A Study on the Key Recovery System

Key Recovery 시스템에 관한 고찰

  • 이임영 (순천향대학교 컴퓨터학부) ;
  • 채승철 (순천향대학교 컴퓨터학부)
  • Published : 1997.12.01

Abstract

본고에서는 현재 여러 국가와 기업에서 논의되고 있는 Key Recovery시스템이 제안된 배경과 미국에서의 시행 정책과 현황 등을 살펴보고 Key Recovery시스템을 구성하는 주요 요소와 실제 시스템의 구현시에 고려되어야 할 부분들을 보다 일반적인 관점에서 논의하고자 한다.

Keywords

References

  1. 한국통신정보보호학회지 v.4 no.4 미국의 암호정책에 관한 연구-클리퍼칩을 중심으로 한상근;이영
  2. The Risks of Key Escrow an Trusted Third-Party Encryption Hal Abelson;Ross Anderson;Steven M.Bellovin;Josh Benaloh;Matt Blaze;Whitfield Diffie;John Gilmore;Peter G.Neumann;Ronald L.Rivest;Jeffrey I.Schiller;Bruce Schneier
  3. IEEE Communications Magazine Key escrowing today Dorothy E. Denning;Miles Smid
  4. Notes from the Key Escrow Conference Prrtial Key Escrow: A New Approach to Software Key Escrow Adi Shamir
  5. Communications of the ACM Timestamps in Key Distribution Protocols Dorothy E. Denning
  6. Computer Communication The U. S. Key Escrow Encryption Technology Dorothy E. Denning
  7. IEEE Transacions on Information Theory A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms T. ElGamal
  8. IEEE Communications Magazine An Overview of public key Cryptography M. Hellman
  9. Interagency Working Group on Cryptographic Policy, Enabling Privacy, Commerce, Security, and Public Safety in the Global Information Infrastructure
  10. SKIPJACK Review Interim Report
  11. The White House;Office of the Press Secretary;Statement of the Press Secretary
  12. The White House;Office of the Press Secretary;Statement of the Press Secretary
  13. The White House;Office of the Vice President;Statement of the Vice President
  14. TIS Report #541 Trusted Information Systems, Commercial Key Escrow : Something for Everyone, Now and for the Future
  15. Communications of ACM v.39 no.3 A Taxonomy for Key Escrow Encryption Systems D. Denning;D. Brandstad
  16. Building Big Brother Fair Crytposystems Silvio Micali;L. Hoffman(ed.)