[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
key escrow idea from David Satelin of MIT Lincoln Labs
My comments included below Rivest's message.
-matt
------- Forwarded Message
Received: from amontillado.research.att.com (amontillado.research.att.com [135.104.21.154]) by nsa.research.att.com (8.7.3/8.7.3) with ESMTP id QAA04438 for <[email protected]>; Tue, 13 Aug 1996 16:17:05 -0400 (EDT)
Received: from research.research.att.com (research.att.com [135.104.117.5]) by amontillado.research.att.com (8.7.5/8.7) with SMTP id QAA24830 for <[email protected]>; Tue, 13 Aug 1996 16:20:09 -0400 (EDT)
Received: from theory.lcs.mit.edu by research; Tue Aug 13 16:17:17 EDT 1996
Received: from swan.lcs.mit.edu by theory.lcs.mit.edu (5.65c/TOC-1.2S)
id AA05040; Tue, 13 Aug 96 16:16:20 EDT
From: [email protected] (Ron Rivest)
Received: by swan.lcs.mit.edu (5.65c/TOC-1.2C)
id AA00335; Tue, 13 Aug 96 16:16:20 EDT
Date: Tue, 13 Aug 96 16:16:20 EDT
Message-Id: <[email protected]>
To: [email protected], [email protected], [email protected],
[email protected], [email protected]
Cc: [email protected], [email protected]
Subject: Crypto Policy Variant
Hi --
Here is another MIT professor's (Dave Staelin's) suggestion for a
national crypto policy. I thought you might be interested in seeing
it; given the difficulty of the debate, any variant, even if only
slightly different from previous ones, should be considered. Feel
free to pass this note around, or to post it...
Here is Staelin's idea:
(1) You can use any crypto you want, but you must keep a record
of the crypto keys you used.
(2) The government can ask for the crypto keys later, if they have
a court order, just as they can ask for any of your other papers
or documents. You must give the key(s) to them, just as you
must turn over your private papers in such a situation.
(There would have to be an appropriate penalty for losing the
key...)
The attractive feature of this proposal is that it puts encrypted
communications in the same category as private papers; the government
is required to give notice to (at least one of) the affected
individual(s) _before_ the search can be undertaken. This cures what is
in my mind a defect in the current wire-tapping laws.
DISCUSSION
In a variant of Staelin's proposal (my twist) you could append to each
encrypted message an encrypted form of the message key. The
encryption could be with the public-key of a trusted third party who
will not (and legally may not) reveal the message key without
notifying you first (or ensuring that you have been appropriately
served with the corresponding warrant). For example, the ACLU might
be such a TTP. This protects the government's right to access and
protects the individual from the penalties (or benefits) of losing the
key. This procedure is technically simple; what is more complex is
ensuring that the TTP's are appropriately registered and protected
from undue government influence. The use of such a TTP would in any
case be optional; the communicants need not use a TTP if they
understand their obligation to keep the crypto keys around for some
period of time afterwards.
In Staelin's proposal government gains access to the communications,
but does not gain "real-time access" as desired by the FBI. This loss
may be tolerable, given the benefit obtained (forcing access to be
made in accordance with the Constitutional requirements for
notification before search). The use of wiretapping encrypted
communications as a preventive measure might be severely limited, but
its use as a means of gathering evidence to force a conviction would
be preserved.
For international communications, each communicant might be required to
use a TTP that is bound to honor the laws of his country (which TTP to be
used should be the choice of the communicant).
It may be seem a bit strange to force individuals to keep around
information (keys) that they no longer really need. However, this is
more-or-less the case for financial records right now.
CONCLUSION
The fundamental idea is to give the government a right to access
encrypted communication in return for a guarantee that access may not
be obtained until there is BOTH proper legal authorization AND proper
prior notice to (at least one of) the communicants.
Is this workable??
------- End of Forwarded Message
[Matt's comments follow]
The requirement to store your keys for some period of time would,
I think, be very unusal, legaly.
As far as I know there are virtually no records that an ordinary
individual is required to keep today under criminal penalty of law.
One has to keep tax records if one expects to be able to document
deductions if audited, but for people without deductions, no records
need be kept (and even those who do but who destroy their records
risk having their deductions disallowed, but face criminal penalties
only if the govenment can prove you intended fraud. Not having
records does not by itself constitute fraud, as far as I know).
According to the original message:
The attractive feature of this proposal is that it puts
encrypted communications in the same category as private
papers; the government is required to give notice to (at
least one of) the affected individual(s) _before_ the search
can be undertaken. This cures what is in my mind a defect
in the current wire-tapping laws.
Yes and no. True, it makes it impossible to recover communication
without the knowledge of one party. But it still goes well beyond
the norms for private papers. The vast majority of private papers
are, according to the law, just that - private. One is under no
obligation to maintain "private papers" in any particular manner
or for any period of time. Only very limited types of private
papers (none for most people) have to be maintained at all. While,
in general, the government can get a court order to force one to
turn over documents that exist, one is not obligated to keep
documents that are otherwise of no use in order to be ready should
a court order happen sometime in the future. One can burn one's
old love letters any time one feels like it.
But enough philosophy. There are technical reasons to consider
this proposal a bad idea.
The main technical problem with the Staelin proposal is the
requirement that the user maintain a large store of no longer useful
but highly sensitive data in a secure manner for a period of time.
This introduces an obvious storage burden (how does an encrypting
phone or network connection store old keys?) that would make many
kinds of otherwise simple encryption hardware and software far more
complex and difficult to design and expensive to implement and
operate. Consider a secure phone (like the TSD 3600 or STU III).
A critical design feature of these devices is that they never have
to emit secret keys outside their internal security boundaries.
Consider, too, software that runs on PCs and workstations.
Ordinarily, software that establishes, say, a secure Internet
connection has no need to store any secret associated with the
session anywhere. And that's a good thing - the file systems on
most computers aren't secure enough to store keys, so including
the key storage feature required by the Staelin scheme would entail
implementing some kind of secure storage system that isn't otherwise
needed by the application. Even if the design complexity is solved,
there is the problem of maintaining the stored keys in a secure
manner, introducing what would in most cases be a more serious
security vulnerability than any other aspect of the application
(since the keys would continue to exist long after the secure
session has ended). Under the Staelin proposal, the design,
implementation, and use of encryption software and hardware becomes
much more complex, so complex that I honestly don't think we know
how to do it. I touch on these points in discussing key escrow in
general in my Senate testimony,
ftp://research.att.com/dist/mab/testiomny.txt