The (Revived) Encryption War Continues

**The Latest:**

[As Encryption Spreads, U.S. Grapple with Clash between Privacy, Security](http://www.washingtonpost.com/world/national-security/as-encryption-spreads-us-worries-about-access-to-data-for-investigations/2015/04/10/7c1c7518-d401-11e4-a62f-ee745911a4ff_story.html?wprss=rss_national-security) – Ellen Nakashima and Barton Gellman writing in The Washington Post reveal that federal officials are considering a variety of means of ensuring access to encrypted communications, including split key approaches, as well as, in certain circumstances, mirror accounts. Under the split key approach (difficult from an engineering and cryptography standpoint), a technology company creates a decryption key that is split into pieces, with different pieces held by different parties, and all of the pieces are needed for decryption. But even aside from the question of trust in the holders of the key parts, risk of disclosure of the decrypted information and the like, as security expert/researcher, Dino A. Dai Zovi (@dinodaizovi) tweeted: “The big question of the #cryptodebate isn’t whether vendors can make a decryption key for USG, but what happens when other [governments] want it too?”

[How Do We Build Encryption Backdoors?](http://blog.cryptographyengineering.com/2015/04/how-do-we-build-encryption-backdors.html) – Professor Matthew Green (Johns Hopkins) analyzes the problems with building encryption backdoors, including split key approaches, at his [A Few Thoughts on Cryptographic Engineering](http://blog.cryptographyengineering.com/) blog

[You Can’t Backdoor a Platform](http://webpolicy.org/2015/04/28/you-cant-backdoor-a-platform/) – Jonathan Mayer at his Web Policy blog

**Background – 2014-15, the Crypto Wars Return**

[James Comey, F.B.I. Director, Hints at Action as Cellphone Data Is Locked](http://www.nytimes.com/2014/10/17/us/politics/fbi-director-in-policy-speech-calls-dark-devices-hindrance-to-crime-solving.html) – The New York Times, and [FBI director Attacks Tech Companies for Embracing New Modes of Encryption; James Comey says Data Encryption Could Deprive Police and Intelligence Agencies of Potentially Live-saving Information](http://www.theguardian.com/us-news/2014/oct/16/fbi-director-attacks-tech-companies-encryption) – The Guardian

[Apple Will No Longer Unlock Most iPhones, iPads for Police, even with Search Warrants](http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html) – The Washington Post

[iPhone Encryption and the Return of the Crypto Wars](https://www.schneier.com/blog/archives/2014/10/iphone_encrypti_1.html) – Bruce Schneier

[What NSA Director Mike Rogers Doesn’t Get About Encryption](http://www.cato.org/blog/what-nsa-director-mike-rogers-doesnt-get-about-encryption) – Julian Sanchez at CATO

[What President Obama is getting wrong about encryption](http://www.washingtonpost.com/blogs/the-switch/wp/2015/02/19/what-president-obama-is-getting-wrong-about-encryption/) – The Washington Post

[The FBI Keeps Demanding Impossible Solutions to Its Encryption Problem](http://motherboard.vice.com/read/the-fbi-keeps-demanding-impossible-solutions-to-its-encryption-problem) – MotherBoard/Vice

**Background – the 1990’s (and earlier) Crypto Wars**

[Keeping Secrets: Four Decades Ago, University Researchers Figured out the Key to Computer Privacy, Sparking a Battle with the National Security Agency that Continues Today.](https://medium.com/stanford-select/keeping-secrets-84a7697bf89f) – Henry Corrigan-Gibbs (Stanford Magazine)

[Encryption and Globalization](http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1960602) – a 2011 academic paper (Columbia Science and Technology Law Review, Vol. 23, 2012) by Peter Swire and Kenesa Ahmad, which includes a brief summary of the original 90’s “Crypto Wars”

[Crypto Wars](http://en.wikipedia.org/wiki/Crypto_Wars) – Wikipedia

[Hacker Lexicon: What is End-to-End Encryption](http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption/) – Wired

**Related**

[Want to Protect your Phone from the Cops? You Might Want to Use a Passcode, Not a Fingerprint; Virginia Court Rules Using Fingerprint Technology to Protect Your Phone Doesn’t Carry Same Legal Rights as Passcodes](http://www.fastcompany.com/3037912/want-to-protect-your-phone-from-the-cops-you-might-want-to-use-a-passcode-not-a-fingerprint) – FastCompany