Skip to main content

Commercial Key Escrow: An Australian perspective

  • Conference paper
  • First Online:
Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

Abstract

“Commercial Key Escrow (CKE)”, and an earlier “Software Key Escrow (SKE) scheme, have been proposed by Trusted Information Systems Inc. (TIS) in the USA as a possible compromise scheme to meet the demands of commerce and industry for new levels of information security, particularly transaction and message confidentiality in an international and national networked environment, while meeting law enforcement demands for continued effectiveness of telecommunications line-tapping ability. These latter requirements relate to the perceived need by law enforcement agencies to make use of legitimate authorised linetapping capabilities for the gathering of appropriate intelligence and/or evidence for the purpose of fulfilling perceived roles in the protection of society from criminal activity against the potential case where such line-taps produce intercepts that are encrypted. CKE, involving the incorporation of software based cryptography in computer and network systems with associated key recovery data transmitted during data network activity and provision of “Data Recovery Centres (DRC)”, is seen as presenting a new solution to the problems encountered in the USA with the “Clipper” initiative in that country announced in 1993.

This paper examines the CKE/SKE proposals in an Australian and international context and sets the proposal against the more general debate on cryptography, its technology and usage, and public policy. A likely scenario is suggested for Australia involving the incorporation of backup and recovery and network directory services into the encryption scheme and the use of Australia Post, and indeed any national post office structure, as an ideal candidate for trials of both the technology and public/business acceptance of this overall structure. More basic principles of “freedom-of-speech” are also raised in conjunction with this overall analysis of a concrete proposal.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balenson, D. et al, “A New Approach to Software Key Escrow Encryption”, (in HOFF-95)

    Google Scholar 

  2. Code of Practice and “Code of Conduct”, British Computer Society (BCS), BCSNet, June 1995, (Source: World-Wide Web Site — http://www.bcs.org.uk)

    Google Scholar 

  3. Denning, D., “International Key Escrow Encryption: Proposed Objectives and Options”, (in HOFF-95)

    Google Scholar 

  4. “In the name of liberty”, Editorial — The Economist, 29 April 1995.

    Google Scholar 

  5. Ellison, C. M., “Initial Description and Specification of the TIS Commercial Key Escrow System”, Trusted Information Systems, Inc., 3060 Washington Road, Glenwood MD. 21738., U.S.A., January 9, 1995, (Available on Internet at “ftp://ftp.tis.com/pub/crypto/drc/papers/”)

    Google Scholar 

  6. Head, B., “Playing the Game”, Banking Technology, June 1995, Pg. 24

    Google Scholar 

  7. Hoffman, L. (Editor), “Building in Big Brother: the Cryptographic Policy Debate”, Springer-Verlag New York, Inc., U.S.A., 1995, 0-387-944441-9

    Google Scholar 

  8. Kehoe, L., “IBM in $4.6 bn bid for Lotus”, The Australian, 7 June 1995.

    Google Scholar 

  9. Lethin, R., “Admiral Bobby Inman's talk at the Massachusetts Institute of Technology”, Internet Security Monthly, February 1995, ISSN 1079-5669

    Google Scholar 

  10. “Fly Buys.ℳ” Brochure, Loyalty Pacific Pty Ltd, Australia. 1995. (ACN 057 931 334)

    Google Scholar 

  11. Lundberg, B and Persson, E., “Security on Electronic Highways in Sweden — Worthwhile Inheritance for the Future.” in Yngstrom, L. (Editor) “Information Security: The Next Decade/Security on the Electronic Highways in Sweden”, Swedish Workshop Addendum to the Proceedings of the Eleventh International Conference on Information Security, IFIP/Sec'95, Capetown, South Africa, May 1995., The Swedish Computer Society, Saltmatargatan 9, 11359 Stockholm, Sweden, 1995.

    Google Scholar 

  12. The Macquarie Dictionary, 2nd Revised Edition, The Macquarie Library Pty Ltd, 1990, ISBN 0-949757-41-1

    Google Scholar 

  13. Marris, S., “Investigation finds jockeys used secret codes to fix races.” The Australian, 8 June 1995.

    Google Scholar 

  14. Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”, Organisation for Economic Co-operation and Development (OECD), Paris, 1980.

    Google Scholar 

  15. Recommendation of the Council Concerning Guidelines for the Security of Information Systems, Guidelines for the Security of Information Systems and Explanatory Memorandum to Accompany the Guidelines”, DSTI/ICCP/AH(90)21/REV6, 18 Sept. 1992., Organisation for Economic Co-operation and Development (OECD), Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy, Ad Hoc Group of Experts on Guidelines for the Security of Information Systems.

    Google Scholar 

  16. The Oxford English Dictionary, 2nd Edition, Volume V — “Dvandva-Follis”, Clarendon Press, Oxford, 1989, ISBN 0-19-861186-2 (Set), ISBN 0-19-861217-6 (Vol V)

    Google Scholar 

  17. Walker, S., “Software Key Escrow: A Better Solution for Law Enforcement's Needs?”, (in HOFF-95)

    Google Scholar 

  18. Walker, S et al, “Commercial Key Escrow: Something for Everyone Now and for the Future”, TIS Report #541, January 3, 1995, Trusted Information Systems, Inc., 3060 Washington Road, Glenwood MD. 21738., U.S.A., (Available on Internet at “ftp://ftp.tis.com/pub/crypto/drc/papers/”)

    Google Scholar 

  19. Webster's Third New International Dictionary of the English Language — Unabridged, Vol. 1 “A to G”, Encyclopedia Britannica, Inc., Chicago, Il. U.S.A. 1986, ISBN 0-87779-201-1

    Google Scholar 

  20. Wilson, J., “The Case for Greater Vigilance”, Time, 1 May 1995, Pg.51.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caelli, W.J. (1996). Commercial Key Escrow: An Australian perspective. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032345

Download citation

  • DOI: https://doi.org/10.1007/BFb0032345

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics