Your editorial in the 10/14 PCWeek
![](https://secure.gravatar.com/avatar/f2c1de7f43bfff2ba46e3b1664d60338.jpg?s=120&d=mm&r=g)
Mr Gibson -- I'm afraid that I must disagree with your editorial in the October 14th issue of PC Week titled "Encryption Law Change: Good News" <http://www.pcweek.com/opinion/1014/14edit.html>. This is not a good change, but rather another attempt by the government to get it's "key escrow" (now renamed 'key recovery') agenda added to commercial software products. Let's start with the facts. A) This is not a change in the law. There is no law regarding export of encryption software. Congress has never passed any such law. These are State Department regulations, and presidential decrees. These regulations, which have the force of law to you and me, were never debated or voted upon by our elected representatives. They can be changed tomorrow the same way. In fact, they can be changed and the public need not even be notified. B) The Clinton administration agreed to allow the export of unescrowed encryption that used 56 bit keys for six months (with up to three six month renewals) on the following conditions: 1) That the companies shipping the software agree (in principle) to incorporate 'key recovery' features in their software. 2) That the companies shipping the software make status reports to the government every 6 months as to their progress towards a key recovery scheme. If they are making satisfactory progress, their export license will be renewed for another six months. 3) That after two years, they discontinue selling their 56 bit software, and only sell the 'key recovery' software. Condition #1 is what the Clinton Administration has been fighting for since 1993 when it first announced the Clipper chip, the ability to recover the plaintext of any encrypted communication. Condition #2 puts these companies at the mercy of a government panel which will decide, every six months, whether or not an internal project is proceeding 'satisfactorily'. If not, the company will be unable to sell its' encryption products abroad. This is a _big_ stick that the government can use to influence companies' actions. Condition #3 requires the companies to obsolete their products in two years, because they will no longer be able to sell the "unescrowed" software abroad, and because one of the goals of "key recovery" is that it will not interoperate with software that does not support "key recovery". B) Your editorial states:
Previous administrations have turned a deaf ear to industry pleas, as had the Clinton administration for three and a half years. Until now, the White House has toed the line drawn by law enforcement officials, which equated powerful encryption technology with munitions. Now, the administration has, under high-tech standard-bearer Vice President Al Gore, done a complete about-face.
Even if this was, as you wrote, a "complete about face", and there were no other conditions (such as key recovery) involved, it would still be inadequate. A paper written this year by a group of noted cryptologists titled "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security" recommends that the minimum key length for security today was at least 75 bits, and for data that needs to be secured for the next twenty years, at least 90 bit keys should be used. The entire paper is availiable at <ftp://ftp.research.att.com/dist/mab/keylength.txt> (ASCII) and <ftp://ftp.research.att.com/dist/mab/keylength.ps> (PostScript). It is fascinating reading. You also wrote:
The administration plan also calls for private companies to surrender encryption keys should court orders demand them.
This is incomplete and misleading. The original Clipper press release, (availiable at <http://www.epic.org/crypto/clipper/white_house_statement_4_93.txt> ) states:
Q: Suppose a law enforcement agency is conducting a wiretap on a drug smuggling ring and intercepts a conversation encrypted using the device. What would they have to do to decipher the message?
A: They would have to obtain legal authorization, normally a court order, to do the wiretap in the first place. They would then present documentation of this authorization to the two entities responsible for safeguarding the keys and obtain the keys for the device being used by the drug smugglers. The key is split into two parts, which are stored separately in order to ensure the security of the key escrow system.
Please note the word "normally". The Clinton Administration, even though repeatedly asked, has never explained what consitutes an abnormal case, and what they would consider authorization in that case. This was not a typo. This Q&A was part of an official White House press release. C) What exactly is "key recovery"? How does it work? No one knows. The White House press release doesn't say. The idea is that the 11 vendor coalition will work out the methodology, and the White House will "approve" it. This is, in my mind, one of the slickest moves in the whole situation. The administration has taken a problem that they have been unable to solve to the satisfaction of the computer industry (access to all encrypted communications), and suddenly, it's not the administration's problem any more! It's the computer industry's problem!
From an article in a recent ComputerWorld: (<http://www.computerworld.com/search/AT-html/9610/961014SL42crypto.html>)
And speaking of failures to communicate, take IBM, which recently teamed with 10 companies to develop technology for a "key-recovery" system intended to satisfy the new export criteria.
Through some mysterious process, the scheme will allow the government to get encryption keys when it needs them, without having to hold them "in escrow" the Clipper approach.
Why "mysterious? IBM's press release announcing the initiative was four pages of self-congratulatory drivel with almost no information about what the companies would develop or how it would work.
Reminded of the secret Clipper algorithm, I sought details from IBM. I asked a spokeswoman why the company hadn't just put out a nice, snappy white paper explaining its new approach to key recovery.
"We spent three months trying to do that, quite literally," the spokeswoman said. "It's pretty confusing stuff, and whenever we get it on paper, we aren't happy with it."
Observers believe that if the 56-bit experiment proves successful, relaxation of the restriction that still covers 128-bit key software will follow. This could take place two years hence.
Who are these "observers"? They don't seem very observant to me. The government has stated that the export of unescrowed 56 bit encryption software is a temporary measure, and will be prohibited again (at the very latest) on Jan 1, 1999. At that time, the only (medium or) strong encryption software that will be allowed to be exported will be that which supports "key recovery". In conclusion, this is not a "refreshing change of direction" for the Clinton administration. This was "more of the same", albeit better disguised. The 11 companies who signed up for this coalition are receiving very little (56 bit export for at most two years), in exchange for giving up control of their encryption technologies to the government forever. If hou have any questions, I would be glad to speak to you further. -- Marshall Marshall Clow Aladdin Systems <mailto:mclow@mailhost2.csusm.edu> "It is not the function of our Government to keep the citizen from falling into error; it is the function of the citizen to keep the Government from falling into error." --Justice Robert Jackson, _American Communication Association v Douds_, 343 U.S. 306, 325 [1952] [via ed.nelson@SYSLINK.MCS.COM]
![](https://secure.gravatar.com/avatar/5ccd664bdf3ddc5842e863bd17a084f3.jpg?s=120&d=mm&r=g)
[I'm leaving stan_gibson@zd.com on the distribution list, though this letter is not meant to be a "letter to the editor" for PC Week. I just disagree with some points Marshall Clow brings up, and feel Mr. Gibson ought to get a copy of this, as he cc:ed the Cypherpunks on his letter.] At 10:56 AM -0700 10/16/96, Marshall Clow wrote:
Mr Gibson --
I'm afraid that I must disagree with your editorial in the October 14th issue of PC Week titled "Encryption Law Change: Good News" <http://www.pcweek.com/opinion/1014/14edit.html>. This is not a good change, but rather another attempt by the government to get it's "key escrow" (now renamed 'key recovery') agenda added to commercial software products.
Let's start with the facts.
A) This is not a change in the law. There is no law regarding export of encryption software. Congress has never passed any such law. These are State Department regulations, and presidential decrees. These regulations, which have the force of law to you and me, were never debated or voted upon by our elected representatives. They can be changed tomorrow the same way. In fact, they can be changed and the public need not even be notified.
Actually, as Greg Broiles pointed out in an article (on the Cypherpunks list) several weeks ago, Congress deliberately chooses to delegate much regulatory authority to other agencies. There just is not enough time or expertise for them to pass specific laws covering the number and size of trashcans in the national parks, the type of equipment to be used on Navy ships, and so on. The State Department--and soon to be transferred to Commerce--has the regulatory authority to decide which exports are covered by the International Trafficking in Arms Regulations, the ITARs. These rules effectively have the full force of law, as many tens of thousands of laws not specifically passed by Congress have. (It is true that the ITARs may well end up being overturned by the courts, as the Bernstein and Junger cases proceed, but this could happen to laws passed by Congress, and does.) Also--and I am not an expert on this--some of the basis of the ITARs is closely related to the "Munitions Act," which was, I am almost certain, an actual Act of Congress, some decades back. Certainly Congress knows full well what the ITARs are about, and could change them if it thought the State Department or Commerce Department were overstepping their bounds. (As it may do, some day. Not this term, obviously. "Pro-Code" got tabled, so Congress effectively spoke.) (Understand that I am not arguing in favor of the ITARs, nor their application to crypto, just taking issue with Marshall's opening point that the ITARs are not real laws. I mostly believed they were real laws before, but Greg Broiles' analysis several weeks ago cinched it for me.) I don't have the time right now to respond to the rest of Marshall's letter, though I agree with his basic sentiments. --Tim May "The government announcement is disastrous," said Jim Bidzos,.."We warned IBM that the National Security Agency would try to twist their technology." [NYT, 1996-10-02] We got computers, we're tapping phone lines, I know that that ain't allowed. ---------:---------:---------:---------:---------:---------:---------:---- Timothy C. May | Crypto Anarchy: encryption, digital money, tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets, Higher Power: 2^1,257,787-1 | black markets, collapse of governments. "National borders aren't even speed bumps on the information superhighway."
participants (2)
-
Marshall Clow
-
Timothy C. May