Lately, as criminals and terrorists have used encryption technology to frustrate law enforcement and national security, there has been political discussion of whether encryption technologies should be required to have a back door for law enforcement.
One objection to this proposal is that such a backdoor might be used wrongly. Apple CEO Tim Cook said, "But the reality is if you put a back door in, that back door's for everybody, for good guys and bad guys."
Without addressing the larger political question of whether law enforcement ought to have back door access, I'd like to propose a technical solution to the "bad guys" problem.
The backdoor doesn't open with a single key. It takes 100 keys to unlock, and each key is known only to a small group of people. In order for the bad guys to access encrypted communication through the back door, they need copies of all 100 keys. So long as at least one of the 100 key-holding groups successfully protects its secret key and uses it only when they are supposed to, the bad guys are out of look.
In addition, you retire and replace one key pair every day. (Staggered. Over the course of 100 days, all 100 keys are replaced.) Even if a bad guy manages to get copies of all 100 keys, he would be able to read that day's communications only. The next day's communications would use a new key that would lock him out again.
Would this system be practical? Would it be secure?
One objection to this proposal is that such a backdoor might be used wrongly. Apple CEO Tim Cook said, "But the reality is if you put a back door in, that back door's for everybody, for good guys and bad guys."
Without addressing the larger political question of whether law enforcement ought to have back door access, I'd like to propose a technical solution to the "bad guys" problem.
The backdoor doesn't open with a single key. It takes 100 keys to unlock, and each key is known only to a small group of people. In order for the bad guys to access encrypted communication through the back door, they need copies of all 100 keys. So long as at least one of the 100 key-holding groups successfully protects its secret key and uses it only when they are supposed to, the bad guys are out of look.
In addition, you retire and replace one key pair every day. (Staggered. Over the course of 100 days, all 100 keys are replaced.) Even if a bad guy manages to get copies of all 100 keys, he would be able to read that day's communications only. The next day's communications would use a new key that would lock him out again.
Would this system be practical? Would it be secure?