Presentation | 1997/3/18 Can Bypassing Lawful Access be Always Detected ? Tsutomu MATSUMOTO, Hiroshi ITOYAMA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Lawful access to enciphered plaintexts means that some law enforcement organization can decipher intercepted ciphertexts under lawful permission. We demonstrate several techniques to counter lawfully decipherable cryptographic communications. It can be very difficult to find such hidden cryptographic communications intended to bypass lawful access. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Lawful Access / Bypassing Lawful Access / Cryptography / Privacy / Key Recovery |
Paper # | IT96-87,ISEC96-79,SST96-94 |
Date of Issue |
Conference Information | |
Committee | IT |
---|---|
Conference Date | 1997/3/18(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Theory (IT) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Can Bypassing Lawful Access be Always Detected ? |
Sub Title (in English) | |
Keyword(1) | Lawful Access |
Keyword(2) | Bypassing Lawful Access |
Keyword(3) | Cryptography |
Keyword(4) | Privacy |
Keyword(5) | Key Recovery |
1st Author's Name | Tsutomu MATSUMOTO |
1st Author's Affiliation | Division of Artificial Environment Systems YOKOHAMA NATIONAL UNIVERSITY() |
2nd Author's Name | Hiroshi ITOYAMA |
2nd Author's Affiliation | Division of Artificial Environment Systems YOKOHAMA NATIONAL UNIVERSITY |
Date | 1997/3/18 |
Paper # | IT96-87,ISEC96-79,SST96-94 |
Volume (vol) | vol.96 |
Number (no) | 586 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |