Home

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption

Hal Abelson; Ross N. Anderson; Steven Michael Bellovin; Josh Benaloh; Matt Blaze; Whitfield Diffie; John Gilmore; Peter G. Neumann; Ronald L. Rivest; Jeffrey I. Schiller; Bruce Schneier

Title:
The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption
Author(s):
Abelson, Hal
Anderson, Ross N.
Bellovin, Steven Michael
Benaloh, Josh
Blaze, Matt
Diffie, Whitfield
Gilmore, John
Neumann, Peter G.
Rivest, Ronald L.
Schiller, Jeffrey I.
Schneier, Bruce
Date:
Type:
Articles
Department:
Computer Science
Permanent URL:
Abstract:
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys.
Subject(s):
Computer science
Item views:
734
Metadata:
text | xml

In Partnership with the Center for Digital Research and Scholarship at Columbia University Libraries/Information Services | Terms of Use