[556] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Two crypto policy articles online

daemon@ATHENA.MIT.EDU (Bert-Jaap Koops)
Wed Apr 16 13:49:27 1997

From: "Bert-Jaap Koops" <E.J.Koops@kub.nl>
To: Hal Finney <hal@rain.org>, cryptography@c2.net, cypherpunks@cyberpass.net
Date: Wed, 16 Apr 1997 19:05:39 MET

Hal Finney wrote:
> We had many discussions on the cypherpunks list back in October 1996 about
> your "binding cryptography" proposal
outlining the main criticisms of the binding proposal we discussed at 
the time.

I agree with most of what you say, except with your statement that the 
article claims to provide a criminal-resistant PKI. It does not: it 
claims to address one specific way of using a PKI for criminal 
purposes; it does not address other potential (and valid) ways to 
"cheat". If you read carefully, you will see that the article does not 
claim that the PKI cannot be exploited by criminals. Well, granted - 
we claim that criminals will not *gain* anything by using the PKI, as 
we assume that people will be free to use crypto outside of the PKI 
regardless. The potential merit of a binding PKI is that it provides 
an acceptable crypto infrastructure for those who want it, not that 
it will prevent criminals from using crypto to remain out of reach of 
law enforcement.

As it's the same article and the same discussion, I'd rather not go 
over it again in more detail. Those interested can read it in the cpunks 
archives.

Perhaps superfluously, let me reiterate that I did not publish the 
article because I think a binding PKI should be implemented, but 
because I think it is an interesting and useful proposal that merits 
attention and study.

Well, attention it has! :-)

Kind regards,
Bert-Jaap

home help back first fref pref prev next nref lref last post