Skip to main content

Key Escrow Cryptosystems

Keeping Secrets Secret Except When

  • Chapter
  • 121 Accesses

Abstract

Key escrow systems are those where part or all of the cryptographic keys are kept “in escrow” by third parties. The keys are released only upon proper authority to allow some person other than the original sender or receiver to read the message. The U. S. government is strongly supporting key escrow as a way to balance the needs for secrecy between communicating persons against the needs of law enforcement and national security agencies to sometimes read these encrypted communications (with proper legal authority). This chapter presents the technical aspects of the Clipper Chip, the U.S. Government’s first proposed key escrow system. It also mentions how Clipper fits into other proposed government cryptosystems and then presents a more general view of key escrow cryptosystems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beth, T., Knoblock, H.-J., and Otten, M., “Verifiable Secret Sharing for Monotone Access Structures,” Proc. 1st ACM Conf. on Communication and Computer Security, Nov. 1993.

    Google Scholar 

  2. Beth, T., Knoblock, H.-J., Otten, M., Simmons, G.J., and Wichmann, P., “Clipper Repair Kit—Towards Acceptable Key Escrow Systems,” E.I.S.S., Karlsruhe Univ., E.I.S.S., Karlsruhe, Germany, June 24, 1994.

    Google Scholar 

  3. Blaze, M., “Key Management in an Encrypting File System.,” AT&T Bell Laboratories.

    Google Scholar 

  4. Blaze, M., “Protocol Failure in the Escrowed Encryption Standard,” AT&T Bell Laboratories, draft of June 3, 1994.

    Google Scholar 

  5. Denning, D.E., “The Clipper Encryption System,” American Scientist, Vol. 81, July-August 1993, pp. 319–324.

    Google Scholar 

  6. Denning, D.E., “The U.S. Key Escrow Encryption Technology,” Computer Communications, Vol. 17, No. 7, July 1994, Butterworth-Heinemann Ltd., Linacre House, Jordan Hill, Oxford, 0X2 8DP, UK.

    Google Scholar 

  7. Denning, D.E. and Smid, M., “Key Escrowing Today,” IEEE Communications, Sept. 1994.

    Google Scholar 

  8. Desmedt, Y., Frankel, Y., and Yung, M., “A Scientific Statement on the Clipper Chip Technology and Alternatives,” 1993.

    Google Scholar 

  9. Droge, J., personal communication, May 1994.

    Google Scholar 

  10. Fortress U & T Ltd., “Keep the Invaders (of Privacy) Socially Sane—KISS,” overheads of presentation, POB 844, Beer Sheva 84106, Israel, 1994.

    Google Scholar 

  11. Leiberich, O., private communication, June 1994.

    Google Scholar 

  12. Micali, S., “Fair Cryptosystems,” MIT/LCS/TR-579.b, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, MA, November 1993.

    Google Scholar 

  13. National Institute for Standards and Technology, “Escrowed Encryption Standard (EES),” Federal Information Processing Standards Publication (FIPS PUB) 185, 1994.

    Google Scholar 

  14. Parker, D.B., “Avoid Encryption Anarchy,” Infosecurity News, Vol. 5, No. 3., May/June 1994, pp 29,32.

    Google Scholar 

  15. Roberts, J.L., “Private Escrow Key Management,” presentation, TECSEC Inc., Vienna, VA.

    Google Scholar 

  16. Sudia, F.W., “International Corporate Key Escrow,” overheads of presentation, Bankers Trust Co., New York, NY, February 1994.

    Google Scholar 

  17. Trusted Information Systems, “Software Key Escrow,” overheads of presentation, Glenwood, MD, 1994.

    Google Scholar 

Download references

Author information

Authors

Consortia

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag New York

About this chapter

Cite this chapter

Denning, D.E. et al. (1995). Key Escrow Cryptosystems. In: Hoffman, L.J. (eds) Building in Big Brother. Springer, New York, NY. https://doi.org/10.1007/978-1-4612-2524-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4612-2524-9_3

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-0-387-94441-8

  • Online ISBN: 978-1-4612-2524-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics