Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
6
Cryptography
7
8
The Clinton administration,
9
civil libertarians, and the computer industry are enmeshed in a controversy
10
over cryptography policy. What is cryptography? How and why does the government
11
want to restrict it, and why are some people opposed?
12
13
14
15
Cryptography has two parts: encryption and decryption. Encryption
16
uses complicated mathematical formulas to make information indecipherable.
17
Decryption decodes the information. The strength of a computer
18
encryption algorithm depends largely on "key length," essentially the number of
19
possible combinations in the code. A key that is 40 bits long, for example, has
20
two raised to the 40 th power (2 40 ) possible combinations.
21
The longer the key, the harder the code is to crack.
22
23
Because of the rise of online commerce, there is a
24
burgeoning market for cryptography to protect electronic transactions and
25
sensitive data from hackers. But the government is concerned that foreign
26
powers (as well as terrorists and criminal cartels) might obtain cryptography
27
that is uncrackable. Advanced cryptography could be used to make phone
28
conversations impregnable to wiretap and financial records invulnerable to
29
subpoena. While the government permits U.S. companies to sell any cryptography
30
domestically, it has imposed export restrictions on technology stronger
31
than 40 bits.
32
33
These
34
restrictions have angered the computer industry. Because hackers have broken
35
40-bit technology, and because foreign companies already sell superstrong
36
encryption programs of 128 bits and more, there is little demand for legal
37
(40-bit and under) U.S. cryptography. The industry claims that export
38
restrictions could cost American computer companies more than $60 billion in
39
annual revenues by the year 2000: $6 billion from lost cryptography sales, the
40
rest from lost sales of associated hardware and software.
41
42
43
The Clinton administration's cryptography stand
44
reflects the strong law-and-order views of the FBI and Justice Department.
45
Critics argue that unbreakable encryption already is marketed by foreign
46
companies, so the export restrictions on American cryptography do no good.
47
Currently, there is no international encryption standard in place; but the
48
law-enforcement agencies hope that U.S. export policy will lead to one.
49
50
Since
51
1993, the administration has been using export restrictions as leverage to
52
encourage American companies to adopt a standard with a "backdoor "--a
53
route of entry for an outsider, such as the U.S. government, to recover
54
encrypted data. (The 128-bit encryption currently sold by foreign companies
55
contains no such backdoor.)
56
57
But the administration's efforts to establish a standard
58
have failed. First came the "Clipper Chip ," an 80-bit encryption
59
algorithm designed by the National Security Agency. In April 1993, the
60
administration said it would lift export restrictions on companies that use the
61
Clipper Chip. However, the government would keep a "key," which it could use to
62
tap a phone or decrypt data. Current rules requiring court orders for such
63
invasions of privacy would, presumably, continue to apply. Nevertheless, civil
64
libertarians denounced the Clipper Chip as a Big Brother intrusion, and the
65
computer industry refused to market encryption that the U.S. government could
66
crack at will.
67
68
In 1995,
69
the administration substituted "key escrow " for the Clipper Chip. Under
70
key escrow (dubbed "Clipper II" by opponents), companies could export strong
71
encryption algorithms, but would have to file a key with a government-approved
72
agent, such as a bank. But key escrow flopped, too. The computer industry said
73
it could not sell a program with a floating key accessible to the U.S.
74
government.
75
76
77
In a case of role reversal, the Democratic
78
administration's law-and-order stance has been matched by the Republicans'
79
rediscovery of civil liberties . Civil libertarians and the computer
80
industry recruited pro-business Republicans and anti-government conservatives
81
on Capitol Hill (as well as some liberal Democrats). In 1996, these legislators
82
introduced a bill to all but eliminate export restrictions. The legislation did
83
not go to a vote, but it has an excellent chance of passing next year. Bob Dole
84
endorsed the bill; Clinton has promised to veto it.
85
86
This political pressure
87
forced the Clinton administration to propose a compromise last week. Vice
88
President Gore offered an executive order that would ease export restrictions
89
by 1) raising the export limit from 40 bits to 56 bits for at least the next
90
two years (allowing U.S. companies to meet the current minimum commercial
91
standard); 2) transferring export-license authority from a State Department
92
military office, which almost always refuses applications, to the more friendly
93
Commerce Department; 3) permitting export of encryption of unlimited strength,
94
provided the technology incorporates "key recovery ." This is similar to
95
key escrow, except there is no single key and the government holds nothing. In
96
key recovery, a key is broken into several separate pieces of information and
97
the pieces are stored separately, perhaps by the users themselves, perhaps by
98
outside agents. Reconstructing the key requires the cooperation of each
99
holder.
100
101
If key recovery is adopted,
102
terrorists are likely to eschew it in favor of unbreakable technology. But if
103
banks, airlines, and communications companies accept key recovery, the
104
terrorists will risk potential exposure every time they do business with those
105
institutions. Key recovery has barely been tested, much less perfected. And
106
while a few companies--notably IBM--have embraced the technology, others--like
107
Netscape--strongly object to it. The rest of the industry is waiting to see how
108
much control the government demands over recovered keys. In fact, many experts
109
believe that the key recovery scheme is so vague and tentative as to be
110
irrelevant. They say the encryption issue will only be resolved when Congress
111
debates the issue next year.
112
113
114
115
116
117