LectureNote13-KeyEscrow

LectureNote13-KeyEscrow - K EY E SCROW C RYPTOGRAPHY S...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: K EY E SCROW C RYPTOGRAPHY S ECRET K EY C RYPTOSYSTEMS K EY E SCROW CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 80 / 94 Key Escrow C RYPTOGRAPHY S ECRET K EY C RYPTOSYSTEMS K EY E SCROW CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 81 / 94 ● Encryption dilemma ✦ Public’s need for secure communication ✦ Government’s need for lawful access to information ● Solution ✦ Key escrow Clipper Chip Key Escrow C RYPTOGRAPHY S ECRET K EY C RYPTOSYSTEMS K EY E SCROW CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 82 / 94 ● In 1993 the Clinton administration proposed the Clipper Chip Key Escrow initiative ● Objectives ✦ Make strong encryption technology widely available ✦ Built-in decryption capability for law enforcement agencies Clipper Chip C RYPTOGRAPHY S ECRET K EY C RYPTOSYSTEMS K EY E SCROW CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 83 / 94 ● Clipper chip has the essential key escrow property ✦ The key needed to decrypt the encrypted data is bound to the ciphertext, regardless of whether the key generates the ciphertext ● Decryption (by law enforcement agencies) requires cooperation of one or more trusted party who hold keys (the escrow agents) Clipper Chip and Skipjack C RYPTOGRAPHY S ECRET K EY C RYPTOSYSTEMS K EY E SCROW CS 556 - Computer Security - c circlecopyrt 2009 Colorado State University – 84 / 94 ● The Clipper chip is tamper proof and uses a secret key...
View Full Document

This note was uploaded on 05/29/2010 for the course CS 556 taught by Professor Staff during the Spring '08 term at Colorado State.

Page1 / 15

LectureNote13-KeyEscrow - K EY E SCROW C RYPTOGRAPHY S...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online