skip to main content
10.1145/191177.191193acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article
Free access

Protocol failure in the escrowed encryption standard

Published: 02 November 1994 Publication History
  • Get Citation Alerts
  • Abstract

    The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as “Clipper” chips, intended to protect unclassified government and private-sector communications and data. A basic feature of key setup between pairs of EES processors involves the exchange of a “Law Enforcement Access Field” (LEAF) that contains an encrypted copy of the current session key. The LEAF is intended to facilitate government access to the cleartext of data encrypted under the system. Several aspects of the design of the EES, which employs a classified cipher algorithm and tamper-resistant hardware, attempt to make it infeasible to deploy the system without transmitting the LEAF. We evaluated the publicly released aspects of the EES protocols as well as a prototype version of a PCMCIA-based EES device. This paper outlines various techniques that enable cryptographic communication among EES processors without transmission of the valid LEAF. We identify two classes of techniques. The simplest allow communication only between pairs of “rogue” parties. The second, more complex methods permit rogue applications to take unilateral action to interoperate with legal EES users. We conclude with techniques that could make the fielded EES architecture more robust against these failures.

    References

    [1]
    W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. on Information Theory, November 1976.
    [2]
    J. Markoff. Communications plan to balance government access with privacy. New York Times, April 16, 1993.
    [3]
    National Bureau of Standards. Data Encryption Standard, Federal Information Processing Standards Publication 45, Government Printing Office, Washington, D. C., 1977.
    [4]
    National Bureau of Standards. Data Encryption Standard Modes of Operation, Federal Informal.ion Processing Standards Publication 81, Government Printing Ofrice, Washington, D.C., 1980.
    [5]
    National Institute for Standards and Technology. Escrowed Encryption Standard, Federal Information Processing Standards Publicalion 185, U.S. Dept. of Commerce, 1994.
    [6]
    National Institute for Standards and Technology. Technical Fact Sheet on Blaze Report and Key Escrow Encryption. June 15, 1994.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '94: Proceedings of the 2nd ACM Conference on Computer and communications security
    November 1994
    293 pages
    ISBN:0897917324
    DOI:10.1145/191177
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 1994

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    CCS94
    Sponsor:

    Acceptance Rates

    CCS '94 Paper Acceptance Rate 31 of 70 submissions, 44%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)127
    • Downloads (Last 6 weeks)12

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Anamorphic Encryption: New Constructions and Homomorphic RealizationsAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58723-8_2(33-62)Online publication date: 8-May-2024
    • (2024)Anamorphic Encryption, RevisitedAdvances in Cryptology – EUROCRYPT 202410.1007/978-3-031-58723-8_1(3-32)Online publication date: 26-May-2024
    • (2023)Power in Computer Security and Privacy: A Critical LensIEEE Security & Privacy10.1109/MSEC.2023.323859121:2(48-52)Online publication date: Mar-2023
    • (2023)Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchainJournal of Combinatorial Optimization10.1007/s10878-023-01047-045:5Online publication date: 3-Jun-2023
    • (2022)The Development of a Crypto Policy Community: Diffie–Hellman’s Impact on Public PolicyDemocratizing Cryptography10.1145/3549993.3550002(213-256)Online publication date: 24-Aug-2022
    • (2022)Anamorphic Encryption: Private Communication Against a DictatorAdvances in Cryptology – EUROCRYPT 202210.1007/978-3-031-07085-3_2(34-63)Online publication date: 25-May-2022
    • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
    • (2021)Development of the Advanced Encryption StandardJournal of Research of the National Institute of Standards and Technology10.6028/jres.126.024126Online publication date: 2021
    • (2020)Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply ChainIEEE Access10.1109/ACCESS.2020.30178718(154269-154280)Online publication date: 2020
    • (2020)Embedding asymmetric backdoors into the RSA key generatorJournal of Computer Virology and Hacking Techniques10.1007/s11416-020-00363-x17:1(37-46)Online publication date: 11-Aug-2020
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media