mgraffam@mhv.net
Wed, 16 Sep 1998 04:19:15 -0400 (EDT)
On 16 Sep 1998, Sparkes, Ian, ZFRD AC wrote:
> Additionally, on the level they are working
> (senior management/board) the idea of corporate message
> recovery is on the wish list, not on the list of top ten
> things to avoid. Whether these prospective clients are
> aware who else may be able to get at their data is another
> matter. This is largely academic as these large
> corporations still trust the government more than the net.
It's still nuts. There are good methods of message recovery (from
ciphertext) without message escrow. Standard key-escrow schemes would work
nice. Every private key of every employee is escrowed in a database, and
encrypted with a secret sharing scheme.
If some engineer encrypts the designs to some new prototype widget to
himself and ends up getting killed on his way home, some N number of
head-honchos get together with their shares and reconstruct the private
key, and all is well.
No TESS to get compromised, the escrow databases are kept smaller (a few
K for a public key, as opposed to a 10 M set of design plans), and the
whole thing can be based on a provably secure algorithm (the secret sharing)
and a fine PK algorithm of your choice.
Michael J. Graffam (mgraffam@mhv.net)
http://www.mhv.net/~mgraffam -- Philosophy, Religion, Computers, Crypto, etc
"..subordination of one sex to the other is wrong in itself, and now
one of the chief hindrances to human improvement.." John Stuart Mill
"The Subjection of Women"
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:13:59