[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Stewart Baker on HP-Intel-Microsoft Crypto Announcement




---------- Forwarded message ----------
Date: Sun, 24 Nov 1996 22:14:34 -0500
From: Dave Farber <[email protected]>
To: interesting-people mailing list <[email protected]>
Subject: IP: HP-Intel-Microsoft Crypto Announcement

Date: Sun, 24 Nov 96 21:43:47 EST
From: "Stewart Baker" <[email protected]>
To: [email protected]
Subject: HP-Intel-Microsoft Crypto Announcement

     

  

I also attended the Hewlett-Packard/Intel/Microsoft announcement, and 
I thought it might be useful to offer a slightly different perspective
from Ross Stapleton-Gray's and Declan McCullagh's notes.

It's understandable, given the coincidence of the two events, that 
Ross and Declan saw the announcement as tied to the government's key 
recovery initiative, but I think they may have been led astray by the 
timing.  As I understand it, the HP framework is not so much an 
embrace of government regulation in this field as a recognition by 
some major companies that governments simply are not going to get out 
of the business of regulating encryption soon, or at least not soon 
enough for the people who want to build a secure global network right 
now.  I see the announcement as an effort by business to sidestep the 
policy debate, to say to the politicians, "Whatever crypto policy you 
decide to adopt, this system will work with it."

So, in my view, the HP technology is significant mainly for its 
flexibility rather than for supporting key recovery or any other 
particular policy.  It allows PC manufacturers to build into their 
products virtually any form of encryption that a user could want and 
to ship those products around the world without falling afoul of 
export controls or domestic regulations on encryption.

>From a security point of view, this is important because it allows 
commoditization of security hardware.  One of the reasons why 
encryption hardware has not spread is that individualized licensing 
and local restrictions make it imprudent to include hardware security 
as a standard feature in PCs aimed at mass markets.  The HP system has
safeguards that have evidently persuaded governments that they can 
allow mass market sales of hardware encryption without giving up their
current regulatory authority.

What does this mean for the government's key escrow policy?  First, as
we heard at the news conference, HP's system will run the TIS 
commercial key recovery system (and presumably the CertCo./Bankers 
Trust system as well).  So it will make key recovery products 
available to buyers.  But it will also run 40-bit encryption, DES, and
other strong algorithms without escrow.  The customer decides what 
crypto to use; the framework doesn't favor one of those technologies 
over the other, except that it allows customers to buy strong 
key-recovery crypto today with the knowledge that the hardware won't 
become obsolete tomorrow if government policies change and something 
more attractive comes along.

As a separate point, I'm not sure Declan is right to call this 
vaporware.  The basic hardware has been available for a while.  (I saw
an early demo a few years ago.)  It sounds as though the R&D is done; 
all that remains is engineering, and maybe not too much of that.