Here's a really muddled passage from the House Intelligence (sic)
Committee report ftp://ftp.loc.gov/pub/thomas/cp106/hr117p5.txt :
The Committee amendment preserves law enforcement's crime fighting
and public safety capabilities by providing clear authority through
judicial processes to access the plaintext or decryption
information, without the target of the investigation's knowledge
or cooperation. It does not, however, require key escrow, or
mandate key recovery. Key recovery is a non-factor for domestic
use and for export considerations.
Huh? There are only 2 ways to access plaintext without the user's
cooperation:
1. Key recovery/escrow schemes
2. Crippled encryption.
The elaborate judicial processes their rewritten bill sets up are
clearly designed for key recovery (e.g. from your system administrator)
though they avoid the term. Breaking weak crypto would need no such
procedures; (though they'd probably have to ask for permission if they
wanted the plaintext admitted as evidence.)
Howie Goodell
--
************************************************************************
Howie Goodell Senior Software Engineer HCI Research Group
28 Lucille Avenue Micrion Corporation Computer Science Dept
Salem, NH 03079-2054 1 Corp Wy Centennial Park Univ. of Mass. Lowell
(603) 898-8407 Peabody, MA 01960-7990 1 University Avenue
(810) 222-2042 efax (978) 538-6680 -6699 fax Lowell, MA 01854
[EMAIL PROTECTED] [EMAIL PROTECTED] [EMAIL PROTECTED]
End-User Programming: http://www.cs.uml.edu/~hgoodell/EndUser