[564] in cryptography@c2.net mail archive
Re: 56 bit crypto exportable?
daemon@ATHENA.MIT.EDU (Rick Smith)
Thu Apr 17 12:26:13 1997
Date: Thu, 17 Apr 1997 11:02:08 -0600
To: Richard Bignell <m00366@pop.sunalliance.com>
From: smith@securecomputing.com (Rick Smith)
Cc: perry@piermont.com, cryptography@c2.net
At 4:43 PM 4/17/97, Richard Bignell wrote:
>I'm no lawyer but my impression is that using V-One's technology the
>organisation holds the keys and does not need to divulge them to the
>Government, but does agree to decrypt recorded sessions on production
>of a suitable warrant - just like a warrant can be issued for search
>of a premises and removal of documents stored in a filing cabinet. The
>law enforcement agency has to demonstrate probable cause to obtain the
>warrant.
There's another set of rules for devices that already implement key escrow.
If the Export Administration approves of your key escrow system, then you
can export pretty much any key length you want. The 56 bit DES rule was to
allow vendors to export existing DES products but at the same time motivate
them to produce key escrow systems.
Rick.
smith@securecomputing.com secure computing corporation