
DR. CLINTON C. BROOKS
NATIONAL SECURITY AGENCY
TESTIMONY BEFORE THE
HOUSE SCIENCE, SPACE AND TECHNOLOGY COMMITTEE'S
TECHNOLOGy, ENVIRONMENT, AND AVIATION SUBCOMMITTEE
MAY 3, 1994




Good afternoon. I am pleased to have the opportunity to speak with you 
about NSA's views on encryption and its involvement with the 
Administration's key escrow encryption program which encourages the use 
of the government designed encryption microcircuits, commonly referred 
to as CLIPPER chips. These microcircuits, or chips, provide high quality 
privacy protection, but also enable law enforcement organizations, when 
lawfully authorized, to obtain the key that unlocks the 
encryption and thereby maintain the present ability to conduct 
electronic surveillance. The President's program advances two 
seemingly conflicted interests -- preserving critical law enforcement 
capabilities, on the one hand, and providing excellent 
information systems security, on the other. I will discuss NSA's role in 
support of this program and NSA's interests with respect 
to the President's program.



NSA's Role In the President's Initiative



Our role in support of this initiative has been that of a technical 
advisor to the National Institute of Standards and 
Technology (NIST) and the FBI.



As the nation's cryptographic experts and signals intelligence (SIGINT) 
authority, NSA has long had a role to advise 
other government organizations on issues that relate to the security of 
communications systems or the conduct of


electronic surveillance. Our function as an advisor in the field of 
information security became more active with the passage of the 
Computer Security Act of 1987. The Act authorizes the National Bureau of 
Standards (now NIST) to draw upon the technical 
advice and assistance of NSA. It also provides that NIST must draw upon 
NSA's computer system technical security guidelines 
to the extent that NIST determines such guidelines to be consistent with 
the requirements for protecting sensitive information in 
federal computer systems. This statutory framework is the basis for 
NSA's involvement with the key escrow program.

Subsequent to the passage of the Computer Security Act, NIST and NSA 
formally executed a memorandum of understanding (MOU) that created a 
Technical Working Group to facilitate our interactions. The FBI, though 
not a signatory to the MOU, regularly participated in the working group 
meetings. The FBI recognized that certain technologies posed a threat to 
law enforcement capabilities in this country. Specifically, the FBI 
realized that the use of encryption and other technologies in 
communications and computer systems could prevent effective use of court 
authorized wiretaps, a critical weapon in their fight against crime and 
criminals. In subsequent discussions, the FBI and NIST sought our 
technical advice and expertise in cryptography to develop a means to 
allow for the proliferation of robust encryption technology without 
sacrificing law enforcement's current capability to access 
communications under lawfully authorized conditions.



We developed a theoretical key escrow concept and then undertook a 
research and development program to demonstrate that it could be 
implemented. The program led to the development of two microcircuits or 
chips. The first was an allpurpose chip with encryption, public key 
exchange, digital signature, and hashing functions. The second contained 
the encryption function only and was designed for use in devices in 
which digital signature and hashing are not needed and key exchange is 
provided by some means outside the chip.

2


Throughout the design and development of the key escrow encryption 
system, we placed an emphasis on providing for the protection of users' 
privacy. We focused on ways in which we could preserve law enforcement's 
existing capabilities without undermining privacy rights and protections 
embodied in current law.



One of the technical solutions to these privacy concerns is the split 
escrowed key. All chips have been designed to be programed with their 
own identification number and a unique key that could be used to unlock 
the encryption. Because the chip-unique keys can be used to unlock the 
encryption, we also devised a means to split the keys and to keep each 
part with a different custodian. Neither part is useful without the 
other. The parts of each chip's unique key are separately escrowed with 
two trusted custodians at the time the chip is programmed. Thus, when 
law enforcement officials conduct a court-authorized wiretap and 
encounter this encryption, they can identify the chip being used and, 
with the court authorization, obtain the corresponding chip-
unique key components from each of the custodians. This concept of 
splitting the key into two or more parts is a sound security technique 
which provides a safeguard against unlawful attempts to obtain keys and 
illegal access to protected communications. This also provides security 
against the risk that a single custodian might lose control of the keys, 
making the corresponding chips vulnerable to decryption.



In addition to splitting the key, the system has been designed so that 
the chipunique key components are encrypted. Neither the custodians nor 
law enforcement of officials know even a portion of the unique keys. The 
unique keys are only decrypted in a special device used to decrypt 
communications encrypted with key escrow chips. These devices are, of 
course, kept under strict control to ensure they are used only in 
connection with authorized wiretaps.

3


The U.S., with its key escrow concept, is presently the only country 
proposing a technique that provides its citizens very good privacy 
protection while maintaining the current ability of law enforcement 
agencies to conduct lawful electronic surveillance. Other countries are 
using government licensing or other means to restrict the use of 
encryption. We have gone to great lengths to provide for both individual 
privacy and law enforcement interests, and I think we have developed the 
best technical approach possible. When you consider that most people 
currently use no encryption, the key escrow encryption concept 
presents a system that actually enhances privacy protections. Widespread 
use of CLIPPER will make it easy for people to take advantage of the 
benefits offered by high quality encryption.



NSA's INFOSEC INTERESTS



NSA has a mission to devise security techniques for government 
communications and computer systems that process classified information 
or are involved in certain military or intelligence activities. In 
keeping with the Computer Security Act of 1987, we also make available 
to NIST the benefits of our security expertise so they can, as 
appropriate, use it to promulgate the security standards applicable to 
the systems under their purview, i.e. federal systems that process 
sensitive unclassified information. Through our support of NIST and the 
promulgation of standards for federal systems, we advance a goal we all 
share -- assuring that Americans have available to them the products 
they need to secure their communications and computer 
systems.



The NSA Information Systems Security, or INFOSEC, organization is 
constantly working to understand the threats to information systems and 
to devise new or improved methods to protect against those threats. 
While most of us only consider the security of our systems when there is 
a much publicized case of computer hacking or intercepted cellular 
calls, NSA's INFOSEC people recognize the

4


                        





threats are ever present. They possess a unique sensitivity to the 
nature and the extent of these threats. They combine this 
sensitivity and awareness of the threats with insights into information 
system vulnerabilities to form the foundation for building 
information systems security products. NSA has applied this knowledge 
and unrivaled cryptographic expertise for over 40 years 
in designing security products for U.S. communications and information 
systems that are second to none.



Key escrow technology advances our INFOSEC interests. For one thing, the 
key escrow encryption microcircuits provide excellent security -- 
better, by far, than the Data Encryption Standard (DES). We will use 
these chips in products to secure information systems for which we are 
responsible. I1D the extent that we can use commercial technology as a 
basis for securing these systems, the cost to all users will decline and 
the likelihood of use will go up. We are also pleased to see such 
robust security available for voluntary use by all Americans. Moreover, 
widespread use of these products will enhance the interoperability of 
systems among all users. All of this is to the good of INFOSEC concerns.



NSA's VIEWS ON ENCRYPTION EXPORTS


From a signals intelligence standpoint, we are only concerned with the 
use of encryption by targets of our foreign intelligence efforts. 
Clearly, the success of NSA's intelligence mission depends on our 
continued ability to collect and understand foreign communications. 
Encryption, a technique for scrambling communications so that unintended 
recipients cannot understand their contents, can disrupt our ability to 
produce foreign signals intelligence. Controls on encryption exports are 
important to maintaining our capabilities.



At the direction of the President in April, 1993, the A lministration 
spent ten months carefully reviewing its encryption policies, with 
particular attention to those

5


issues related to export controls on encryption products. The 
Administration consulted with many industry and private sector 
representatives and sought their opinions and suggestions on the entire 
encryption export control policy and process. As a result of this 
review, the Administration concluded that the current encryption export 
controls are in the best interest of the nation and must be maintained, 
but that some changes should be made in the export licensing process in 
order to maximize the exportability of encryption products and to reduce 
the regulatory burden on exporters. These changes will greatly ease the 
licensing process and allow exporters to more rapidly and easily export 
their products.


In addition, the Administration agreed at the urging of industry that 
key escrow encryption products would be exportable. Our announcement 
regarding the exportability of key escrow encryption products has caused 
some to assert that the Administration is permitting the export of key 
escrow products while controlling competing products in order to force 
manufacturers to adopt key escrow technology. These arguments are 
without foundation.



Many non-key escrow encryption products have long been licensed for 
export. Such products will continue to be approved for export 
notwithstanding the fact that key escrow encryption products are 
becoming available. Moreover, we will continue to review proposed 
exports of new encryption products and will license them for export in 
any case in which the export is consistent with national interests. 
Finally, as I mentioned earlier, the Administration is in the process of 
implementing reforms of the licensing process to speed licensing and 
reduce the licensing burdens on encryption exporters. These reforms will 
benefit exporters of key escrow and nonkey-escrow encryption alike. In 
short, we are not using or intending to use export controls to 
force vendors to adopt key escrow technology.

6


CONCLUSION


In conclusion, I believe the President's key escrow encryption 
initiative is a well-reasoned and equitable response to a very difficult 
set of issues. It accommodates users' interests in privacy and system 
security and maintains the law enforcement interest to unlock encryption 
when lawfully authorized. The procedures for escrowing key are being 
developed to ensure the security of the devices is not compromised by 
the escrow system. Though there remain some details to be defined, I am 
confident they will be worked out very quickly, so that the President's 
initiative can be implemented.


I would be pleased to answer any questions you may have.

7

