Abstract
The Escrow Encryption Standard and its realization — the Clipper chips — suggest a new type of encryption scheme. We present a few basic and somewhat subtle issues concerning escrow encryption systems. We identify and perform attacks on the actual Clipper and other recent designs (fair cryptosystems, TIS software escrow, etc.). We review requirements and concerns and suggest design approaches to systems with desired properties of key escrow.
Research was performed while the author was at GTE Laboratories Incorporated.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
R. Anderson, Why Cryptography Fails, In the Proceedings of The 1st ACM Conference on Computer and Communications Security, Nov. 1993, 215–227.
D. M. Balenson, C. M. Ellison, S. B. Lipner and S. T. Walker A New Approach to Software Key Escrow Encryption, Trusted Information Systems, Inc., (also in [21]).
T. Beth, Zur Diskussion Gestellt, Informatik-Spektrum 13(4), pp. 204–215, 1990. (An initial suggestion for Key Escrow System and Agent-a public presentation to the German Government, In German).
T. Beth, H.-J. Knobloch, M. Otten, G.J. Simmons and P. Wichmann, Towards Acceptable Key Escrow Systems, In the Proceedings of The 2nd ACM Conference on Computer and Communications Security, November 1994 51–58.
M. Blaze, Protocol failure in the Escrowed Encryption Standard, In the Proceedings of The 2nd ACM Conference on Computer and Communications Security, November 1994, 59–67. (also in [21]).
E. F. Brickel, et al. Interim Review: The SKIPJACK Algorithm, July 93. (Also in [21]).
D. E. Denning et al., To Tap or Not To Tap, CACM 93.
D. E. Denning and M. Smid, Key Escrowing Now, IEEE Communications Magazine, Sep. 1994, pp. 54–68.
Department of Justice, Letter dated Feb. 4, 1994
A. De Santis, Y. Desmedt, Y. Frankel, and M. Yung, How to Share a Function Securely, ACM STOC 94. (Initial version May 92: FOCS 92 submission).
Y. Desmedt, Securing Traceability of Ciphertexts: Towards a Secure Software Key Escrow Systems, Eurocrypt 95.
Y. Desmedt, Y. Frankel, and M. Yung, A scientific statement on the Clipper Chip technology and alternatives, (a letter to NIST as an answer to a request for comments on key escrow technology).
Y. Desmedt and Y. Frankel, Threshold cryptosystems, In G. Brassard, editor, Advances in Cryptology, Proc. of Crypto’ 89 (Lecture Notes in Computer Science 435), pages 307–315. Springer-Verlag, 1990.
Y. Desmedt and J.-J. Quisquater, Public-key systems based on the difficulty of tampering (Is there a difference between DES and RSA?), Advances in Cryptology-Proc. Crypto’ 86, Springer-Verlag LNCS 263, 1987, 111–117.
W. Diffie and M. Hellman, New Directions in Cryptography, IEEE Trans. on Information Theory 22(6), 1976, pp. 644–654.
T. El Gamal, A Public key cryptosystem and a signature scheme based on discrete logarithm, IEEE Trans. on Information Theory 31, 465–472, 1985.
The FBI, Law Enforcement REQUIREMENTS for the Surveillance of Electronic Communications, June 1994. (Prepared by the Federal Bureau of Investigations (FBI) in cooperation with federal, state, and local law enforcement members of the National Technical Investigation Association).
FIPS PUB 185, Escrowed Encryption Standard February 1994. (Dept. of Commerce).
Y. Frankel and M. Yung, Designs of escrow encryption systems: models, methodologies and technologies, (Available from the authors).
Y. Frankel and M. Yung, Preliminary version of current paper, originally submitted to IEEE Security and Privacy 95 (Oakland), Nov. 94.
Building in Big Brothers: the cryptographic policy debate, ed. L.J. Hoffman, Springer Verlag, 1995.
J. Kilian and F.T. Leighton, Failsafe Key Escrow Systems, Crypto 95.
D. Kravitz, Deficiencies of Software-based key escrow. a letter.
S.M. Matyas, Key Processing with Control Vectors, Journal of Cryptology, 3(2), pp 113–136, 1991
S. Micali, Fair public-key cryptosystems, Crypto’ 92 (also in [21]).
The Mosaic program office, Mosaic: Cryptographic intertrace programmers guide for the Tessera crypto card, Draft Revision P1.4.
MYK-78T Encryption/Decryption VLSI, Mykotronx Inc.
M. Naor and M. Yung, Public-key cryptosystem provably secure against chosen ciphertext attack, Proc. of the 22nd Annual Symposium on the Theory of Computing, 1990, pp. 427–437.
T. P. Pedersen, Distributed Provers with Applications to Undeniable Signature, Eurocrypt’ 91. 1991.
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signature and Public Key Cryptosystems, Comm. of ACM, 21 (1978), pp 120–126.
G. Simmons, The Subliminal Channel and Digital Signature, Eurocrypt 84, 51–67.
The White House Press Release Regarding the Clipper, the White House — office of the press secretary, April 16, 93.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Frankel, Y., Yung, M. (1995). Escrow Encryption Systems Visited: Attacks, Analysis and Designs. In: Coppersmith, D. (eds) Advances in Cryptology — CRYPT0’ 95. CRYPTO 1995. Lecture Notes in Computer Science, vol 963. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44750-4_18
Download citation
DOI: https://doi.org/10.1007/3-540-44750-4_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60221-7
Online ISBN: 978-3-540-44750-4
eBook Packages: Springer Book Archive