Clipper chip: Difference between revisions
imported>Sandy Harris (New page: {{subpages}} The '''Clipper chip''' was a device promoted by the US government for escrowed encryption of telephone conversations. It used a block cipher called [[Skipjack (cipher)...) |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
The '''Clipper chip''' was a device promoted by the US government for [[escrowed encryption]] of telephone conversations. It used a [[block cipher]] called [[Skipjack (cipher)|skipjack]], developed by the [[NSA]]. | The '''Clipper chip''' was a device promoted by the US government for [[escrowed encryption]] of telephone conversations. It used a [[block cipher]] called [[Skipjack (cipher)|skipjack]], developed by the [[NSA]]. | ||
Line 12: | Line 12: | ||
The design uses a 16-bit "Law Enforcement Access Field" (LEAF) which identifies the key in use to police or security personnel who need to tap the conversation. Blaze showed that it is easy to forge this field, replacing the legitimate LEAF with a value that passes the protocol's validity checks but is of zero value to eavesdroppers. | The design uses a 16-bit "Law Enforcement Access Field" (LEAF) which identifies the key in use to police or security personnel who need to tap the conversation. Blaze showed that it is easy to forge this field, replacing the legitimate LEAF with a value that passes the protocol's validity checks but is of zero value to eavesdroppers. | ||
Eventually, the US government | Eventually, the US government quietly dropped the Clipper initiative. | ||
== References == | == References == | ||
{{reflist}} | {{reflist}} |
Latest revision as of 04:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
The Clipper chip was a device promoted by the US government for escrowed encryption of telephone conversations. It used a block cipher called skipjack, developed by the NSA. Like all escrowed encryption (encryption that can be broken at need by law enforcement or national security agencies), Clipper was extremely controversial. Originally, the chip design was classified. Critics argued that this violated Kerckhoffs' Principle; no design should be trusted without publication and independent analysis. Eventually, the design was de-classified. Within weeks, Matt Blaze found a serious flaw. [1] The design uses a 16-bit "Law Enforcement Access Field" (LEAF) which identifies the key in use to police or security personnel who need to tap the conversation. Blaze showed that it is easy to forge this field, replacing the legitimate LEAF with a value that passes the protocol's validity checks but is of zero value to eavesdroppers. Eventually, the US government quietly dropped the Clipper initiative. References
|