← Back to Concept Index

key-escrow

A system where encryption keys are held in secure escrow, enabling authorized government entities to access plaintext communications when legally permitted.

6 chapters across 2 books

Crypto (2001)Steven Levy

Chapter 12

The chapter details the origins and development of the Clipper Chip project within the NSA, focusing on Clint Brooks's role in balancing the agency's dual mission of securing communications and enabling lawful surveillance. It explores the challenges posed by the rise of public cryptography, the agency's initial resistance, and the eventual proposal of a key escrow system as a compromise to allow strong encryption while preserving government access under legal authority. The narrative also highlights the cultural and institutional shifts required within the NSA to adapt to a world increasingly dominated by widespread encryption.

Chapter 27

This chapter provides a comprehensive glossary of key terms and concepts related to cryptography and cryptanalysis, explaining foundational cryptosystems, encryption methods, and government involvement in encryption technology. It covers both conventional and public key cryptography, highlighting important algorithms like RSA and Diffie-Hellman, as well as government initiatives such as the Capstone and Clipper chips. The glossary also clarifies technical terms such as ciphertext, key escrow, and digital signatures, offering a foundational understanding of the cryptographic landscape.

Chapter 28

This chapter appears to be an extensive index or reference list from Steven Levy's book "Crypto," cataloging key figures, concepts, technologies, legislation, and organizations related to cryptography and digital security. It covers a wide range of topics including encryption standards, cryptographic algorithms, government policies, privacy issues, and influential individuals in the field. The chapter serves as a comprehensive resource for understanding the breadth and depth of the cryptography landscape as presented in the book.

Artificial Life: How Computers Are Transforming Our Understanding of Evolution and the Future of Life (2001)Steven Levy

Chapter 13

The chapter details the development of the Clipper Chip, a cryptographic device designed by the NSA to balance the need for strong encryption with government access to plaintext communications through a key escrow system. Clint Brooks, an NSA official, navigates the challenges posed by the rise of public cryptography and the agency's dual mission to both protect and intercept communications. The chapter highlights the tension between privacy advocates and law enforcement, and the NSA's attempt to initiate a national debate on cryptography policy.

Chapter 18

This chapter provides a comprehensive glossary of cryptographic terms and technologies relevant to computer security and encryption. It explains foundational concepts such as encryption, cryptanalysis, and key management, as well as specific cryptosystems like DES, RSA, and PGP. The glossary also covers government-related encryption technologies and controversies, including key escrow systems like the Capstone and Clipper chips.

Chapter 19

This chapter appears to be an extensive index or reference list related to cryptography, covering key figures, technologies, algorithms, organizations, and legislative aspects relevant to the field. It catalogs numerous individuals, encryption standards, cryptographic methods, and policy issues, reflecting the complexity and breadth of cryptography's role in computer security and digital privacy. The chapter underscores the interplay between technological innovation, governmental regulation, and social implications within the cryptographic landscape.