TheClipper chip was achipset that was developed and promoted by the United StatesNational Security Agency (NSA) as anencryption device that secured "voice and data messages" with a built-inbackdoor that was intended to "allow Federal, State, and local law enforcement officials the ability to decode intercepted voice and data transmissions." It was intended to be adopted by telecommunications companies for voice transmission. Introduced in 1993, it was entirely defunct by 1996.
The Clipper chip used a data encryptionalgorithm calledSkipjack[1] to transmit information and theDiffie–Hellman key exchange-algorithm to distribute the public keys between peers. Skipjack was invented by theNational Security Agency of the U.S. Government; this algorithm was initiallyclassified SECRET, which prevented it from being subjected topeer review from the encryption research community. The government did state that it used an80-bit key, that the algorithm wassymmetric, and that it was similar to theDES algorithm. The Skipjack algorithm was declassified and published by the NSA on June 24, 1998. The initial cost of the chips was said to be $16 (unprogrammed) or $26 (programmed), with its logic designed byMykotronx, and fabricated byVLSI Technology, Inc.
At the heart of the concept waskey escrow. In the factory, any new telephone or other device with a Clipper chip would be given acryptographic key, that would then be provided to the government inescrow. If government agencies "established their authority" to listen to a communication, then the key would be given to those government agencies, who could then decrypt all data transmitted by that particular telephone. The newly formedElectronic Frontier Foundation preferred the term "key surrender" to emphasize what they alleged was really occurring.[2]
The Clinton Administration argued that the Clipper chip was essential for law enforcement to keep up with the constantly progressing technology in the United States.[3] While many believed that the device would act as an additional way for terrorists to receive information, the Clinton Administration said it would actually increase national security.[4] They argued that because "terrorists would have to use it to communicate with outsiders — banks, suppliers, and contacts — the Government could listen in on those calls."[4]
There were several advocates of the Clipper chip who argued that the technology was safe to implement and effective for its intended purpose of providing law enforcement with the ability to intercept communications when necessary and with a warrant to do so. Howard S. Dakoff, writing in theJohn Marshall Law Review, stated that the technology was secure and the legal rationale for its implementation was sound.[5]Stewart Baker wrote an opinion piece inWired magazine debunking a series of what he purported to be myths surrounding the technology.[6]
Organizations such as theElectronic Privacy Information Center and theElectronic Frontier Foundation challenged the Clipper chip proposal, saying that it would have the effect not only of subjecting citizens to increased and possibly illegal governmentsurveillance, but that the strength of the Clipper chip's encryption could not be evaluated by the public as its design was classified secret, and that therefore individuals and businesses might be hobbled with an insecure communications system. Further, it was pointed out that while American companies could be forced to use the Clipper chip in their encryption products, foreign companies could not, and presumably phones with strong data encryption would be manufactured abroad and spread throughout the world and into the United States, negating the point of the whole exercise, and, of course, materially damaging U.S. manufacturers en route. SenatorsJohn Ashcroft andJohn Kerry were opponents of the Clipper chip proposal, arguing in favor of the individual's right to encrypt messages and export encryption software.[7]
The release and development of several strong cryptographic software packages such asNautilus,PGP[8] andPGPfone was in response to the government push for the Clipper chip. The thinking was that if strong cryptography was freely available on the Internet as an alternative, the government would be unable to stop its use.
In 1994,Matt Blaze published the paperProtocol Failure in the Escrowed Encryption Standard.[9] It pointed out that the Clipper's escrow system had a serious vulnerability: the chip transmitted a 128-bit "Law Enforcement Access Field" (LEAF) that contained the information necessary to recover the encryption key. To prevent the software that transmitted the message from tampering with the LEAF, a 16-bithash was included. The Clipper chip would not decode messages with an invalid hash; however, the 16-bit hash was too short to provide meaningful security. Abrute-force attack would quickly produce another LEAF value that would give the same hash but not yield the correct keys after the escrow attempt. This would allow the Clipper chip to be used as an encryption device, while disabling the key escrow capability.[9]: 63 In 1995 Yair Frankel andMoti Yung published another attack which is inherent to the design and which shows that the key escrow device tracking and authenticating capability (namely, the LEAF) of one device, can be attached to messages coming from another device and will nevertheless be received, thus bypassing the escrow in real time.[10] In 1997, a group of leading cryptographers published a paper, "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption", analyzing the architectural vulnerabilities of implementing key escrow systems in general, including but not limited to the Clipper chip Skipjack protocol.[11]
The Clipper chip was not embraced by consumers or manufacturers and the chip itself was no longer relevant by 1996; the only significant purchaser of phones with the chip was the United States Department of Justice.[12] The U.S. government continued to press forkey escrow by offering incentives to manufacturers, allowing more relaxed export controls if key escrow were part of cryptographic software that was exported. These attempts were largely made moot by the widespread use of strong cryptographic technologies, such asPGP, which were not under the control of the U.S. government.
As of 2013[update], strongly encrypted voice channels are still not the predominant mode for current cell phone communications.[13][needs update] Secure cell phone devices andsmartphone apps exist, but may require specialized hardware, and typically require that both ends of the connection employ the same encryption mechanism. Such apps usually communicate over secure Internet pathways (e.g.ZRTP) instead of through phone voice data networks.
Following theSnowden disclosures from 2013,Apple andGoogle stated that they would lock down all data stored on their smartphones with encryption, in such a way that Apple and Google themselves could not break the encryption even if ordered to do so with a warrant.[14] This prompted a strong reaction from the authorities, including the chief of detectives for theChicago Police Department stating that "Apple['siPhone] will become the phone of choice for thepedophile".[15] An editorial in theWashington Post argued that "smartphone users must accept that they cannot be above the law if there is a valid search warrant", and after claiming to agree that backdoors would be undesirable, then suggested implementing a "golden key" backdoor which would unlock the data with a warrant.[16][17] The members of "The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption" 1997 paper, as well as other researchers at MIT, wrote a follow-up article in response to the revival of this debate, arguing that mandated government access to private conversations would be an even worse problem than it would have been twenty years before.[18]
{{cite web}}
: CS1 maint: url-status (link)More than 80 percent of cellphones worldwide use weak or no encryption for at least some of their calls.