翻訳と辞書
Words near each other
・ Key Club (disambiguation)
・ Key Club (film)
・ Key Club (jazz club)
・ Key Club Recording Company
・ Key clustering
・ Key code
・ Key Code Qualifier
・ Key Colony (condominium)
・ Key Colony Beach, Florida
・ Key control
・ Key date
・ Key deer
・ Key demographic
・ Key derivation function
・ KEY Difference
Key disclosure law
・ Key distribution
・ Key distribution center
・ Key distribution in wireless sensor networks
・ Key Elementary School
・ Key encapsulation
・ Key Energy Services
・ Key escrow
・ Key Exchange
・ Key exchange
・ Key Falls
・ Key feedback mode
・ Key Field Air National Guard Base
・ Key figures in the Green Party of England and Wales
・ Key finder


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Key disclosure law : ウィキペディア英語版
Key disclosure law

Key disclosure laws, also known as mandatory key disclosure, is legislation that requires individuals to surrender cryptographic keys to law enforcement. The purpose is to allow access to material for confiscation or digital forensics purposes and use it either as evidence in a court of law or to enforce national security interests. Similarly, mandatory decryption laws force owners of encrypted data to supply decrypted data to law enforcement.
Nations vary widely in the specifics of how they implement key disclosure laws. Some, such as Australia, give law enforcement wide-ranging power to compel assistance in decrypting data from any party. Some, such as Belgium, concerned with self-incrimination, only allow law enforcement to compel assistance from non-suspects. Some require only specific third parties such as telecommunications carriers, certification providers, or maintainers of encryption services to provide assistance with decryption. In all cases, a warrant is generally required.
== Theory and countermeasures ==
Mandatory decryption is technically a weaker requirement than key disclosure, since it is possible in some cryptosystems to prove that a message has been decrypted correctly without revealing the key. For example, using RSA public-key encryption, one can verify given the message (plaintext), the encrypted message (ciphertext), and the public key of the recipient that the message is correct by merely re-encrypting it and comparing the result to the encrypted message. Such a scheme is called ''undeniable'', since once the government has validated the message they cannot deny that it is the correct decrypted message.〔Desmedt, Yvo and Burmester, Mike and Seberry, Jennifer. Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Florida State University Department of Computer Science 206 Love Building FL 32306-4530 Tallahassee USA. Lecture Notes in Computer Science: Public Key Cryptography, pp.277-286. 2001. ((Postscript) ), ((Postscript 2) )〕
As a countermeasure to key disclosure laws, some personal privacy products such as BestCrypt, FreeOTFE, and TrueCrypt have begun incorporating deniable encryption technology, which enable a single piece of encrypted data to be decrypted in two or more different ways, creating plausible deniability.〔(Plausible Deniability )〕〔(TrueCrypt - Hidden Volume )〕 Another alternative is steganography, which hides encrypted data inside of benign data so that it is more difficult to identify in the first place.
A problematic aspect of key disclosure is that it leads to a total compromise of all data encrypted using that key in the past or future; time-limited encryption schemes such as those of Desmedt et al.〔 allow decryption only for a limited time period.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Key disclosure law」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.