Re: Euro-move to key-escrow encryption

1995-09-28

Sender: •••@••.••• (Jerome Thorel)

Andy said :
>I have to thank Jerome Thorel for this information, as well as for the
>following posting that fills in some details.  I realize that a lot is
>left unclear, such as who has authority to approve and actually put
>the Council of Europe's proposal into law.  More information would be
>appreciated.

The Council of Europe, based in Strasbourg, has no official powers in each
members states. It's a kind of Organization for American States -- only a
council of proposition, of moderation, that's all. But their guidelines are
taken seriously by national governments.

People must avoir confusiuon with the European Union (15 members, the
former ECommunity), and the EU Commision, in Brussels, which is an
executive body of the EU, but with limited powers - the EU Commission has
much more power than the CoE. But in defense, state security -- and
encryption -- only national government have the power to change or adapt
laws.

SO these 2 decisions won't change the way European countries will manage
encryption, BUT it's a MOVE that will surely be followed in the following
months.

Jerome.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Sender: "Craig A. Johnson" <•••@••.•••>

Henry Huang wrote, on 26 Sept:

> Frankly, I'm not sure why the Gov't would even want to bother
> banning non-escrowed encryption.  It's not like it's actually used
> much now. And their actions only serve to draw increasing suspicion
> to their motives (which, as revealed by EPIC, are *extremely*
> unsavory).

Henry, it is not true that non-escrowed encyrption is little used.
Triple DES, RSA, and even PGP are used quite liberally in the
corporate world.  Financial institutions, in particular rely on
triple DES and RSA, which are "public key" but are not "key escrow"
encryption, where a third party literally holds the keys, as you have
explained quite well.

Also, there are fascinating developments on the interactive
crypto-scape.  The excerpt below, taken from the September 25th issue
of Online Business Today represents stepped-up efforts by the
Internet community to develop strong encryption based on non key
escrow alternatives.  (Unfortunately for me, I am a Netscape user,
which has not moved to an "out-of-band" solution like that discussed
below.)

The zinger in the piece below is that the U.S. has approved this encryption for
export!

There are also unsubstantiated (at least for me) rumors that the
Internet Architecture Board is going ahead with development of strong
encryption for Net use irrespective of whatever U.S. policy turns out
to be.

=======================================

(Moderator's note: The following material is under copyright in the
U.S., and is posted to this newsgroup under "fair use" and "teachable
moment" doctrines.  Please do not post indiscriminately.)

(From Online Business Today, September 25, 1995)

V-ONE'S CYBERWALLET(TM) LAUNCHED
V-ONE Corp. has announced that it will now license
its technology for open, secure electronic commerce
known as the CyberWallet(TM) to any qualified
software vendor for a nominal license fee. The
announcement was made in part in response to the
recently-publicized breaches of Netscape's SSL
security protocol. V-ONE's CyberWallet payment
process is intended to prevent merchant fraud and to
make totally open and secure electronic commerce on
the Internet by both consumers and businesses a
reality.
The CyberWallet payment process was licensed by
V-ONE to Checkfree(TM), Spyglass(TM), and
SecurePay(TM) in August of 1995 as a part of the
Electronic Business Co-op (EBC). Currently, a major
credit card company and several processors are testing
the CyberWallet process.
Unlike the Netscape SSL method, V-ONE uses its
patent-pending Secure Transaction Channel (STC)
technology in its CyberWallet process. STC is an "out
of band," end-to-end security method which utilizes
DES and RSA public key cryptography to conceal and
transmit financial data to credit card processors over
the Internet. STC's "out of band" characteristics enable
its secure use with any Internet browser, any Internet
server, and any transaction processor. The United
States Department of State and the Department of
Commerce have granted export approval.
STC's method differs from "in-band" security methods
such as Netscape's SSL, by operating on a separate
channel, parallel to any browser. This method is
analogous to a control channel operating with a data
channel in communication systems.
V-ONE, owner of the Internet firewall
SmartWall(TM), successfully demonstrated its version
of the CyberWallet - SmartWallet(TM) - September
19 at the Third Annual International Smart Card
Forum in Tysons Corner, VA. In the demonstration,
the SmartWallet process was used to purchase
merchandise with a credit card over the Internet. Next,
a smart card was used to authenticate a user over the
Internet to conduct secure personal banking with a
Citibank Home Banking account.

STC reduces the risk of merchant fraud by not
allowing the cybermerchant to see any financial data
contained in the encrypted envelope. The data is
decrypted at a decryption server used by the processing
bank or processor, who is a trusted party for credit card
information.
STC is designed to eliminate the current need for a
certification infrastructure by using a unique public
key/private key relationship for encryption and
decryption. When the certification infrastructure is
finally in place, STC's application level architecture
allows for immediate migration to that process. In
addition, STC will comply with credit card transaction
standards as they are released.
"We use the strongest DES encryption to encrypt the
financial data and re-encrypt with RSA technology to
make it what we believe to be the strongest, most secure
Electronic Wallet in the world." said James Chen,
CEO of V-ONE.

Craig A. Johnson


 ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~
 Posted by --  Andrew Oram  --  •••@••.••• --  Cambridge, Mass., USA
                 Moderator:  CYBER-RIGHTS (CPSR)

    World Wide Web:
        http://jasper.ora.com/andyo/cyber-rights/cyber-rights.html
        http://www.cs.virginia.edu/~hwh6k/public/cyber-rights.html
    FTP:
        ftp://jasper.ora.com/pub/andyo/cyber-rights

You are encouraged to forward and cross-post messages and online materials,
pursuant to any contained copyright & redistribution restrictions.
 ~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~-~=-=-=-=-=-=-=-=~=-=-=-=-=-=-=-=-=~