ms. Denning's comments have
some, shall we say, disturbing implications in re this "target system".
> 11. How are escrowed keys protected during transport and storage?
> What about backup?
[...]
> Encrypted Key Components are transported on floppy disks inside
> tamper-detecting packages. A number is written on each
> package. Upon arrival, the packages are checked for tampering and
> the numbers are checked. In the target system, key escrow data
> will be transmitted electronically using cryptography for
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> protection.
[...]
> 14. How will wiretap keys expire?
>
> When the Escrow Officers load the Key Components into the
> Decrypt Processor, they also type in the expiration date. The
> date is stored with the Unique Key, but the person operating
> the Decrypt Processor must issue a command to delete the key.
> When that happens, the Escrow Agents are to be notified of the
> key deletion. In the target system, the key will be deleted
> automatically when the court order expires, and the
> notification will be sent automatically from the Decrypt
> Processor.
Somehow, it's not surprising that the current implementation must be
told explicitly to forget a key. I wonder how many keys a decryptor can
remember at a time, as well.
But the "target system" references are even more sinister. They seem to
describe an online system for retrieving and using escrowed keys. Such
a system might be viewed as the data equivalent of the FBI's Digital
Telephony initiative. And as we all know, where there is an online
connection, there may be a vulnerability. Remembering that escrow
release will need only an affadavit claiming that a court order exists,
how susceptible to spoofing will the system be? And if it's on the
Internet (which is, after all, the Highway 101 of the NII), will the
promiscuous packet sniffers be able to snag Clipper Keys on their way to
the spooks?
Can I turn my telescreen down now?
- --
Roy M. Silvernail -- [email protected]
"There's no government like no government!"
-- stolen sig quote
-----BEGIN PGP SIGNATURE-----
Version: 2.6
iQCVAwUBLgFEnRvikii9febJAQEO9AP9GhZ/+WCs9zAHVeAaGdEPKYyLrCNqTXyA
oQmQZ24qC0AaUawvwTjjdUy2v9UM4WIk+dHIGEzn93SUefyvQ6hbsPSle8tnIwfv
li0BROPUn0zL8JsLR/XWUV2enymhwmX3gUsSIvRxtIa+huyzR8HYXAh4rOxKsDOo
jzOKhIo4IKY=
=o9c+
-----END PGP SIGNATURE-----