文档介绍:Crypto Politics and Export Controls
In God we trust. All others we monitor
— NSA motto
Crypto Politics
It's almost impossible to avoid this
Some panies have special legal divisions set up
just for this
Any real policy information is obtained through (US)
freedom of information act (FOIA) lawsuits rather than
official press releases
• Claimed policy and actual policy are plete opposites
Data Storage vs Session Encryption Key
Recovery
Legitimate need for stored data recovery in case of
accident/lost keys/termination of employment
• Use secret sharing scheme for emergency access
No legitimate need (mercial incentive) for
communications session recovery
• If there’s a problem, re-transmit the data
Strong push by governments to panies that
data storage recovery = communications recovery
• Key recovery has been given so many names (key escrow, law
enforcement access, key recovery, data recovery, trusted third
parties, etc etc) that it’s now known by the general term GAK
(Government Access to Keys)
Early History
1977 NSA tried to block NSF funding of crypto research
Attempt to intimidate IEEE over security conference
1978 NSA uses Invention Secrecy Act to classify crypto patents
1979 Bobby Ray Inman’s “The sky is falling” speech: NSA should
control crypto research
1982 NSA blocked NBS request for public-key equivalent of DES
1984 NSDD-145 moves control puter security from NBS to
NSA (NSA memo calls NSDD-145 “NSA-engineered”)
1986 NSDD-145 extended to allow NSA jurisdiction over private
databases (Dialog, Compuserve)
NSA tries to decertify DES
CCEP (SEC Endorsement Program) using
NSA-designed tamperproof hardware (eg Blacker)
Early History (ctd)
puter Security Act moved control of crypto back to NBS
1988 NSA tries to block publication of Khufu block cipher
1989 NSA/NIST memorandum of understanding moves control of
crypto back to the NSA
1990 NSA designs signature-only PKC for NIST, begins work on
Clipper