The risks of key recovery, key escrow, and trusted third-party encryption
A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report...
Main Authors: | , , , , , , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | en_US |
Published: |
O'Reilly & Associates, Inc
2018
|
Online Access: | http://hdl.handle.net/1721.1/117329 https://orcid.org/0000-0002-5328-7821 https://orcid.org/0000-0002-7105-3690 |
Summary: | A variety of "key recovery," "key escrow," and "trusted third-party" encryption requirements have been suggested in recent years by government agencies seeking to conduct covert surveillance within the changing environments brought about by new technologies. This report
examines the fundamental properties of these requirements and attempts to outline the technical risks, costs, and implications of deploying systems that provide government access to encryption keys. |
---|