[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

FW: U.S. Official Cites Key Escrow Flaws



Found this in sci.crypt. I'm suprised it didn't hit the lists yet.

Peter Trei
[email protected]


> -----Original Message-----
> From:	[email protected] [SMTP:[email protected]]
> Sent:	Wednesday, March 25, 1998 11:37 PM
> Subject:	U.S. Official Cites Key Escrow Flaws
> 
> 
> ==================================================================
> 
>        U.S. OFFICIAL CONCEDES THAT "KEY RECOVERY" ENCRYPTION
>           IS INFERIOR TO ALTERNATIVE PRIVACY TECHNIQUES
> 
> 
> FOR IMMEDIATE RELEASE                     CONTACT:
> Wednesday, March 25, 1998                 David Sobel/Dave Banisar
>                                           (202) 544-9240
> 
> WASHINGTON, DC -- A top U.S. official acknowledged more than a
> year ago that the Internet privacy technique championed by the
> Clinton Administration is "more costly and less efficient" than
> alternative methods that the government seeks to suppress.  The
> concession is contained in a newly-released high-level document on
> encryption policy obtained by the Electronic Privacy Information
> Center (EPIC).
> 
> In a November 1996 memorandum to other government officials,
> William A. Reinsch, the Commerce Department's Under Secretary for
> Export Administration, discussed the Administration's efforts to
> promote "escrowed" or "recoverable" encryption techniques in
> overseas markets.  Such techniques enable government agents to
> unscramble encrypted information and they form the cornerstone of
> current U.S. encryption policy.
> 
> After noting that government regulations permit the export of non-
> escrowed encryption products only to "safe end-users" such as
> foreign police and security agencies, Reinsch recognized the
> inferiority of the Administration's favored technology:
> 
>      Police forces are reluctant to use "escrowed" encryption
>      products (such as radios in patrol cars). They are more
>      costly and less efficient than non-escrowed products.
>      There can be long gaps in reception due to the escrow
>      features -- sometimes as long as a ten second pause. Our
>      own police do not use recoverable encryption products;
>      they buy the same non-escrowable products used by their
>      counterparts in Europe and Japan.
> 
> Ironically, Reinsch's concession is contained in a memorandum that
> discusses the Administration's strategy to "help the market
> transition from non-recoverable products to recoverable products."
> According to EPIC Legal Counsel David Sobel, the newly released
> document "suggests that the Clinton Administration is trying to
> sell key recovery technology while quietly recognizing its
> inferiority.  This approach will ultimately weaken the global
> position of the American computer industry and hold back the
> development of the privacy protections so badly needed on the
> Internet."
> 
> EPIC and other critics of current U.S. encryption policy have long
> maintained that "key escrow" and "key recovery" approaches
> compromise the security of private information by providing
> "backdoor" access to encrypted data.
> 
> The Reinsch memo was released in response to a Freedom of
> Information Act request EPIC submitted to the Department of State
> concerning the international activities of former U.S. "crypto
> czar" David Aaron.  That request is the subject of a pending
> federal lawsuit initiated by EPIC last year.
> 
> The memorandum is available at the EPIC website at:
> 
>      http://www.epic.org/crypto/key_escrow/reinsch_memo.html
> 
> 
>                              - end -
> 
> .