Articles

The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption

Abelson, Hal; Anderson, Ross; Bellovin, Steven Michael; Benaloh, Josh; Blaze, Matt; Diffie, Whitfield; Gilmore, John; Neumann, Peter G.; Rivest, Ronald L.; Schiller, Jeffrey I.; Schneier, Bruce

A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys.

Subjects

Files

More About This Work

Academic Units
Computer Science
Published Here
June 28, 2010

Notes

View a related article from 2015 at http://dx.doi.org/10.7916/D8H41R9K.