gilc logo

New Spanish telecommunications law opens a door to
mandatory key recovery systems

 

Global Internet Liberty Campaign Member Statement

July 1998

Synopsis

A recently enacted telecommunications law in Spain gives a right to use "strong cryptography systems" to Spanish citizens. However, the new law also implies that some goverment agencies may have access to encrypted communications, by means of mandatory key recovery system in which private keys of Spanish citizens would be stored by the government agencies.

Such a system would have several problems:

1) Key recovery compromises privacy - a right incorporated within the Spanish data protection law, known as Lortad.

2) Instead of enhancing crime detection, key recovery would increase the opportunities for crime.

3) Key recovery poses a serious menace to the development of electronic commerce.

These problems arise from a common source: Any cryptographic system that implies the existence of a third party that stores private keys is inherently insecure.

 

Introduction

The Global Internet Liberty Campaign is a group of human rights, civil liberties, and Internet advocacy organisations which favours the unrestricted use of cryptography to protect personal private communications. We consider that article 52 annex 2 of the Spanish Telecommunications Law 1998 devoted to cryptography may easily lead to a mandatory key recovery system in Spain. We believe that, this new initiative would pose serious problems both to privacy and to the development of electronic commerce in Spain.

Encryption is usually viewed as something only related only to the military defence field, spies and criminals. However they are the basis of a secure communication system which is vital both for privacy and electronic commerce. Therefore, they are increasingly integrated into commercial systems and applications.

They are also needed increasingly for the infrastructure of networking. For instance, systems that synchronize and exchange administrative information on the Internet are starting to use encryption to prevent malicious intruders from disrupting the Internet.

Also, cryptography has historically been associated with extreme, contentious situations like crime and war. However, nowadays the overwhelming use of encryption is during routine interactions between individuals and business organizations. For instance, credit card numbers and other transaction information is encrypted;so are reports by a salesperson about a customer to his or her central office. Also, encryption technology over the Internet is increasingly used for privacy reasons, that is to ensure that only the selected person or the audience are the ones that would be able to read a message, and no one else. As a matter of fact, the use of cryptography would create the equivalent of a sealed envelope. Therefore sending a simple e-mail would be like sending a postcard and the only way to seal and secure the postcard is to use strong encryption tools without a back door mechanism (key escrow or key recovery). If our cryptographic systems are crippled with this kind of gadgets, then there is always a third party that, if desired is able to sneak at our private mail, and therefore, e-mail is a lot less secure or confident.

We don't mean to state that strong cryptography without backdoors or key recovery systems are 100% secure. Nothing is 100% secure. Depending on the algorithm used, the lenght of the key and the technical devices at hand, an specific message can be deciphered. On the other hand, as it is going to be stablished later in the paper, trusted third parties or backdoor systems turns cryptography in something a lot more insecure. As Bruce Schneier -a leading cryptography researcher and author of "Applied Cryptography"- stated, it is impossible to meet the needs of both law enforcers and industry. We can't have both fairly secure encryption and the enforcer's ability to snoop from time to time into some one else's mail.

However, Article 52 of the new Spanish Telecommunications Law 1998 opens the door to a mandatory key recovery system.

Following international agreements, such as the European Convention on Human Rights (article 8) and the Spanish data protection laws known as LORTAD, the newly enacted Spanish Telecommunications Act guarantees the privacy of communications, and even the right to use strong cryptography, as stated in the main paragraph of article 52 (the complete text of the law can be read in Spanish at http://www.asertel.es/cs/08017002.htm):

"Any kind of information that is transmitted using telecommunication networks can be protected by means of encryption procedures".

However, article 52 (2) claims that:

"Among their conditions of use, when it (encryption) is used to protect the confidentiallity of information, an obligation could be imposed to notify either a General Administration body, or a public organisation about the algorithm or whatever encryption procedure is used, with an effect to control it following prevailing normatives. This obligation will affect all the developers which incorporate cryptography in their equipments or devices, the operators that include it in their networks or in the services they offer, and, if applicable, to the users that employ it"

(Spanish text) "Entre sus condiciones de uso, cuando se utilice para proteger la confidencialidad de la informacion, se podra imponer la obligacion de notificar, bien a un organo de la Administracion General del Estado o a un organismo publico, los algoritmos o cualquier procedimiento de cifrado utilizado, a efectos de su control de acuerdo con la normativa vigente. Esta obligacion afectara a los fabricantes que incorporen el cifrado en sus equipos o aparatos, a los operadores que lo incluyan en las redes o dentro de los servicios que ofrezcan y, en su caso, a los usuarios que lo empleen".

However, the general reference to "procedure" can be easily used to establish another specific law to create a mandatory key recovery system. That is, every user who gets encryption software must give his or her private key to a "trusted third party" which would be a goverment body, according to the text of the new Spanish law.

According to law enforcement forces, mandatory key recovery systems are a must to avoid criminal activities over the Internet. From this point of view, leaving our private keys to a trusted third party is a way to avoid the great danger of computer crime by putting a negligible risk to our privacy in computer networks.

Nevertheless, this argument has several flaws:

First, a recent European Commision Communication paper stated that "most of the (few) criminal cases involving encryption that are quoted as examples for the need of regulation concern 'professional' use of encryption. It seems unlikely that in such cases the use of encryption could be effectively controlled by regulation." (see EU Communication paper)

We, the undersigned members of the GILC have disputed the argument on several occasions, finding no evidence that criminal or terrorist rings cannot be broken through more traditional means of law enforcement such as examination of the evidence, use of informers, and so on.

Second, the risk of mandatory key recovery systems is not negligible at all. Inevitably, these systems introduce vulnerabilities into cryptographic protocols, creating opportunities for insider abuse and criminal attack (See also EU Communication paper). Public officers of the Spanish goverment would hold the private keys within a centralized infrastructure that will become a highly attractive target for criminals. And these potential criminals will not only be hackers trying to break from outside, but also possibly corrupted officers that could sell the private keys to racketeers, or even use themselves in criminal actions. Moreover, centralized databases of private keys are a great temptation to individuals in the enforcement bodies to sneak a look at private communications without the need of a legal warrant to do so. Mandatory key recovery systems are a great temptation for different kinds of abuse, and it is a tempation difficult to refuse once the private keys are available to third parties.

Using private enterprises to hold the private keys, as it is planned to do, for example, in the United Kingdon, is not a solution. These systems have the same flaws that a public body may have, and therefore will turn electronic communications into something inherently insecure.

The recent police raid against the hacker network Hispack showed how easily Spanish goverment computers and private e-mail can be accessed. If any of them had stored private keys, they may had ended in hands of criminals, which then could have used the keys and the confidential information obtained through e-mail for criminal purposes.

Also, cases like the thief of confidental military documents by Colonel Perote in CESID show how corrupted officials which steal secrets are more than a possibility.

Third, once the danger of abuse is stated, mandatory key recovery systems pose non trivial problems to electronic commerce. The users will not employ commercial systems in the Internet as massively as they would do in other circumstances, due to the fear that confidential information -like their credit card number- may end in hands of racketeers.

Fourth, criminals and terrorists are not going to be stopped by this newly introduced Spanish law. Developing a cryptographic program is not so difficult. As a matter of fact, there are hundreds of them over the Internet now. Criminals could easily get encryption software illegaly, in the same way they get weapons or drugs, and use it without notifying the private key to any public body. Only the good citizens would store the private keys in a centralized computer, with a significant risk to their privacy, while terrorists and criminals would use cryptography without any worries.

Moreover, by hiding a message within a larger innocent message or in a picture attached to it (a practice known as steganography) criminals could avoid being detected in their use of illegal encryption.

Fifth, article 52 of the new law is contradictory. After all, there is no sense in stating that every Spanish citizen has the right to encrypt their communications and then producing a mandatory key recovery system. The only reason to use cryptography is to make private communication really private. If some third party can also read our private messages if desired, there is no reason at all to use encryption or to believe that encrypted communications are secure.

Sixth, article 52 is also in contrast with recent global initiatives. We already mentioned the EU Communication paper released in October 1997, and titled "Towards a European Framework for Digital Signatures and Encryption". This paper finds key recovery systems to be inefficient and ineffective. The EU communication states that "the European Union simply cannot afford a divided regulatory landscape in a field so vital for the economy and society". The EU developments are important and would have a direct effect in Spain.

It is also of interest to observe how last month a U.S. government panel (known as the Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure) has failed in a two-year effort to design a federal computer security system which included "back doors," a feature that poses similar treats to cryptography. The 22-member panel appointed by the secretary of commerce in 1996 concluded at a meeting last month that there were serious technical problems that would develop a system both insecure and not meeting police expectations.

Alan Davidson staff counsel at the Center for Democracy and Technology, a nonprofit advocacy group stated that:

"The administration keeps spending taxpayer money to pursue a ... strategy that's wrong-headed and won't protect security," Davidson said. "Its own advisory committee can't answer basic questions about how to make it work for the government, yet they continue to push for its adoption by everyone, worldwide."

OECD Guidelines and policies announced in 1997 lean away from what the newly enacted Spanish Telecommunications law states. A recent OECD report stated that:

"National cryptography policies may allow lawful access to plaintext, or cryptographic keys, of encrypted data," but immediately reiterated that "These policies must respect the other principles contained in the guidelines to the greatest extent possible" and, "This principle should not be interpreted as implying that governments should, or should not, initiate legislation that would allow lawful access."

As a matter of fact, restrictions to cryptography have been debated from five years in the US, for several years in France, and recently in Canada, Germany, or Australia. If restrincting encryption techniques are such a good idea, why no democratic country has been able so far to make a coherent law to put them into practice?

Confusion exists among some members of the public about the difference between key recovery and another type of service that is very important for online commerce and communication, the certificate authority.

Certificate authorities are organizations that guarantee the identities of online correspondents. Just as you trust a check from a bank you know or a letter on an agency's letterhead, you can trust that a person really is who he claims to be if a certificate authority vouches for him. Certificate authorities are expected to become common and to vastly increase the viability of digital interactions, should governments permit unfettered encryption.

However, it is important to realize that certificate authorities are unrelated to key escrow. In the current public-key systems used for most encryption, certificate authorities hold the correspondents' public keys. There is no reason for a certificate authority to hold private keys, and they would become security risks if they did so.

Because of the heavy responsibility shouldered by certificate authorities, there may be a government role in licensing them for purposes of quality assurance. But there is also a risk that governments will force certificate authorities to hold private keys and become trusted third parties, which is a distortion of their role and has no technical justification.

On the other hand, GILC released the first comprehensive review of cryptography policies around the globe in a report entitled "Cryptography and Liberty: An International Survey of Encryption Policy" in February 1998. The purpose of the survey conducted by EPIC was to determine whether countries are limiting the availability of new technologies that are used by Internet users and others to protect personal privacy. According to the GILC report, most countries in the world do not have controls on the use of cryptography. "In the vast majority of countries, cryptography may be freely used, manufactured and sold without restriction." The report says that recent trends in cryptography policy suggest greater liberalisation in the use of this technology, which was originally controlled during the Cold War for reasons of national security.

Conclusion

Strong encryption technology without mandatory key recovery systems offers the only protection to those who seek to bring official abuses of power to light. Also, It is the only efficient system to generate a communication system which acomplishes privacy requisites and is used in electronic commerce that is really secure and trustable.

The GILC Members have urged national goverments not to adopt controls on cryptographic technology on several ocasions. Most recently, we released statements criticising the encryption policies of the British and Canadian governments. We believe that the same arguments apply in Spain and should persuade the Spanish goverment to close the door they have opened to mandatory key recovery systems by approving article 52 in its newly adopted Telecommunications Law.

When formulating policies with respect to the Internet, respect for the privacy of communications on the Internet should be guaranteed by:

- Ensuring that personal information generated on the Internet for one purpose is not used for an unrelated purpose or disclosed without the person's informed consent;

- Enabling individuals to review personal information on the Internet and to correct inaccurate information;

- Providing privacy measures for information regarding on-line bussiness transactions as well as content; and

- Allowing users of the Internet to encrypt their communications and information without restriction.

Therefore, the undersigned members of the GILC believe that policies concerning cryptography should be based on the fundamental right to engage in private communication. We oppose efforts that would lead to the development of communication infrastructure designed for surveilance. To conclude, we do state that mandatory key recovery policies would make Spain and any other country a second-class nation for the development of electronic commerce and Information Age.

Signed by the following members of the Global Internet Liberty Campaign

Associazione per la Libertà nella Comunicazione Elettronica Interattiva (ALCEI)
http://vivaldi.nexus.it/altri/alcei/index.html

CITADEL EF France
http://www.citadeleff.org

CommUnity
http://www.community.org.uk/

Computer Professional for Social Responsibility
http://www.cpsr.org

Cyber-Rights & Cyber-Liberties (UK)
http://www.leeds.ac.uk/law/pgs/yaman/yaman.htm

Derechos Human Rights
http://www.derechos.org

Digital Citizens Foundation Netherlands)
http://www.db.nl

Electronic Frontier Foundation
http://www.eff.org

Electronic Frontier Canada
http://www.efc.ca/

Electronic Frontiers Australia
http://www.efa.org.au/

Electronic Frontiers Spain (FrEE)
http://www.arnal.es/free/

Electronic Frontiers Texas
http://www.eftexas.org

Electronic Privacy Information Center
http://www.epic.org

Equipo Nizkor
http://www.derechos.org/nizkor

Foerderkreis Informationstechnik und Gesellschaft (FITUG) e.V.
http://www.fitug.de/

Imaginons un Réseau Internet Solidaire (IRIS)
http://www.iris.sgdg.org

Privacy International
http://www.privacy.org/pi/

quintessenz user group
http://www.quintessenz.at