ClassicSys - Email
National Security Service's functioning


Let's assume that the NSS has the encrypted version of the suspect (national or international) message, sent by Alice to Bob.

The NSS and the TA carry out the following, to obtain the clear version of the suspect message :

  1. the NSS isolates the stamp of the suspect message, Stp
  2. the NSS generates a random number, Rnd, based on the present date and time (1)
  3. the NSS sends 4 different encrypted blocks to the TA :
  4. the TA records the incoming encrypted request from the NSS (4)
  5. based on the stamp of the suspect message, Stp, the TA reconstructs the SessionKey from Alice to Bob, KsesAB
  6. the TA sends 3 encrypted blocks to the NSS
  7. the hardware of the NSS, first deciphers the third block received from the TA and compares it with the "message signature" of the suspect message. If there is no corroboration, the hardware of the NSS does not decipher the suspect message.

It is important to note at this stage :

(1) Without this random number, all demands for information concerning messages involving the same sender and receiver, will lead to the same encrypted result (see third block of message send to TA). With the help of this random number we avoid this situation.

(2) The password was given to the NSS by the TA during the installation of the NSS. Without this password, the TA will not give any information concerning SessionKeys between end-users.

(3) Without specifying a "message signature", the NSS could decipher all the messages sent from Alice to Bob. Now he is only allowed to decipher the suspect message.

(4) Normally the NSS may only request information from the TA, in strict legally defined situations, but technically, nothing prevents the NSS making all the requests it wants. Therefore the TA records all demands issued by the NSS for later control purposes.