Abstract
“Commercial Key Escrow (CKE)”, and an earlier “Software Key Escrow (SKE) scheme, have been proposed by Trusted Information Systems Inc. (TIS) in the USA as a possible compromise scheme to meet the demands of commerce and industry for new levels of information security, particularly transaction and message confidentiality in an international and national networked environment, while meeting law enforcement demands for continued effectiveness of telecommunications line-tapping ability. These latter requirements relate to the perceived need by law enforcement agencies to make use of legitimate authorised linetapping capabilities for the gathering of appropriate intelligence and/or evidence for the purpose of fulfilling perceived roles in the protection of society from criminal activity against the potential case where such line-taps produce intercepts that are encrypted. CKE, involving the incorporation of software based cryptography in computer and network systems with associated key recovery data transmitted during data network activity and provision of “Data Recovery Centres (DRC)”, is seen as presenting a new solution to the problems encountered in the USA with the “Clipper” initiative in that country announced in 1993.
This paper examines the CKE/SKE proposals in an Australian and international context and sets the proposal against the more general debate on cryptography, its technology and usage, and public policy. A likely scenario is suggested for Australia involving the incorporation of backup and recovery and network directory services into the encryption scheme and the use of Australia Post, and indeed any national post office structure, as an ideal candidate for trials of both the technology and public/business acceptance of this overall structure. More basic principles of “freedom-of-speech” are also raised in conjunction with this overall analysis of a concrete proposal.
Preview
Unable to display preview. Download preview PDF.
References
Balenson, D. et al, “A New Approach to Software Key Escrow Encryption”, (in HOFF-95)
Code of Practice and “Code of Conduct”, British Computer Society (BCS), BCSNet, June 1995, (Source: World-Wide Web Site — http://www.bcs.org.uk)
Denning, D., “International Key Escrow Encryption: Proposed Objectives and Options”, (in HOFF-95)
“In the name of liberty”, Editorial — The Economist, 29 April 1995.
Ellison, C. M., “Initial Description and Specification of the TIS Commercial Key Escrow System”, Trusted Information Systems, Inc., 3060 Washington Road, Glenwood MD. 21738., U.S.A., January 9, 1995, (Available on Internet at “ftp://ftp.tis.com/pub/crypto/drc/papers/”)
Head, B., “Playing the Game”, Banking Technology, June 1995, Pg. 24
Hoffman, L. (Editor), “Building in Big Brother: the Cryptographic Policy Debate”, Springer-Verlag New York, Inc., U.S.A., 1995, 0-387-944441-9
Kehoe, L., “IBM in $4.6 bn bid for Lotus”, The Australian, 7 June 1995.
Lethin, R., “Admiral Bobby Inman's talk at the Massachusetts Institute of Technology”, Internet Security Monthly, February 1995, ISSN 1079-5669
“Fly Buys.ℳ” Brochure, Loyalty Pacific Pty Ltd, Australia. 1995. (ACN 057 931 334)
Lundberg, B and Persson, E., “Security on Electronic Highways in Sweden — Worthwhile Inheritance for the Future.” in Yngstrom, L. (Editor) “Information Security: The Next Decade/Security on the Electronic Highways in Sweden”, Swedish Workshop Addendum to the Proceedings of the Eleventh International Conference on Information Security, IFIP/Sec'95, Capetown, South Africa, May 1995., The Swedish Computer Society, Saltmatargatan 9, 11359 Stockholm, Sweden, 1995.
The Macquarie Dictionary, 2nd Revised Edition, The Macquarie Library Pty Ltd, 1990, ISBN 0-949757-41-1
Marris, S., “Investigation finds jockeys used secret codes to fix races.” The Australian, 8 June 1995.
“Guidelines on the Protection of Privacy and Transborder Flows of Personal Data”, Organisation for Economic Co-operation and Development (OECD), Paris, 1980.
“Recommendation of the Council Concerning Guidelines for the Security of Information Systems, Guidelines for the Security of Information Systems and Explanatory Memorandum to Accompany the Guidelines”, DSTI/ICCP/AH(90)21/REV6, 18 Sept. 1992., Organisation for Economic Co-operation and Development (OECD), Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy, Ad Hoc Group of Experts on Guidelines for the Security of Information Systems.
The Oxford English Dictionary, 2nd Edition, Volume V — “Dvandva-Follis”, Clarendon Press, Oxford, 1989, ISBN 0-19-861186-2 (Set), ISBN 0-19-861217-6 (Vol V)
Walker, S., “Software Key Escrow: A Better Solution for Law Enforcement's Needs?”, (in HOFF-95)
Walker, S et al, “Commercial Key Escrow: Something for Everyone Now and for the Future”, TIS Report #541, January 3, 1995, Trusted Information Systems, Inc., 3060 Washington Road, Glenwood MD. 21738., U.S.A., (Available on Internet at “ftp://ftp.tis.com/pub/crypto/drc/papers/”)
Webster's Third New International Dictionary of the English Language — Unabridged, Vol. 1 “A to G”, Encyclopedia Britannica, Inc., Chicago, Il. U.S.A. 1986, ISBN 0-87779-201-1
Wilson, J., “The Case for Greater Vigilance”, Time, 1 May 1995, Pg.51.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Caelli, W.J. (1996). Commercial Key Escrow: An Australian perspective. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032345
Download citation
DOI: https://doi.org/10.1007/BFb0032345
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive