Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).
NIST Authors in Bold
|Author(s):||Miles E. Smid;|
|Title:||Escrowed Encryption Standard|
|Published:||February 09, 1994|
|Abstract:||[Withdrawn October 19, 2015] This standard specifies an encryption/decryption algorithm and a Law Enforcement Access Field (LEAF) creation method which may be implemented in electronic devices and used for protecting government telecommunications when such protection is desired. The algorithm and the LEAF creation method are classified and are referenced, but not specified, in the standard. Electronic devices implementing this standard may be designed into cryptographic modules which are integrated into data security products and systems for use in data security applications. The LEAF is used in a key escrow system that provides for decryption of telecommunications when access to the telecommunications is lawfully authorized.|
|Citation:||Federal Inf. Process. Stds. (NIST FIPS) - 185|
|Keywords:||Cryptography, Federal Information Processing Standard, encryption, key escrow system, security|
|Research Areas:||Computer Security, Federal Information Processing Standards|
|PDF version:||Click here to retrieve PDF version of paper (260KB)|