crypto backdoors = terrorisms free reign

Caspar Bowden cb at fipr.org
Sat Sep 15 13:44:25 EDT 2001


> [mailto:owner-cryptography at wasabisystems.com] On Behalf Of Jim McCoy
...
> nathan at fains.com at nathan at fains.com wrote:
...
> > 1) Weaken the ability of the free world to combat things such as 
> > terrorism due to the miss-assumption that criminals and terrorists 
> > will actually obey the law thereby causing lack of 
> preparedness.  You 
> > only restrict the rights of the law-abiding citizen, not 
> the lawless.
> 
> Incorrect.  You will weaken the absolute security of many, 
> but the few who choose to use strong (non-GAK) crypto will be 
> easily distinguished from those who comply with the rules.  

I've wondered about this in case of key escrow.

Isn't the only way of telling whether a blob of data is double-encrypted
(once with unauthorised/undeclared key, once with escrowed key), to open
up the blob with the escrowed key and have a look ? 

Of course the contents could be stegoed, but that appears not to matter
to govts. (in the memorable words of a British official "only criminals
will use stego" - as if that was a refutation.)

So presumably (unless the escrow was a sham) there would have to be some
kind of random-sampling at rate p, so that after N times, probability of
getting caught (1-p)^N would be adjusted to act as sufficient deterrent.

Is anyone aware of any paper written on operational/policy side of this
- I guess it's the sort of thing people wouldn't have been worrying
about for several years.

--
Caspar Bowden                           www.fipr.org
Director, Foundation for Information Policy Research
Tel: +44(0)20 7354 2333 





---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at wasabisystems.com




More information about the cryptography mailing list