Presentation 1997/3/18
Can Bypassing Lawful Access be Always Detected ?
Tsutomu MATSUMOTO, Hiroshi ITOYAMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Lawful access to enciphered plaintexts means that some law enforcement organization can decipher intercepted ciphertexts under lawful permission. We demonstrate several techniques to counter lawfully decipherable cryptographic communications. It can be very difficult to find such hidden cryptographic communications intended to bypass lawful access.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Lawful Access / Bypassing Lawful Access / Cryptography / Privacy / Key Recovery
Paper # IT96-87,ISEC96-79,SST96-94
Date of Issue

Conference Information
Committee IT
Conference Date 1997/3/18(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Theory (IT)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Can Bypassing Lawful Access be Always Detected ?
Sub Title (in English)
Keyword(1) Lawful Access
Keyword(2) Bypassing Lawful Access
Keyword(3) Cryptography
Keyword(4) Privacy
Keyword(5) Key Recovery
1st Author's Name Tsutomu MATSUMOTO
1st Author's Affiliation Division of Artificial Environment Systems YOKOHAMA NATIONAL UNIVERSITY()
2nd Author's Name Hiroshi ITOYAMA
2nd Author's Affiliation Division of Artificial Environment Systems YOKOHAMA NATIONAL UNIVERSITY
Date 1997/3/18
Paper # IT96-87,ISEC96-79,SST96-94
Volume (vol) vol.96
Number (no) 586
Page pp.pp.-
#Pages 6
Date of Issue