On Backdoors and Encryption
September 6, 2013
There is a general myth that the “geeks” defeated the Feds in the “crypto wars” of the 1990s, blocking efforts to prevent the sale and export of advanced encryption products. This is an article of faith with some people, particularly on the West Coast, and if you interview them you will get this story presented as an accurate account of what happened.
In fact, through mis-implementation, it might be much less. A company may say it uses a “random number generator” but truly random number generators are hard to build. One company dealt with the problem by using a fixed list of numbers from which they randomly selected. These design errors are detectable and provide a way in.
In the U.S. this effort to deal with encryption began in the mid 1990s, when it was clear that the newly commercialized internet would need to be made more secure. The Clinton Administration, yielding in part to political pressure, decided that the short term loss of intelligence that would occur if encryption was “decontrolled” would be offset by the benefit to U.S. security from making American companies harder to penetrate and help U.S. companies be more competitive. When the United States released encryption, it hoped that it would be used widely, making the internet safe from all but a handful of opponents. This widespread use did not occur – in this the first internet security policy failed, something we continue to pay for.
Commentary is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).
© 2013 by the Center for Strategic and International Studies. All rights reserved.






