Jump to content

Key escrow: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Undid revision 169055099 by Katana0182 (talk) Removed sarcastic comments.
SmackBot (talk | contribs)
m Date/fix the maintenance tags or gen fixes using AWB
Line 1: Line 1:
{{POV Check}}
{{POV-check|date=December 2007}}
'''Key escrow''' (also known as a '''fair cryptosystem''') is an arrangement in which the keys needed to decrypt [[encryption|encrypted]] data are held in [[escrow]] by a third party, so that someone else can obtain them to decrypt messages.
'''Key escrow''' (also known as a '''fair cryptosystem''') is an arrangement in which the keys needed to decrypt [[encryption|encrypted]] data are held in [[escrow]] by a third party, so that someone else can obtain them to decrypt messages.



Revision as of 17:58, 10 December 2007

Key escrow (also known as a fair cryptosystem) is an arrangement in which the keys needed to decrypt encrypted data are held in escrow by a third party, so that someone else can obtain them to decrypt messages.

The technical problem is a largely structural one since access to protected information must be provided only to the intended recipient and at least one third party. The third party should be permitted access only under carefully controlled conditions, as for instance, a court order. Thus far, no system design has been shown to meet this requirement fully on a technical basis alone. All proposed systems also require correct functioning of some social linkage, as for instance the process of request for access, examination of request for 'legitimacy' (as by a court), and granting of access by technical personnel charged with access control. All such linkages / controls have serious problems from a system design security perspective.

On a national level, this is controversial in many countries due to technical mistrust of the security of the escrow arrangement (due to a long history of less than adequate protection of others' information by assorted organizations, public and private, even when the information is held only under an affirmative legal obligation to protect it from unauthorized access), and to a mistrust of the entire system even if it functions as designed. Thus far, no key escrow system has been designed which meets both objections and nearly all have failed to meet even one.

See also


This article is based on material taken from the Free On-line Dictionary of Computing prior to 1 November 2008 and incorporated under the "relicensing" terms of the GFDL, version 1.3 or later.