[1575] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Crypto Keys as Spam

daemon@ATHENA.MIT.EDU (Steven Bellovin)
Tue Sep 23 10:41:27 1997

To: Charles Platt <cp@panix.com>
cc: cryptography@c2.net
Date: Tue, 23 Sep 1997 10:20:56 -0400
From: Steven Bellovin <smb@research.att.com>

	 
	 If we do suffer a federal law that mandates key escrow and survives
	 constitutional tests, would it be possible to screw the system by
	 generating huge numbers of crypto keys for federal storage? Imagine,
	 say, 100,000 people each contributing a million different keys to the
	 federal registry. 
	 
	 This kind of civil disobedience would be impractical, of course, if a
	 filing fee were charged for receipt and registration of each key. Stil
	l,
	 other forms of disobedience (already developed in anti-spam-site
	 offensives) suggest themselves if keys are to be transmitted to a fede
	ral
	 registry via the net. 
	 
	 Overall, I find it hard to see how key escrow would be practical on a 
	very
	 large scale, for reasons such as these. After all, InterNIC has troubl
	e
	 merely managing email addresses. 
	 
	 --CP

Recall that some existing key "recovery" schemes simply have the session key
transmitted in-band, encrypted with J. Edgar Hoover's public key.  Anyone
monitoring the session gets the key, and if you aren't monitoring the
session you don't need the key.  After all, there's no requirement
that you have to record all of your own conversations.  Yet.

home help back first fref pref prev next nref lref last post