Here's a really muddled passage from the House Intelligence (sic)
Committee report ftp://ftp.loc.gov/pub/thomas/cp106/hr117p5.txt :

   The Committee amendment preserves law enforcement's crime fighting   
   and public safety capabilities by providing clear authority through 
   judicial processes to access the plaintext or decryption 
   information, without the target of the investigation's knowledge 
   or cooperation. It does not, however, require key escrow, or 
   mandate key recovery. Key recovery is a non-factor for domestic
   use and for export considerations.

Huh?  There are only 2 ways to access plaintext without the user's
cooperation:

   1. Key recovery/escrow schemes
   2. Crippled encryption.

The elaborate judicial processes their rewritten bill sets up are
clearly designed for key recovery (e.g. from your system administrator)
though they avoid the term.  Breaking weak crypto would need no such
procedures; (though they'd probably have to ask for permission if they
wanted the plaintext admitted as evidence.)

Howie Goodell
-- 
************************************************************************
  Howie Goodell         Senior Software Engineer   HCI Research Group
  28 Lucille Avenue     Micrion Corporation        Computer Science Dept
  Salem, NH 03079-2054  1 Corp Wy Centennial Park  Univ. of Mass. Lowell
  (603) 898-8407        Peabody, MA 01960-7990     1 University Avenue
  (810) 222-2042 efax   (978) 538-6680  -6699 fax  Lowell, MA 01854
  [EMAIL PROTECTED]  [EMAIL PROTECTED]   [EMAIL PROTECTED]
  End-User Programming:  http://www.cs.uml.edu/~hgoodell/EndUser

Reply via email to