Interesting People mailing list archives
IP: UK Government Launches HMS Clipper (ASCII 2 of 2)
From: Dave Farber <farber () central cis upenn edu>
Date: Tue, 18 Jun 1996 12:30:01 -0400
(b) Services Offered 9. The services which a TTP may provide for its customers will be a commercial decision. Typically, provision of authentication services may include the verification of a client's public key, time stamping of documents and digital signatures (which secure the integrity of documents). TTPs may also offer a service of key retrieval (typically for documents and files that have been encrypted by employees) in addition to facilitating the real time encryption of a client's communications. 10. Licensed TTPs operating within a common architectural framework, on a European or even a global basis, will be able to facilitate secure communications between potential business partners in different countries. Providing the respective clients trust their TTPs, secure electronic commerce between parties who have not met will become possible because they will have confidence in the security and integrity of their dealings. The use of the word 'dealings' here in place of 'communications' implies that more than the communications can be trusted - it is close to saying that if a TTP can be trusted then so can its clients. In practice this will not be the case unless there is a VERY rigorous vetting process before a TTP takes on any client and it is hard to see that this will be economically justified in many cases. In any event, there is a presumption that criminals and terrorists are operating somewhere within the domain of all TTPs so not everyone can be behaving in a completely trustworthy manner. (c) Architecture and supporting products 11. It is envisaged that a common architectural framework will be needed to support the information security services being offered by TTPs in different countries. Clearly this will be a matter for negotiation between interested parties taking into account developments in international standards organisations. The architecture would need, however, to support both the provision of integrity and confidentiality and therefore be capable of verifying public encryption keys and escrowing private ones. There is no reason why it should not also support a choice of encryption algorithms, such as those on the ISO (International Standards Organisation) register. 12. In support of such an architectural framework we would envisage manufacturers developing software or hardware products for use by the business community. Such products will need to be consistent with whatever standard (or standards) are arrived at to enable TTPs to interoperate. The type of algorithm used for message encryption, and whether it is implemented in hardware or software, will be a matter of business choice. Not entirely a business choice since I assume that it will not be possible for two or more co-operating TTPs to use an algorithm or an approach which they do not reveal to the Government since any disclosed keys could then be useless (remember that it is keys that the Government is seeking to gain access to, not the protected information). (d) European Union 13. The Government is working closely with the European Commission on the development of encryption services through their work on information security. Arrangements concerning lawful interception and the regulation of TTPs in that context are matters for Member States to determine. However, the Commission has an important role in facilitating the establishment of an environment where developments in the use of TTPs can be fostered. The Commission should soon be in a position to bring forward a programme of work involving, for example, the piloting and testing of TTP networks. It would be nice to have a successful TTP pilot BEFORE announcing a policy based on TTP principles. It is surely 'putting the cart before the horse' to announce a policy before its feasibility, its affordability or its practicality have been demonstrated. (e) OECD 14. The Government are also participating in discussions at the OECD on encryption matters. Where possible we will encourage the development of networks of TTPs which facilitate secure electronic trading on a global basis. (f) Export Controls 15. Export controls will remain in place for encryption products (whether in hardware or software form) and for digital encryption algorithms. However, to facilitate the participation of business and commerce in the information society the Government will take steps, with our EU partners, with a view to simplifying the export controls applicable to encryption products which are of use with licensed TTPs. This paragraph is not very helpful since current export controls are lacking in clarity and precision and urgently require revision to remove the confusion and uncertainty which this causes. Now that the UK Government is committed to at least some amendments of these controls it will be important to grasp the opportunity which this provides to establish export control laws for cryptographic products which are precisely and clearly defined and which are limited in scope to the essential minimum to meet openly stated Government objectives whilst also being consistent with modern approaches to computer and network systems engineering. In particular the current export controls on products which contain no cryptography themselves but which have fully and openly defined interfaces which allow the use of external cryptographic modules need to be removed. Export controls on cryptographic software need to be better defined in order to ensure that they are truly enforceable. In the United States a distinction is made between the publication of cryptographic algorithms in descriptive text or computer language source code form on paper and the identical descriptions held on magnetic media or transmitted over networks. The reason for the distinction is that US export controls on cryptography are interpreted to cover export on magnetic media and via networks whilst the export of identical information on paper is not subject to any such control. In the UK the situation *SEEMS* to be more sensible in that, as far as I can tell, there are no UK export controls on cryptographic algorithm descriptions in either text or source code form, irrespective of the media involved. However it is possible that there are such controls in theory but that no attempt is made to enforce them, a situation that leads to uncertainty in such areas as international co-operation in R&D or product development. It will hence be necessary during the amendment of UK export controls to ensure that the extent of the export controls on cryptographic algorithm descriptions are clear and precise. The export controls applicable to cryptographic software in binary and executable form also need to be clarified. Given the widespread international availability of encryption algorithms and software on the Internet it makes no sense to continue with laws that are not enforceable and which have no practical effect. Therefore, in continuing with export controls on cryptographic software, the Government will need to demonstrate that such controls: + are designed to achieve fully and precisely enunciated Government objectives; + are capable of being enforced in such a way that these objectives can be substantially achieved without significant impact on other freedoms; + will not be rendered ineffective by activities which are beyond the Government's control or influence. Any software export controls that do not meet these criteria should be discontinued. CONSULTATION 16. Officials from the Department of Trade and Industry have already held preliminary discussions with various industry group on the general concepts surrounding the provision of encryption services through TTPs. A more formal consultation on the Government's proposals will be undertaken by the Department of Trade and Industry with all interested parties prior to the bringing forward of legislative proposals. The Government recognises that the successful facilitation of electronic commerce through the introduction of information security services by TTPs either in the UK or in Europe, will, to a significant extent, depend on their widespread use across business. It will therefore be important to secure the broad acceptance of the business community for the Government's proposals. The Department will pay particular attention to this during the consultation process. This is a valuable commitment which is somewhat at odds with the earlier statement that the policy '... has been decided ...'. It is clear commitment by the Government to introduce an approach only if it has the support of the UK business community. Since any scheme will also have a large impact on all UK citizens, a way needs to be found to ensure that their voice is heard during the consultation process as well. This could be achieved by involving the Chartered Institutions and the Learned Societies. The Government could also do what the United States has done by commissioning an independent academic review of its proposals. These steps would help significantly in ensuring that any policy which emerges commands widespread support throughout the UK. CONCLUSION If this press release represents the *START* of a public debate in the UK about the complex balances which need to be struck in the use of encryption to secure our National Information Infrastructure (and the GII), then it has my wholehearted support and I congratulate the UK Government on its publication. If, however, it is the *END* of a debate, held behind closed doors, and is hence an attempt by the UK Government to impose an encryption solution on the people of the UK in the absence of an informed public debate about the issues involved, then I will do all that I can to frustrate its progress until such a debate has taken place. The paper leaves me uncertain about which of these scenarios is correct. I am not a crypto-anarchist, nor am I a crypto-fascist - if anything I would characterise my views as broadly crypto-liberal on the grounds that this is the only practical stance given that cryptographic knowledge and capabilities are now widespread. No-one should make the mistake of reading these comments as indicating that I am opposed to the objectives which the Government is trying to achieve. The issue is not the objectives themselves, since these would be hard to dispute, but rather the extent to which these are achievable and whether the actual gains which are likely in practice will outweigh the disadvantages which will be involved. Beyond this, however, I am firmly of the view that the people of the UK have a right to make an input *BEFORE* Government policy is set in all areas where the policy involved will have a profound impact on their well-being, their prosperity and their common interest in peace, security, freedom and justice. The security of our NII (and that of the wider GII) is just such an area where I fear that the UK Government might possibly be attempting to set a policy before any such debate has taken place. I urge everyone in the UK who reads these comments to approach their Member of Parliament to seek their assurance that no legislative action will be initiated before there has been an adequate *PUBLIC* debate of the issues involved. I urge those of you in (and associated with) the media in the UK to publicise the Government policy statement and to inform the UK public in a *BALANCED* way about the issues which need to be considered in arriving at a sensible UK policy stance. Brian Gladman, The Hague, The Netherlands, 15th June 1996. email: gladman () euronet nl http://www.euronet.nl/users/gladman/index.html Attachment Converted: C:\WINDOWS\Desktop\attachments\ukcrypol2.doc Dept. of Computing Science, University of Newcastle, Newcastle upon Tyne, NE1 7RU, UK EMAIL = Brian.Randell () newcastle ac uk PHONE = +44 191 222 7923 FAX = +44 191 222 8232 URL = http://www.cs.ncl.ac.uk/~brian.randell/
Current thread:
- IP: UK Government Launches HMS Clipper (ASCII 2 of 2) Dave Farber (Jun 18)