Another forwarded message

TO1SITTLER at APSICC.APS.EDU TO1SITTLER at APSICC.APS.EDU
Mon Apr 19 13:26:38 PDT 1993


From:	APSICC::GR2KITTRELL  "TOO MANY SECRETS" 18-APR-1993 21:52:10.16
To:	TO1SITTLER
CC:	
Subj:	Process

From:	SMTP%"igor at e5.ijs.si" 18-APR-1993 18:05:57.69
To:	gr2kittrell at apsicc.aps.edu
CC:	
Subj:	(fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]

Date: Mon, 19 Apr 1993 01:34:02 +0200
From: Igor Petrovski <igor at e5.ijs.si>
Message-Id: <199304182334.AA00721 at kekec.e5.ijs.si>
To: gr2kittrell at apsicc.aps.edu
Subject: (fwd) Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Newsgroups: sci.crypt
Organization: Open Systems & Networks, ijs, Slovenia

Relay-Version: VMS News - V6.1 30/1/93 VAX/VMS V5.5-1; site cathy.ijs.si
Path: cathy.ijs.si!arnes.si!scsing.switch.ch!ira.uka.de!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!darwin.sura.net!haven.umd.edu!uunet!looking!brad
Newsgroups: sci.crypt
Subject: Re: Secret algorithm [Re: Clipper Chip and crypto key-escrow]
Message-ID: <1993Apr17.204850.26711 at clarinet.com>
From: brad at clarinet.com (Brad Templeton)
Date: Sat, 17 Apr 1993 20:48:50 GMT
References: <strnlghtC5LGFI.JqA at netcom.com> <jhesseC5LuMC.2Ex at netcom.com> <rdippold.735042679 at qualcom>
Organization: ClariNet Communications Corp.
Keywords: encryption, wiretap, clipper, key-escrow, Mykotronx
Lines: 24

One presumes the system could work as follows:

a) Blank clips are manufactured by Mykotronx and VLSI.  The number
produced is carefully audited and they are shipped to the first
escrow house.

It programs the chips with its half the key, and prints out a paper slip
with the key half and non-secret chip serial number.   The reams of paper
are filed in locked boxes in the vault, a fuse is burnt in the chip so
that the key is now unreadable.

The chip then goes to the next escrow house, where the same thing is
done.  This continues through N escrow houses, perhaps, could be more than
2.

The last one provides the chip to the cellular phone maker.

And yes, this has to be a public key system or it would be almost
impossible to handle.  It might not be RSA, but that does not mean
that PKP doesn't get paid.  Until 1997, PKP has the patent on the
general concept of public key encryption, as well as the particular
implementation known as RSA.
-- 
Brad Templeton, ClariNet Communications Corp. -- Sunnyvale, CA 408/296-0366






More information about the cypherpunks-legacy mailing list