ABSTRACT
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as “Clipper” chips, intended to protect unclassified government and private-sector communications and data. A basic feature of key setup between pairs of EES processors involves the exchange of a “Law Enforcement Access Field” (LEAF) that contains an encrypted copy of the current session key. The LEAF is intended to facilitate government access to the cleartext of data encrypted under the system. Several aspects of the design of the EES, which employs a classified cipher algorithm and tamper-resistant hardware, attempt to make it infeasible to deploy the system without transmitting the LEAF. We evaluated the publicly released aspects of the EES protocols as well as a prototype version of a PCMCIA-based EES device. This paper outlines various techniques that enable cryptographic communication among EES processors without transmission of the valid LEAF. We identify two classes of techniques. The simplest allow communication only between pairs of “rogue” parties. The second, more complex methods permit rogue applications to take unilateral action to interoperate with legal EES users. We conclude with techniques that could make the fielded EES architecture more robust against these failures.
References
- DH76.W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. on Information Theory, November 1976.Google Scholar
- Mar93.J. Markoff. Communications plan to balance government access with privacy. New York Times, April 16, 1993.Google Scholar
- NBS77.National Bureau of Standards. Data Encryption Standard, Federal Information Processing Standards Publication 45, Government Printing Office, Washington, D. C., 1977.Google Scholar
- NBS80.National Bureau of Standards. Data Encryption Standard Modes of Operation, Federal Informal.ion Processing Standards Publication 81, Government Printing Ofrice, Washington, D.C., 1980.Google Scholar
- NIST94.National Institute for Standards and Technology. Escrowed Encryption Standard, Federal Information Processing Standards Publicalion 185, U.S. Dept. of Commerce, 1994.Google Scholar
- NIST94a.National Institute for Standards and Technology. Technical Fact Sheet on Blaze Report and Key Escrow Encryption. June 15, 1994.Google Scholar
Index Terms
Protocol failure in the escrowed encryption standard




Comments