Back to Results
First PageMeta Content
Block cipher / Cipher / Clipper chip / Initialization vector / Key / Data Encryption Standard / PC Card / Capstone / Cryptography / Skipjack / Block cipher modes of operation


Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories
Add to Reading List

Document Date: 2001-05-15 19:09:38


Open Document

File Size: 159,03 KB

Share Result on Facebook

City

Fairfax / Washington / D. C. / Washington / D.C. / EES PCMCIA / /

Company

LEAF Search / AT&T / EES / New York Times / Tessera Inc. / Matt Blaze AT&T Bell Laboratories / /

Country

United States / /

/

Event

Person Communication and Meetings / Man-Made Disaster / Product Issues / Product Recall / FDA Phase / /

Facility

National Institute / PCMCIA library / Rob Pike / /

IndustryTerm

legitimate secure storage applications / rogue devices / host processor / software modifications / non-interactive applications / store-and-forward messaging applications / cipher algorithm / Software implementations / peer device / real-time applications / rogue applications / classified cipher algorithm / crypto-synchronization protocol / parallel processing / law enforcement recovery / communications networks / modified software / secure telephone calls / exhaustive search / less interactive applications / conventional data wiretapping technology / card key exchange protocol / legal applications / interoperable rogue applications / rogue systems / cellular telephone access codes / hardware-based rogue products / direct hardware / real-time voice telephony / cryptographic processors / law enforcement access / law enforcement wiretap access performance / file storage systems / tamper-resistant hardware / Non-interoperable applications / law enforcement access mechanism / host processors / encryption systems / stand-alone product / law enforcement / legal devices / software modification / rogue software system / optimized hardware / bruteforce search / prototype devices / secure telephony / search time / /

MusicGroup

Blaze / /

OperatingSystem

SunOS / /

Organization

US Government / European Central Bank / National Institute for Standards and Technology / Government Printing Office / US National Security Agency / National Bureau of Standards / Clinton Administration / US Federal Reserve / /

Person

Jim Reeds / Dave Maher / Mike Reiter / Steve Bellovin / Steve Kent / Jack Lacy / Tom London / Joan Feigenbaum / Ken Shirriff / Bruce Schneier / Peter Honeyman / /

Position

author / representative / /

Product

Capstone chip / Brute-Force LEAF Search / Capstone / DH76 / /

ProgrammingLanguage

Postscript / /

ProvinceOrState

Virginia / /

PublishedMedium

New York Times / /

Technology

Key Escrow Encryption / Capstone chip / CFB encryption / conventional data wiretapping technology / In CBC mode encryption / key exchange protocol / crypto-synchronization protocol / Data Encryption / block cipher / EES PCMCIA card key exchange protocol / classified cipher algorithm / least two block encryptions / cipher algorithm / Cable TV / LEAF encryption / Encryption / cellular telephone / cryptography / sending chip / 1994 Abstract The Escrowed Encryption / host processor / Capstone chips / receiving chip / file encryption / Clipper chip / encryption system / host processors / bulk file encryption / open protocol / parallel processing / SCSI / /

SocialTag