[588] in cryptography@c2.net mail archive
Re: Escrow agencies closed?
daemon@ATHENA.MIT.EDU (Angelos D. Keromytis)
Sat Apr 19 15:44:22 1997
To: perry@piermont.com
cc: "cryptography@c2.net" <cryptography@c2.net>
In-reply-to: Your message of "Sat, 19 Apr 1997 12:49:25 EDT."
<199704191649.MAA29893@jekyll.piermont.com>
Date: Sat, 19 Apr 1997 15:36:49 +0100
From: "Angelos D. Keromytis" <angelos@dsl.cis.upenn.edu>
Larry Layten writes:
> I believe that you will find that anyone using encryption for
> serious data processing and data storage will only do so if
> there a key recovery scheme.
Also, there's a difference between keeping a copy of the key you use
to encrypt your hard disk (which in fact is a quiet legitimate reason)
and giving away a copy of the key(s) you use to communicate.
GAK is supposedly (ha!) used to restore lost keys. Can you give us one
example where you'd want to replay a communication ?
Never mind escrowing signing keys...
-Angelos