A New Way to move on Cryptography...
Every one knows that a good crypto-system must :
- protect the confidentiality of the data to be exchanged,
- protect it's integrity,
- protect non-repudiation,
- and permit authentication.
If, in addition, this crypto-system has the following characteristics
...
- secret keys do not need to be known by somebody : end-users,
Trust Authorities, National Security Services of own or other
countries, ... (this is a requirement from all the end-users of
crypto-systems)
- deposit of keys (key escrow) is not necessary to ensure
the security of our Democracies (to be in accordance with local
laws, most of the systems require the deposit of the secret keys.
End-users are not pleased...)
- a National Security Service from one country is always
able to decipher national and international (out-going and
in-coming) suspect messages : serious crime, terrorism, drug dealers,
... (this fits to the requirements from ALL the
countries...)
- the system is able - with only one secret key per user
! - to integrate all applications using cryptography : mailing,
voting, banking, authentication, electronic commerce, EDI, fax,
...
- the system reacts as a public key system : every secret
key relates to a public ID number usable by anyone in the world
...