21 March 1997
Thanks to John Young's archive for catching this before it dissapeared.
  
LICENSING OF TRUSTED THIRD PARTIES
FOR THE PROVISION OF ENCRYPTION SERVICES
Public Consultation Paper
on
Detailed Proposals for Legislation
March 1997
FOREWORD
Ian Taylor MBE MP
Minister for Science & Technology 
On 10 June 1996 I announced to Parliament that the Government would be bringing
forward proposals for the licensing and regulation of Trusted Third Parties
for the provision of encryption services. I indicated then that a public
consultation document on the Government's proposals would be issued prior
to the introduction of legislation. I am pleased to be able to introduce
this document to you now.
The proposals in this consultation document make a significant contribution
to the Government's overall strategy for building the information society
in the UK. The provision of secure electronic commerce is a key issue for
business and consumers and it is important that we take positive steps to
address it, if we are to ensure that everyone in the UK exploits the full
potential of information and communication technologies.
The last 12 months have been a year of intense activity for Government. February
1996 saw the launch of the Information Society Initiative Programme for Business
aimed at encouraging British business to improve its competitiveness by using
information and communication technologies. December 1996 saw the full
liberalisation of international telecoms facilities in and out of the UK,
and the launch of IT for All - an exciting new programme aimed at bringing
the benefits of the information society within the reach of all UK citizens.
The Green Paper government.direct set out a vision for the electronic delivery
of Government services. Whilst the Education Department's Superhighways
Initiative continues to support a series of projects designed to raise awareness
of computer networks in education.
The UK is already a world leader in the telecommunications, broadcasting
and multi media industries. Business and consumers are therefore well placed
to take advantage of the opportunities on offer. Despite this however,
significant barriers to the take up of electronic commerce still remain.
These proposals - aimed at facilitating the provision of secure electronic
commerce - are being brought forward against a background of increasing concern,
not about the technology, but about the security of information itself. In
a world where more and more transactions are taking place on open electronic
networks like the Internet, there has been a growing demand from industry
and the public for strong encryption services to help protect the integrity
and confidentiality of information. These proposals have been developed to
address those concerns, but at the same time are aimed at striking a balance
with the need to protect users and the requirement to safeguard law enforcement,
which encryption can prevent.
I believe that the proposals outlined in this paper achieve that balance.
Their success though will ultimately depend on their widespread acceptance
and use of Trusted Third Parties by the business community. We are therefore
looking to industry to work with us in close partnership on this important
issue.
I therefore urge you now to let us have your comments on this document.
IAN TAYLOR
TABLE OF CONTENTS
FOREWORD  i
TABLE OF CONTENTS  iii
SECTION I: INTRODUCTION
................................................................... 1 
SECTION II: GOVERNMENT POLICY FRAMEWORK ..............................
3
SECTION III: EUROPEAN UNION & OECD DEVELOPMENTS .................
5 
SECTION IV: CRYPTOGRAPHY
.................................................................. 7
 
SECTION V: TRUSTED THIRD PARTIES
................................................... 9
SECTION VI: STRUCTURE OF THE PROPOSALS ...................................
10
Policy considerations
.............................................................. 10
Legislative
Headings.................................................................
13
 Licensing Regime.............................................................
13
 Licensing Criteria & Conditions..........................................
13
Exclusions.......................................................................
14
Prohibitions.....................................................................
15
 Legal
Access....................................................................
16
Sanctions.......................................................................
17
Liability...........................................................................
17
 Appeals and Tribunal........................................................
18
 
SECTION VII: MOVING AHEAD
................................................................... 19
ANNEX A Legal Recognition of Digital Signatures .............................
21
ANNEX B Legal access to keys held by TTPs - International Aspects 23
ANNEX C Explanation of Licensing Criteria
........................................ 26
ANNEX D Glossary
................................................................................
27
ANNEX E Minimum Functional Requirements of an International TTP 
 Architecture
...........................................................................
29
ANNEX F Frequently asked Questions & Answers .............................
31
THE LICENSING OF TRUSTED THIRD PARTIES
FOR THE PROVISION OF ENCRYPTION SERVICES
Consultation Paper on Proposals for Legislation
SECTION I: INTRODUCTION
  - 
    This consultation paper sets out the Government's policy proposals for the
    licensing and regulation of Trusted Third Parties (TTPs) to provide a range
    of information security services to their clients.
    
   
- 
    These proposals stem from the Government's announcement of 10 June 1996 on
    the provision of encryption services on public networks. This announcement
    recognised the growing demand from industry for strong encryption services
    to safeguard the integrity and confidentiality of electronic information
    transmitted on public telecommunications networks. It also recognised the
    need to balance this demand with the requirement to preserve the ability
    of intelligence and law enforcement agencies to fight serious crime and
    terrorism.
    
   
- 
    Against this background the Government announced that it would be bringing
    forward proposals for the licensing and regulation of TTPs to provide a range
    of information security services to their clients. It also indicated that
    formal consultation on the Government's proposals would be undertaken by
    the Department of Trade and Industry with all interested parties, prior to
    the bringing forward of legislation. Since June 1996 the Department of Trade
    and Industry, together with other government departments, has been concentrating
    on the detail of the legislation required to licence TTPs. This paper outlines
    the Government's proposals and seeks comments on their suitability and scope.
    Following this consultation the Government will make a further statement
    indicating how the legislation is to be brought forward, and giving further
    details of the intended regulatory regime.
    
   
- 
    This paper comprises seven sections. Section I introduces the paper. Section
    II outlines the overall policy framework within which the Government's policy
    on TTPs has been developed. Section III outlines international activity being
    considered by the European Commission on information security, including
    the promotion of TTPs. It also outlines discussions on similar issues taking
    place within the OECD. Section IV discusses cryptography and the role it
    has to play in securing the confidentiality and integrity of data. Section
    V outlines the potential benefits of a TTP network in the context of information
    security and indicates the range of services that TTPs might provide. Section
    VI outlines the structure of the Government's proposals and seeks comments
    on the areas it considers necessary to cover as the basis for legislation.
    Section VII highlights those issues on which the Government would particularly
    welcome comments.
    
     
    The annexes to this paper contain:
     
    A paper on the legal recognition of digital signatures.
     
    A paper on legal access to keys held by TTPs: International Aspects
     
    An explanation of the proposed licensing criteria.
     
    A glossary of terms.
     
    A paper on the minimum functional requirements of an international TTP
    Architecture.
     
    Frequently asked Questions and Answers.
 
 
- 
    Comments are invited on the issues set out in this consultation paper by
    Friday 30 May 1997. It may not be possible to take account of any
    responses received after this deadline given the Government's wish to move
    ahead quickly with the introduction of legislative proposals.
    
     
    To obtain additional copies of this document, please ring 0171
    510 0174 or fax 0171 510 0197, quoting DTI reference: URN 97/669.
     You may access the document on the Internet at:
    http://www.dti.gov.uk/pubs.
     
    Comments should be sent in writing to Nigel Hickson at the following
    address:-
     
    Information Security Policy Group
     
    Communication & Information Industries Directorate 
     
    Department of Trade & Industry
     
    Room 224
     
    151 Buckingham Palace Road
     
    London SW1W 9SS 
 
 
- 
    Alternatively comments may be sent to the following e-mail address:-
    [ttp.comments@ciid.dti.gov.uk] or faxed to 0171 931 7194
    
   
- 
    The Government does not intend to respond to individual comments. However,
    all comments received will be acknowledged and will be taken into account
    when proposals for legislation are introduced.
    
   
- 
    A summary of comments, subject to requests for confidentiality, will be published
    prior to legislative proposals.
    
     
    SECTION II: GOVERNMENT POLICY FRAMEWORK
 
 
- 
    The Government's policy on TTPs and the provision of encryption services
    for the protection of information transmitted electronically should be viewed
    in the context of the Government's broader objectives for building the
    information society in the UK.
    
   
- 
    The Government's view is that new developments in information and communication
    technologies offer exciting opportunities in the UK. Advances in the computing,
    telecommunications and creative sectors, combined with the world-wide explosion
    of electronic commerce, are revolutionising the delivery and availability
    of information and services. The Government wants to ensure that everyone
    in the UK is able to benefit from these developments and that they are able
    to play a part in the emerging information society.
    
   
- 
    The UK is already a world leader in telecommunications, broadcasting and
    multimedia - benefiting from Government action to liberalise the market and
    promote competition. Both business and consumers are therefore well placed
    to take advantage of the opportunities on offer. For example, many firms
    are already finding that their ability to make effective use of new information
    and communication technologies is crucial to their performance. Indeed the
    increased use by British business of information technology over the last
    decade has been a major factor in their improved competitive position in
    global markets.
    
   
- 
    Within this framework the Government has an important role to play in providing
    leadership in certain key areas. These include:-
    
     
    a) Creating the right regulatory framework so that industry and the economy
    can flourish, while assuring proper protection for the public.
     
    b) Promoting appropriate use of new technologies - in schools and colleges,
    museums and libraries, in the health service and in all areas of public life.
     
    c) Using information technology to improve efficiency in Government and the
    effectiveness of the services it delivers to industry and the public.
     
    d) Acting as a catalyst for new developments, bringing people together and
    working in partnership with the private sector and local authorities to make
    things happen.
 
 
- 
    The Government has adopted a national strategy for the information society
    - the Information Society Initiative - which seeks to include and
    enrol everyone in the UK through a number of complementary initiatives applying
    across all sectors of society.
    
     
    - IT for All - a programme which offers the public a wide range of
    opportunities to try and more readily understand technologies.
     
    - Programme for Business - where business and commerce are
    provided with wide- ranging resources, support and funding to help them thrive
    in the emerging information based economy.
     
    - government.direct - a recent Green Paper which sets out a
    vision for the electronic delivery of Government services, making them more
    accessible, more available and easier to use.
     
    - The Education Department's Superhighways Initiative
    which supports a series of projects designed to raise awareness of computer
    networks in education and show how they can best enrich the delivery of
    education.
 
 
- 
    The growth in electronic commerce offers great opportunities for the business
    community and consumers. The Government recognises however that it also brings
    with it significant risks. In particular, the ability to conduct all kinds
    of transactions across open information and communication networks like the
    Internet has led to increasing concern about the security of the information
    itself. In this context, businesses in particular have raised legitimate
    concerns about the adequacy of security measures for protecting the integrity
    and confidentiality of information transmitted on public telecommunication
    networks. It is clear that increasingly the concerns of users are not only
    about the availability of the technology and its benefits, but about the
    level of trust that both business and the public can place in such technology.
    These concerns represent a significant obstacle to the continued take up
    of electronic commerce in the UK. Hence the issue of how best to facilitate
    the provision of secure electronic commerce has become a key component of
    the Government's objectives for building the information society.
    
   
- 
    One of the most effective security tools for protecting the integrity and
    confidentiality of information transmitted on open electronic networks is
    cryptography. Over the last 2 years there has been a growing demand from
    industry for strong encryption services on communications networks and the
    Government recognises that this can help solve some security problems. In
    developing a policy in this area however the Government has to take many
    different interests into account. For example, a significant area for
    consideration in this context is how the spread and availability of encryption
    technology will affect the ability of the authorities to continue to fight
    serious crime and terrorism, and protect UK economic well being and national
    security. In particular, the Government considers it essential that the ability
    of security, intelligence and law enforcement agencies to conduct effective
    legal interception of communications under the Interception of Communications
    Act 1985 is preserved in any policy proposals. Another key area in developing
    this policy is the need to ensure the privacy of individuals. That is why
    the Government is in favour of developing a policy that will facilitate the
    use of cryptography for everyone. The rights of individual privacy will be
    strongly safeguarded by the technology made available, and the tightly controlled
    legal access conditions that these proposals wish to introduce.
    
   
- 
    It is the need to strike a balance between the commercial requirement for
    robust encryption services, with the need to protect users, and the need
    to safeguard law enforcement and national security requirements which led
    to an announcement by the Government in June 1996 of its policy towards
    encryption services on public networks. It is on the basis of the policy
    outlined then that the detailed proposals outlined in this paper- for the
    introduction of legislation to license TTPs wishing to provide a range of
    encryption services to their clients - are now being brought forward.
    
   
- 
    Whatever services TTPs provide, they must be trusted by their clients. Indeed
    in a global trading environment there will have to be trust of, and between,
    the various bodies fulfilling this function. To engender such trust, TTPs
    providing encryption services to the general public will be licensed. The
    licensing regime will seek to ensure that organisations who wish to establish
    themselves as TTPs will be fit for the purpose. It will aim to protect consumers
    as well as to preserve the ability of the intelligence and law enforcement
    agencies to fight serious crime and terrorism by establishing procedures
    for disclosure to them of the encryption keys, under safeguards similar to
    those which already exist for warranted interception under the Interception
    of Communications Act 1985.
    
     
    SECTION III: EUROPEAN UNION & OECD DEVELOPMENTS
 
 
- 
    The Government's initiative on TTPs will be of much greater significance
    for industry if similar developments take place in the countries of our main
    trading partners. The development of encryption services via TTPs requires
    compatible mechanisms in other countries and the UK has been active in promoting
    the concept through both bilateral and multilateral contacts. Within Europe
    the main forum for discussion on such issues is the European Union, in particular
    the European Commission where DG XIII has a small unit dedicated to information
    security issues.
    
   
- 
    In 1992 a Committee of Member States on information security issues (known
    as SOG-IS) was established as a forum for Member States to advise the Commission
    on the sort of initiatives that might be appropriate in this field. This
    resulted in a programme of work on information security including the adoption
    of the ITSEC criteria (first developed by the UK, France, Germany and the
    Netherlands) and the first pilot projects involving the use of Trusted Third
    Parties for digital signature services. In August 1994 the Commission Services
    began developing a proposal for a further programme of work concentrating
    this time exclusively on the development of Europe-wide network of Trusted
    Third Party Services (ETS) for the provision of cryptographic key management
    services (for both confidentiality and integrity).
    
   
- 
    The Commission's proposal was the subject of lengthy debate by Member State
    representatives, both in terms of the relative role of the member States
    and the Commission in introducing such pan-EU services and the law enforcement
    and national security issues pertaining to confidentiality services. As a
    consequence, and due to other priorities, the Commission's proposals have
    been delayed. It is hoped however that there will be a policy announcement
    in 1997. In the meantime the Commission is sponsoring work on a number of
    pilot projects concerning Trusted Third Parties in the ETS Preparatory Programme.
    Of the eight projects recently funded by the Commission, UK companies are
    involved in seven. The Government will be closely monitoring developments
    on these projects to learn lessons for its own licensing regulations.
    
   
- 
    It is recognised that complementary European Commision initiatives on Trusted
    Third Parties would be appropriate to enable an EU wide network of TTPs to
    be established. The Government has therefore, been working closely with the
    European Commission on the scope and content of applicable measures. The
    Government, in concert with other European countries, has recommended that
    the Commission adopt measures to demonstrate, trial and pilot TTP projects
    which would underpin the EU wide development of encryption services through
    TTPs.
 
- 
    Information on any of the current TTP projects can be obtained from David
    Herson (DG XIII/7) at the European Commission (e-mail
    david.herson@bxl.dg13.cec.be) or from the Commission Web site at
    www.cordis.lu/infosec/
    
   
- 
    The other main international forum for the discussion of cryptographic policy
    has been the Organisation for Economic Co-operation and Development (OECD).
    The OECD has taken an interest in information security issues for a number
    of years and in December 1995 hosted a landmark conference between industry
    and Government. This conference indicated that both international co-operation
    between Governments, as well as close co-operation between government and
    industry, would be key in developing acceptable and forward looking encryption
    policies. The OECD therefore decided to establish an Expert Group to look
    specifically at the development of cryptography guidelines as a direct guide
    to national policy development in member countries. The Expert Group met
    four times in 1996 and in December agreed a draft paper on Cryptography
    Guidelines for OECD consideration. This paper is currently being considered
    by member countries and will hopefully be issued as an OECD Recommendation
    to member countries in late Spring 1997.
    
   
- 
    In terms of content, and with regard to OECD confidentiality, the paper outlines
    eight key principles which any national encryption policy (including industry's
    development of products) should observe. These are Trust in Cryptographic
    Methods (vital if they are to be used), Choice of Cryptographic
    Methods (allowing the user to chose from a variety of systems), Market
    Driven Development of Cryptographic Methods (noting that it is primarily
    for the market, rather than Governments, to bring forward solutions),
    Standards for Cryptographic Methods (which should be promulgated in an
    open way), Protection of Privacy and Personal Data (the importance
    of individual privacy), Lawful Access (outlining the Government's
    right to legally access data -whether or stored or in transmission - and
    encryption keys), Liability (which the TTP must take on) and
    International Co-operation (stressing the need for countries to work
    together on global, rather than national, solutions).
    
   
- 
    The OECD exercise has gained considerable public exposure and the Government
    hopes that the guidelines, when published, will make a major contribution
    to the goal of developing global encryption services of direct benefit to
    business whilst safeguarding individual privacy and the national security
    concerns of member countries.
    
   
- 
    In addition to activities within the EU and OECD, a number of other fora
    and groups are also working on related encryption initiatives. In Europe,
    the Council of Europe has recently developed guidelines on Computer Crime,
    specifically noting the adverse role cryptography could have in hampering
    investigations. In the context of standards, both regional and global groupings
    are producing encryption standards. In Europe ETSI are developing a specific
    standard for Trusted Third Parties while SC27 (part of ISO) are developing
    a specific standard for digital signature and encryption methods. In addition,
    the UN (through UNCITRAL) and the American Bar Association (ABA) are developing,
    and the EU considering the development of, digital signature guidelines.
    
   
- 
    Individual countries both in and outside Europe are also developing their
    own national approaches. Whilst the US, France and the UK are perhaps unique
    in having policies on Trusted Third Parties involving key escrow, Germany
    has introduced a draft Digital Signature Law, Canada is developing a Federal
    Public Key Infrastructure, and Australia is developing a national Public
    Key Authentication Framework. 
    
     
    SECTION IV: CRYPTOGRAPHY
 
 
- 
    Cryptography is the art or science of keeping a message secure. It can be
    used to hide its information content, establish authenticity, prevent undetected
    modification, prevent repudiation, and/or prevent unauthorised use.
    
   
- 
    Cryptography can be used to protect the confidentiality of data, such as
    financial data or personal records, whether it is in storage or in transit.
    Cryptography can also be used to verify the integrity of data by revealing
    whether it has been altered and identifying the person or device that sent
    it. These techniques are critical to the development and use of national
    and global information and communications networks and technologies, as well
    as the development of electronic commerce.
    
   
- 
    The development of information and communications technologies that allow
    vast quantities of data to be transmitted, copied and stored quickly has
    promoted a growing concern for the protection of privacy and confidentiality
    of data. Effective cryptography is therefore an essential tool in a network
    environment for protecting the privacy of personal information and the secrecy
    of confidential business information.
    
   
- 
    Encryption uses a mathematical algorithm to encrypt data in order to render
    it unintelligible to anyone who does not possess certain secret information
    (cryptographic key) necessary for decryption of the encrypted data. Traditionally
    the secret cryptographic key needs to be agreed in advance of any communication.
    The secret key is used to both encrypt and decrypt the message. The security
    of this type of encryption lies in protecting the key; divulging it would
    allow anyone to decrypt the message. Therefore great care needs to be taken
    to protect the key, and therein lies the difficulty of adopting such a system
    for widespread use - how to protect the key and at the same time, distribute
    it to those you wish to communicate with.
    
   
- 
    In the mid 1970s a new development in cryptography introduced the "public
    key" concept, which allows parties to exchange encrypted data without
    communicating a shared secret key in advance. Rather than sharing one secret
    key, this concept uses two keys: a "public key" that can be disclosed
    to the public and used to encrypt data, and a corresponding "private
    key" that is kept secret and used to decrypt the data. Another important
    use of public key cryptography is "digital signature", which is used to verify
    the integrity or the sender or data. In this case, the private key is used
    to sign a transmission, while the corresponding public key is used to verify
    a signature.
    
   
- 
    Public key cryptography offers the benefits of confidential transmissions
    and digital signature in an open network environment in which parties do
    not know one another in advance, and without the need to share secret key
    information. The Government believes this is vital for electronic commerce
    between trading partners who may, of course, not know each other.
    
   
- 
    For a public key system to work in the public domain, not only must the public
    key be freely accessible, but also the user must have a reliable way of verifying
    the authenticity of public keys. Such an infrastructure, for managing and
    certifying public keys, can be based on a hierarchy or network of certificate
    authorities or Trusted Third Parties. A TTP would be a trusted source
    of information about the keyholder in the form of a "public key certificate".
    The certificate could be used to verify certain information exchanged over
    a network.
    
   
- 
    However, the widespread use of cryptography raises other important issues,
    and cryptography policy should, therefore, balance a number of varied interests.
    In addition to its role in the operation of electronic commerce, cryptography
    has implications for the protection of privacy, intellectual property, business
    and financial information, as well as law enforcement and national security.
    
   
- 
    A critical issue presented by cryptography is the possible conflict between
    privacy and law enforcement. While the use of cryptography is important for
    the protection of privacy, it can also be put to improper use such as hiding
    the illegal activities of criminals and terrorists. Consequently, there is
    a requirement to establish appropriate mechanisms for lawful access to encrypted
    information. In the UK, security, intelligence and law enforcement agencies
    can lawfully intercept communications under certain conditions in accordance
    with the Interception of Communications Act 1985 (IOCA). Unfortunately, the
    use of cryptography has the potential to seriously hamper this important
    law enforcement tool, by making legally intercepted messages unreadable,
    to the detriment of all law abiding citizens. Private parties may also have
    legitimate reasons and a legal basis to obtain access to encrypted information.
    For instance, an employee who has encrypted files may resign without leaving
    information concerning the private key, or the death of an individual may
    require a Solicitor to have access to their encrypted information. In all
    of these circumstances TTPs can enable legitimate access to the keys to unlock
    such information.
    
   
- 
    Legal access can be achieved by making use of a key escrow/recovery system.
    Key recovery allows authorised persons (for example users, officers of an
    organisation and law enforcement authorities) under certain conditions, to
    decrypt messages with the help of cryptographic key information, held in
    escrow, and supplied by one or more trusted parties. In such cases legal
    access is to the private confidentiality key.
    
   
- 
    Another important issue is the fact that cryptographic products and technology
    are also subject to export controls. The UK, and all EU member states, are
    bound by the Council Regulation (EC) No. 3381/94 linked to the Council Decision
    No. 941/942 CFSP. The introduction of these TTP proposals will hopefully
    lead to relaxed export licensing procedures for cryptographic products used
    with TTPs.
    
     
    SECTION V: TRUSTED THIRD PARTIES
 
 
- 
    A TTP can be described as an entity trusted by other entities with respect
    to security related services and activities. A TTP would be used to offer
    value added services to users wishing to enhance the trust and business
    confidence in the services they receive, and to facilitate secure communications
    between business trading partners. TTPs need to offer value with regard to
    integrity or confidentiality and assurance of the services and information
    involved in the communications between business applications. A user in the
    UK, under these proposals, would be free to choose their own TTP.
    
   
- 
    Typically, a TTP will be an organisation, licensed by the DTI, which will
    provide encryption services to a wide range of bodies across all sectors.
    The use of a TTP is dependent on the fundamental requirement that it is trusted
    by the entities it serves to perform certain functions. A TTP can also assure
    the user of the trustworthiness of another user to the extent that they are
    who they claim to be.
    
   
- 
    In practice, TTPs could exist in both public and private domains, at the
    local, national and international level. TTPs should have trust agreements
    arranged with other TTPs to form a network, thus allowing a user to communicate
    securely with every user of every TTP with whom his TTP has an agreement.
    The proposed legislation is solely concerned with licensing those TTPs offering
    services to business and the public and not intra-company TTPs. TTPs, as
    noted above, are required to interwork and therefore a key management
    architecture is required to facilitate both the cross certification of keys
    and legal access requirements. The minimum functional requirements the Government
    considers suitable for such an international TTP architecture are outlined
    at Annex E.
    
   
- 
    Some of the commercial and business benefits of a Licensed TTP solution are:-
    
     
      - 
	TTPs are being licensed to protect the consumer - Users will need
	to be protected from sub-standard TTPs. Users must also be assured of a TTPs
	trustworthiness, technical ability, financial stability, confidentiality
	of operations and ability to take legal liability for their actions.
    
 
     
      - 
	TTPs will be able to offer interoperability of secure services hitherto
	unavailable - While encryption products are available in the UK domestic
	market, interoperability between different products is not possible. A lack
	of standards for algorithms and interfacing, coupled with the high burden
	of key management has created a fragmented market. Today's encryption market
	is thus very costly. Passing the key management to TTPs and building products
	to a common architecture will allow access to cryptography for everyone with
	a PC. Encrypted communications, therefore, will no longer be limited to
	Governments and larger organisations.
    
 
     
      - 
	TTPs will allow UK Business to take advantage of secure electronic trading-
	The wide availability of cryptography will allow more paper based
	transactions to be conducted electronically. Time stamping, non repudiation,
	confidentiality, authentication and integrity are all necessary to install
	trust in the electronic age and to allow electronic contracts to take the
	place of paper ones.
    
 
     
      - 
	TTPs will also be able to offer Data recovery Services - At present,
	if encryption keys are lost, stolen or deliberately withheld by disaffected
	employees then the information will remain encrypted and may be lost to its
	owner for ever. TTPs will be in a position to offer recovery of the keys
	to their clients as they will store (or escrow) the keys.
    
 
     
      - 
	TTP Encryption policy will help UK manufacturers to export robust encryption
	within their products - Products that are designed to operate within
	a TTP environment will be subjected to simpler export licence procedures,
	thus allowing them to be exported with minimum restrictions. This increased
	availability will stimulate a greater demand for encryption products both
	in the UK and foreign markets. UK companies should be in a good position
	to take advantage of this.
    
 
     
      - 
	Use of licensed TTPs is voluntary - those wishing to do otherwise are
	at liberty to do so - The market will decide if it wants to use TTP services
	and not Government. The Government believes that the benefits of this scheme
	will far outweigh any others. Of course those wishing to use any other
	cryptographic solutions can continue to do so, but they will not be able
	to benefit from the convenience, and interoperability of licensed TTP services.
    
 
     
      - 
	UK taking lead in very important area - Many countries are currently
	trying to develop a cryptographic policy. Many countries agree with the UK
	that widespread use of cryptography must not be to the detriment of law
	enforcement requirements. The Government believes that this scheme is the
	best way to achieve this balance and that other countries may also see the
	benefits and follow the UK lead.
    
 
     
      - 
	Help to increase the Volume of electronic trading - Transactions over
	the Internet are forecast to reach as much as £22 billion by 2005. Some
	research suggests that the Internet will take 5 -10% of all retail traffic
	by 2000. Various barriers (lack of security products and standards, and poor
	interoperability) may impede this growth. The introduction of TTPs should
	help in this respect.
    
 
     
    SECTION VI: STRUCTURE OF THE PROPOSALS
     
   
- 
    The policy considerations for HMG which have determined the scope and content
    of the proposed legislative headings which follow are outlined below:-
    
      Positive Licensing regime
    
    The Government believes that the positive (and individual) licensing
    of TTPs (i.e. the body being licensed before the service can be provided)
    is critical in allowing the initial assessment, monitoring and regulation
    of a TTP that would meet the requirements of consumer protection, trust in
    the market and security, intelligence and law enforcement access. Consumer
    trust and acceptance are paramount as it is anticipated that licensed TTPs
    will form the back bone of the Public Key Infrastructure in the UK which,
    in itself, is a critical requirement for the growth of secure electronic
    communication. Such licensing arrangements will, therefore, also apply to
    TTPs solely providing public key certification services.
   
- 
    The Government has considered other routes such as negative licensing (where
    bodies would be free to provide encryption services unless they breached
    pre-set licensing conditions) and accreditation arrangements. These alternative
    routes were not, however, considered adequate to facilitate the necessary
    degree of consumer protection or trust. Either arrangement could, in the
    Government's view, lead to the presence of unsuitable or incompetent TTPs,
    thus significantly damaging the infant TTP market.
    
     
    Voluntary use of TTPs 
 
 
- 
    The legislation is directed solely towards the
    provision of encryption services to subscribers
    in the UK and not the use of
    encryption. Organisations offering or providing encryption services
    to the public in the UK, including those providing or advertising such services
    from outside the UK, will be required to be licensed. (The Government is
    also considering whether UK based bodies which provide encryption services
    solely to clients outside of the UK should also require licensing).
    Users, however, will remain at liberty to choose whether to make use
    of TTPs, or to make other arrangements for their encryption requirements.
    
      Key recovery from licensed TTPs.
 
- 
    In terms of Key Recovery the proposed legislation is concerned solely with
    legal access to private encryption keys (which are used to protect the
    confidentiality of information) required by the authorities in connection
    with the lawful interception of communications (i.e. information on the move)
    or for lawful access to data stored and encrypted by the clients of licensed
    TTPs. There is, of course no intention for the Government to access
    private keys used for only integrity functions. Legal access to encryption
    keys will be permitted through serving warrants on TTPs.
  
- 
    The Government recognises that further legislation may be required in the
    future to enable the appropriate authorities to obtain private encryption
    keys other than those held by licensed TTPs.
    
     
    Exclusions (e.g. intra-company TTPs)
 
 
- 
    The TTP legislation will not require intra-company TTPs (i.e.
    organisations supplying encryption services to their own employees or those
    within their own Group of companies) or similar closed user groups, to be
    licensed. However, if within such a closed community an intra-company TTP
    wishes to extend its services beyond the members of the group or, if it wishes
    to interoperate with a licensed TTP, a licence will be required.
  
- 
    Encryption services as an integral part of another service (such as in the
    scrambling of pay TV programmes or the authentication of credit cards) are
    also excluded from this legislation.
  
- 
    The Government invites views on whether the suggested scope of an exclusion
    from licensing for intra-company TTPs is appropriate in this context. 
    
      Electronic signatures
 
- 
    Various national and international bodies are currently considering a number
    of issues concerning the legal recognition of electronic signatures. For
    example, a note on the recommendations contained in a recent report by the
    Society for Computers and Law on digital information and the requirements
    of form generally is at Annex A. In the UK, research has shown that
    uncertainty as to the legal effect of using electronic commerce is seen by
    the business community as a considerable barrier to its development. In
    particular, there is uncertainty as to whether a requirement in law for a
    signature can be met using electronic technology. The Government is currently
    considering how best to ensure that requirements of form laid down in statute
    law can be met electronically. This is likely to be a massive undertaking
    as it involves reviewing all existing legislation to identify those cases
    where use of electronic technology would not meet legal requirements of
    form.
 
- 
    Two separate issues which need to be considered are how the identity of the
    signatory of a document and the integrity of a document may be proved in
    legal proceedings in the UK. These issues may arise where a digital document
    is admissible in court and where digital signature satisfies relevant
    legislation. Parties to encrypted documents may be able to agree between
    themselves as a matter of contract law that they will accept a certificate
    by their TTP as to these matters in any action against each other over the
    contract. This would not however bind a third party and would not necessarily
    assist if the validity of the contract were challenged.
    
   
- 
    The Government would welcome views on whether this legislation should establish
    a rebuttable presumption in any proceedings that a document has been signed
    by the person or persons named in a certificate issued by a licensed TTP
    who has provided encryption services in relation to that document. A similar
    presumption could also apply to the certification by a licensed TTP of the
    integrity of a document. This would have the effect of placing the burden
    of proof on a person wishing to challenge the identity of a signatory of
    a document or the integrity of a document.
    
   
- 
    The Government invites views on whether, in the short term, it would
    be sufficient for business to rely on agreements under contract regarding
    the integrity of documents and identification of signatures; or whether it
    would be helpful for legislation to introduce some form of rebuttable presumption
    for the recognition of signed electronic documents. 
    
      Convention on key exchange to underpin TTP legislation
 
- 
    Although the legislation will require foreign TTPs offering or providing
    encryption services to clients in the UK to have a registered base in the
    UK (which will allow for the licensing of non-UK bodies with no trading presence
    in the UK), there will be no provision requiring UK clients to use a UK licensed
    TTP. They are, and will be, free to register with foreign TTPs. It will therefore
    be necessary (for law enforcement purposes) to establish arrangements with
    other countries for the exchange of keys. The UK Government believes that
    these arrangements will be on the basis of dual legality i.e. whereby the
    criteria for access is satisfied in both countries. The keys held by UK licensed
    TTPs will not, under this legislation, be permitted to be disclosed to the
    authorities of other countries unless such requests satisfy UK law and are
    authorised by the competent UK authority. A fuller description of such
    arrangements is at Annex B.
    
     
    Licensing Criteria & Conditions 
   
- 
    It is intended that the licensing conditions, as opposed to the criteria
    on which licences will be granted, will not be prescribed in the legislation.
    
     
    LEGISLATIVE HEADINGS
     
      Licensing Regime
 
- 
    The legislation will provide that bodies wishing to offer or
    provide encryption services to the public in the UK will be
    required to obtain a licence. The legislation will give the Secretary of
    State discretion to determine appropriate licence conditions.
 
- 
    The DTI has been chosen as the initial authority for the licensing, in view
    of its experience in licensing telecommunications operators. Further
    consideration will be given to whether the on-going enforcement task in relation
    to these licences will also be handled by the DTI, or whether it will be
    delegated. The legislation will include provisions to allow both licensing
    and on-going enforcement to be delegated to a responsible designated body.
    More detail about the structure of the regulatory arrangements will be included
    in the further statement referred to in paragraph 3 above.
  
- 
    The duration of licences will be a minimum of five years. Licence fees will
    be payable both on the grant of a licence and annually thereafter to meet
    the cost of their issuing and enforcement.
    
   
- 
    The Government invites views on the appropriateness of these arrangements
    for the licensing and regulation of TTPs. 
    
     
    Licensing Criteria & Conditions 
 
 
- 
    As noted above the DTI or a designated body will be responsible for determining,
    and enforcing compliance of TTPs with, the licensing conditions. DTI will
    consult with other government departments and organisations on the practical,
    legal or technical details as necessary.
    
   
- 
    Before the Licensing Authority will deem an organisation fit to receive a
    licence to provide encryption services, it will need to be satisfied as to,
    inter-alia:-
    
     
      - 
	competence and trustworthiness of information security personnel
      
- 
	competence and trustworthiness of directors
      
- 
	competence of information security management
      
- 
	technical assurance of IT security equipment used for key management and
	storage
      
- 
	adherence to quality standards and procedures
      
- 
	adequate liability cover
      
- 
	ability to meet legal access conditions
      
- 
	the TTP's business plan and longevity of interest in market
      
- 
	isolation of TTP function from other business functions
      
- 
	interface requirements to other Licensed TTPs
      
- 
	structure and ownership
    
 
   
- 
    Annex C outlines in more detail the thinking behind the above criteria
    and seeks comments and suggestions on their appropriateness. A register of
    the holders of TTP licences, and the licences issued should be publicly
    available.
  
- 
    The licence conditions will include such conditions as are necessary to ensure
    continued adherence to the licensing criteria. THis may include-:
    
     
     
      - 
	provision of quality services to public
      
- 
	demonstration of co-operation to authority under legal access conditions
      
- 
	adequate co-operation with other licensed TTPs
    
 
     
    The exact scope of licensing conditions applied to a TTP will depend, inter-alia,
    on the encryption services being provided.
   
- 
    The Government seeks views on the proposed conditions.
    
     
    Exclusions
 
 
- 
    Encryption that is used solely in the protection of a business service (e.g.
    in pay TV systems or in payment systems), or encryption services that are
    provided only to the employees of the service provider or those in the same
    group of companies (see footnote 5) are outside the scope of this legislation.
  
- 
    For example, a home banking service offered by a bank to its clients, which
    included a cryptographic functionality designed to protect the banking
    transaction between a client and the bank, would not be covered by this
    legislation. However, if the bank wished to extend the cryptography's
    functionality and allow client to client communications, then this service
    would be covered by the legislation, and the bank would need to apply for
    a licence. Another example, of an excluded service, would be the key management
    and certification services that might be offered by providers to credit card
    companies to authenticate the users of their cards.
 
- 
    Similarly, an employer offering cryptographic protection between its employees,
    (whatever the functionality) would not be covered by this legislation. However
    should it decide to extend the protection service to its suppliers, then
    it would require a licence.
 
- 
    In many cases such "intra-group" TTPs are likely to seek a license given
    their need to interoperate with organisations outside their own organisation,
    or with clients of a licensed TTP.
 
- 
    The Government invites comments on whether specific exemptions for
    particular organisations offering encryption services may be appropriate,
    depending on the nature of services offered.
    
   
- 
    The Government also invites comments on whether it is thought desirable
    to licence the provision of encryption services to businesses and citizens
    wholly outside the UK.  
    
     
      Prohibitions
 
- 
    The legislation will prohibit an organisation from offering or providing
    encryption services to the UK public without a licence. Prohibition
    will be irrespective of whether a charge is made for such services. The offering
    of encryption services to the UK public (for example via the Internet) by
    an unlicensed TTP outside of the UK will also be prohibited. For this purpose,
    it may be necessary to place restrictions on the advertising and marketing
    of such services to the public.
 
- 
    The legislation will be framed so as to give existing providers of encryption
    services time to obtain licences, as TTPs, before the prohibitions outlined
    above come into effect.
 
- 
    For the purposes of this legislation the terms public and encryption
    services will encompass the following meanings:
 
      - 
	Public will be defined to cover any natural or legal person
	in the UK.
      
- 
	Encryption services is meant to encompass any service, whether provided
	free or not, which involves any or all of the following cryptographic
	functionality - key management, key recovery, key certification, key storage,
	message integrity (through the use of digital signatures) key generation,
	time stamping, or key revocation services (whether for integrity or
	confidentiality), which are offered in a manner which allows a client to
	determine a choice of cryptographic key or allows the client a choice of
	recipient/s.
 
 
- 
    The legislation will also prohibit a UK licensed TTP from contracting with
    any non licensed TTP for the purposes of carrying out encryption services.
    In order to build up a TTP network it may be necessary from time to time
    for UK licensed TTPs to recognise non-licensed bodies from other countries
    where no licensing regime exists. In such cases recognition should not be
    given to an unlicensed body until the UK licensed TTP is satisfied that such
    recognition would not put at risk its ability to meet any of its obligations
    under this, or other, legislation, or international obligations (such as
    those concerning data protection).
    
     
    Legal Access 
 
 
- 
    The legislation will provide that the Secretary of State may issue a warrant
    requiring a TTP to disclose private encryption keys (protecting the
    confidentiality of information) of a body covered by that warrant. Under
    such legal access arrangements, there will be safeguards broadly similar
    to those in the Interception of Communications Act 1985, under which a Secretary
    of State may issue a warrant requiring the interception of communications
 
- 
    For the purposes of legal access, a central repository might be nominated
    or established by the UK authorities. The purpose of this central repository
    will be to act as a single point of contact for interfacing between a licensed
    TTP and the security, intelligence and law enforcement agencies who have
    obtained a warrant requiring access to a client's private encryption keys.
    The central repository would, therefore, be responsible for serving the warrant
    (whether by physical or electronic means) on the TTP and distributing the
    encryption key to the appropriate agency.
 
- 
    It is envisaged that a warrant would require a TTP to disclose, in a timely
    manner, cryptographic key material to a central repository (acting on behalf
    of an agency).  It is envisaged that it should take no more than an
    hour for a TTP, once presented with a validated warrant request, to deposit
    the appropriate client encryption key(s) with the central repository.
    The procedures and methods to enable such timely disclosure will be determined
    between the licensed TTP and the central repository. The costs of obtaining
    a warrant and serving it on a TTP, as well as the direct costs of the TTP
    complying with such a request, shall be borne by the appropriate agency.
    Costs of implementing and maintaining the technical capabilities for legal
    access shall, however, be borne by the TTP.
 
- 
    In order to comply with the above legal access provision, TTPs will be
    required:-
 
      - 
	to have the ability to deliver cryptographic key material by secure electronic
	means to a central repository on receipt of a validated warrant.
      
- 
	to demonstrate the ability to recognise a duly authorised warrant served
	by the central repository, and to comply only with such a warrant.
      
- 
	to be responsible for facilitating all measures necessary for legal access.
      
- 
	to keep auditable records of legal access requests.
      
- 
	at all times, not to deliberately or negligently jeopardise the integrity
	of any legal access request, or to disclose the identity of the target of
	such a request.
 
 
- 
    In addition to disclosure under the Legal Access provisions noted
    above the TTP may also release the private encryption key of the client under
    contractual arrangements between the two parties. Such arrangements may,
    for example, ensure that keys which have been used to encrypt company files
    can be released when the user leaves the employ of the client company. Other
    arrangements allowing third party access by a solicitor, or other persons,
    may also be agreed between the parties in certain circumstances.
 
- 
    The Government seeks views on whether secure electronic methods for
    the delivery of electronic warrants by the central repository and the subsequent
    delivery of keys by the TTP should be introduced. 
    
   
- 
    The Government also seeks views on whether the legislation specifically
    needs to refer to other forms of legal access including a civil court order
    for access to cryptographic keys used to protect information relating to
    civil matters such as bankruptcy. 
    
     
      Sanctions
 
- 
    It is recognised that in order for business and the public to have trust
    in TTPs, some forms of sanction will be required against those either not
    complying with the conditions of the licence or, more seriously, providing
    encryption services without a valid licence. On the latter, we intend that
    it will be a criminal offence for a body to offer or provide licensable
    encryption services to the UK public without a valid licence. We consider
    - again on grounds of consumer confidence - that it may also be appropriate
    for the legislation to make it a specific criminal offence for a licensed
    TTP deliberately to disclose a client's private encryption key (or for an
    employee of such a TTP to do so), other than pursuant to any legal requirement,
    or permission of the client, to do so. There are, however, existing provisions
    (including the Data Protection Act and the Computer Misuse Act) which would,
    in some circumstances, already apply to the disclosure of a client's private
    encryption key in this respect.
 
- 
    The Government seeks views on whether deliberate (and perhaps wilfully
    negligent) disclosure of a client's private encryption key should be a specific
    criminal offence, or whether existing civil and criminal sanctions
    would suffice. 
 
- 
    Other types of sanction will be necessary for non-compliance by TTPs with
    other licence conditions. Such sanctions may include fines, specific orders
    issued by the regulator, and (in extremis) withdrawal of a licence.
    
     
    Liability
 
 
- 
    TTPs will be liable for the protection of the private encryption keys of
    clients at all times while they are in their possession. They will also be
    liable for the protection of hierarchical keys upon which the secrecy of
    client keys or system keys are dependant. In the event of loss or disclosure
    (whether deliberate or accidental) of keys the TTP will be required to have
    in place adequate arrangements to compensate any loss suffered by its clients
    or clients of other TTPs. The TTP will be required to demonstrate, to the
    satisfaction of the Licensing Authority, that such arrangements have been
    made. TTPs will also have vicarious liability for acts of their employees.
 
- 
    In order to ensure adequate consumer protection the Government is minded
    to impose a form of strict liability on TTPs in relation to the compromise
    or disclosure of a client's private encryption key. A TTP would be strictly
    liable if such a key was disclosed other than by agreement with its client
    (but see paragraph 88 for circumstances in which the authorities have legally
    obtained the key). The client would only have to establish disclosure and
    not responsibility for such disclosure. It would be a defence for the TTP
    to show that the client itself was responsible for the loss or compromise
    of his own private keys (whether those for integrity or confidentiality).
    Since the TTPs would have strict liability, the Government also proposes
    to limit the amount of compensation payable by TTPs to the client if disclosure
    (or compromise) of the key was established by the Court.
 
- 
    As the concept of fault (i.e. of either the TTP or another party (e.g. the
    central repository) is not an issue in such proceedings there would also
    be - in cases of a judgement against a TTP - an automatic referral to a Tribunal
    (established under the legislation). It would then be for the Tribunal to
    determine whether there had been legal access under warrant to the key, and,
    if so, whether the responsibility for the disclosure (or compromise) lay
    with the central repository or the security, intelligence or law enforcement
    agencies. If so, the Tribunal would order recompense to the TTP for the loss
    it had paid the TTP client and would publish its findings accordingly. Liability
    cover and compensation above the minimum level will be at the discretion
    of the TTP and its clients and will be dealt with by individual contract.
    These arrangements, we believe, balance the rights of the TTP clients to
    compensation for loss caused by disclosure of their private encryption keys,
    against protection of TTPs from unlimited liability.
 
- 
    The Government invites comments on whether the principle of strict
    liability (as described above) is appropriate in these circumstances.
    
     
      Appeals and Tribunal
 
- 
    Careful consideration will be needed of the extent to which decisions taken
    about the granting of licences and their enforcement and amendment should
    be appealable. The Government sees merit, in terms of increasing the industry's
    confidence in the regulatory process, for some form of appeals body to be
    created which is independent of the parts of the Government responsible for
    licensing and enforcement.
    
   
- 
    The Government seeks views on whether, in principle, an independent
    appeals body (such as a Tribunal, separate from that referred to below) should
    be created. 
    
   
- 
    A Tribunal would also be established, which would deal both with references
    from the Courts under the strict liability procedures (described above) and
    applications from the clients of TTPs who believe that their keys may have
    been subject to legal access. As with the similar Tribunal established under
    IOCA, the Tribunal's function would be to ascertain whether warranted access
    had taken place and, if so, whether any contravention of the legislation
    had occurred.
    
   
- 
    The Government seeks views on whether the above duties of an independent
    Tribunal are appropriate. 
    
     
    Location of TTPs
 
 
- 
    All organisations wishing to be licensed in the UK as TTPs will be required
    to register a UK address (if they do not already have one). This address
    is necessary to ensure compliance with the legal access conditions, Regulatory
    Orders and other sanctions. It will not be necessary for the escrowed keys
    themselves to be held in the UK, but only that they are delivered to the
    UK.
    
     
    SECTION VII: Moving Ahead
 
 
- 
    The Government invites comments on this paper until 30 May 1997 (see
    Introduction for information on where to send comments). In particular
    the Government would like to receive views on:-
    
     
    Paragraph 50 - Whether the suggested scope of an exclusion from
    licensing for intra-company TTPs is appropriate in this context.
     
    Paragraph 54 - Whether, in the short term, it would be sufficient
    for business to rely on agreements under contract regarding the integrity
    of documents and identification of signatures; or whether it would be helpful
    for legislation to introduce some form of rebuttable presumption for the
    recognition of signed electronic documents. 
     
    Paragraph 60 - The appropriateness of the proposed arrangements
    for the licensing and regulation of TTPs. 
     
    Paragraph 65 - Where views are sought on the proposed
    conditions.
     
    Paragraph 70 - What, if any, specific exemptions
    for particular organisations offering encryption services would be appropriate
    depending on the nature of services offered?
     
    Paragraph 71 - Whether it is thought desirable to licence the provision
    of encryption services to businesses and citizens wholly outside the UK?
     
    Paragraph 81 - Should secure electronic methods for the
    delivery of electronic warrants by the central repository and the subsequent
    delivery of keys by the TTP be introduced? 
     
    Paragraph 82 - Does the legislation specifically need to refer
    to other forms of legal access including a civil court order for access to
    cryptographic keys used to protect information relating to civil matters
    such as bankruptcy?
     
    Paragraph 84 - Should deliberate (and perhaps wilfully negligent)
    disclosure of a client's private encryption key be a specific criminal offence,
    or would existing civil and criminal sanctions suffice? 
     
    Paragraph 89 - Whether the principle of strict liability (as described
    ) is appropriate in these circumstances?
     
    Paragraph 91 - Whether, in principle, an independent appeals body
    (such as a Tribunal, separate from that referred to below) should be created
    ? 
     
     
     Paragraph 93 - Whether the proposed duties of an independent
    Tribunal are 
     
     appropriate. 
     
    Annex C - Would mandatory ITSEC formal evaluation be appropriate?
     
    96. The Government will need to consider the comments received and, in some
    cases, discuss them with their originators. A summary of comments will be
    published prior to the introduction of legislative proposals, subject to
    requests for confidentiality.  
 
Annex A: 
Legal Recognition of Digital Signatures 
  - 
    The emergence of electronic commerce will, to a large extent, be determined
    by the market both in term of the availability of technology and the trust
    business has in it. Governments can, however, help to facilitate secure
    communications by helping to provide the appropriate regulatory and legal
    infrastructures. Apart from the licensing of Trusted Third Parties, which
    the proposed legislation will deal with, Governments may also wish to ensure
    that electronic communications, especially when used for electronic contracts,
    can be legally recognised. Although electronic "partners" may well be prepared
    to contract with one another on the basis of "trust" (as many organisations
    do already) there is a perception that some form of legislation should underpin
    the basis of this electronic communication. For example, if there were a
    dispute on the alteration, or disclosure of a message, recourse to the courts
    may well be appropriate.
    
   
- 
    In recognition of the possible need to introduce new, or amend existing,
    legislation to allow for the recognition of digital transactions, and
    particularly digital signatures, the Government has welcomed the work of
    the Society for Computers and Law. The group, co-ordinated and facilitated
    by the Commercial Law Unit at Queen Mary and Westfield College has examined
    whether current English legislation may prevent electronic contracts being
    enforced; and - if so - what steps might be taken to address the issue. It
    was recognised that Scottish law, which is different in some respects, would
    have to be, and is being, looked at separately.
    
   
- 
    The Group has now made the Government aware of their findings on both of
    the above counts. To answer the first question the Group analysed those terms
    in legislation which pertained to the transmission of electronic information.
    They thus considered whether the existing usage of words such as "information",
    "document", "recording", "writing" and "signature" had meanings, in their
    legislative context, which could extend to digital electronic information.
    Basically, they found that all the above terms, and others, could be extrapolated
    to cover electronic information apart from the terms "signatures", "writing"
    and (more obviously) "physical writing". These latter terms, they suggested,
    had meanings which generally pertained to the "physical " world of documents
    and ledgers, rather than to the electronic one. Thus they suggested that
    by altering, or perhaps extending the general meaning of these words, it
    would be possible for future legislation to be electronic proof (so
    to speak). For existing legislation, however, the Group concluded that piecemeal
    change would probably be more appropriate. This being based on the vast amount
    of exiting law which has references to "writing" and "signatures" in, and
    the realisation that some of this body of law may actually require
    physical actions (such as a signature in writing for some legal
    processes).
    
   
- 
    In light of these findings, DTI, and other interested parties, may now wish
    to consider whether these measures, or any others should be taken forward.
    Introducing changes to the above terms through the use of the Interpretation
    Act (as recommended by the Group) is a complex matter and would, necessarily
    require primary legislation. Government will also no doubt consider whether,
    and if so how, the further (and perhaps even more difficult) task, of examining
    the current legislation - to see where the terms "signature" and "writing"
    need amending, can be taken forward.
    
   
- 
    These are complex issues and cannot be rushed. Such changes will possibly
    help to underpin secure electronic commerce for a long time to come. We cannot
    afford therefore to get it wrong.
    
   
- 
    The picture is further complicated by the fact that electronic commerce is
    global in nature. The contracting parties will - possibly in the majority
    of cases - not both be in this country and therefore the law of a different
    jurisdiction may also be relevant. In recognition of this a number of different
    bodies (both public and private) as well as different Governments, are
    contemplating issues of digital signature recognition. Perhaps the most important
    is the work being undertaken by the United Nations Commission on International
    Trade Law (known as UNCITRAL). The latter set up a working party 1995 to
    try and develop a "Model Law" which would aid members in developing compatible
    and broadly similar legislation. This being on the simple basis that issues
    such as dispute resolution, may be easier to handle where legislation is
    broadly similar, rather than totally different. The "Model Law" has now been
    published and has already formed the basis of legislation in a number of
    US States. The Group's recommendations, noted above, is also broadly compatible
    with the UNCITRAL approach. Work at the UN, however, does not stop with the
    Model Law. A new working group of UNCITRAL has now been commissioned to look
    at the process of using digital signatures. They will be exploring such issues
    as the role, and responsibilities of Certification agents, and how the legal
    certainty of a signature relates to the technological process being used
    to sign data.
    
   
- 
    Another initiative has come forward from the American Bar Association (ABA)
    who have produced their own legal guidelines on both the use and recognition
    of digital signatures. The European Commission has also recently initiated
    a number of studies of the legal recognition of digital signatures perhaps
    as a forerunner to the emergence of guidelines of their own.
    
   
- 
    The DTI, and other interested Government Departments, will take note of these
    developments in considering what steps we need to take.
Annex B:
LEGAL ACCESS TO KEYS HELD BY TRUSTED THIRD PARTIES:
INTERNATIONAL ASPECTS
1. If the UK and other countries adopt a system of Trusted Third Parties
(TTPs) providing confidentiality services including encryption on a key escrow
basis, it will be open to encryption users to register with a TTP abroad.
Unless workable arrangements are in place for the authorities to gain access
to keys escrowed with TTPs in other countries, criminals may choose to register
with TTPs abroad in order to evade national legislation providing for access
to keys held by TTPs licensed in their own country.
2. Direct access to TTPs by foreign authorities would raise a number of concerns,
for example:
  - 
    the host country might be concerned that access to certain encrypted data
    might be detrimental to its national security and economic wellbeing;
  - 
    in the law enforcement domain, keys might be sought in connection with the
    investigation of offences abroad which would not be serious enough to justify
    interception or key access under the host country's own legislation;
  - 
    any indication that key access might be inadequately controlled could undermine
    the confidence of the public and industry in the integrity and security of
    TTPs.
3. To meet these concerns the host country's authority would need to have
full information on the foreign authority's case for seeking disclosure of
keys, in order to enable a decision to be taken on whether or not to serve
a warrant on the TTP.
4. It has been suggested that some of these concerns might be met if, rather
than permitting the release of encryption keys at the request of a foreign
authority, international arrangements provided for the passing of plain text
of decrypted material.
5. Provision of plain text may be adequate where the need is for decryption
of stored material seized for evidential purposes. Arrangements for the provision
of plain text in such cases might be pursued through:
  - 
    bilateral agreements, or;
  - 
    (where plain text is required for evidential purposes) agreements based on
    existing arrangements for mutual judicial cooperation.
6. However, the provision of plain text is unlikely to be practical where
the need is for urgent decryption of intercepted communications or decryption
of stored data to provide time critical operational intelligence. In these
cases arrangements for the release of keys to the requesting authority would
be required.
Arrangements for key access
7. Arrangements for lawful key access need to:
  - 
    create an enforceable obligation on TTPs to disclose keys when required to
    do so;
  - 
    protect TTPs from any criminal or civil liability which might arise from
    the disclosure of keys.
8. These aims would need to be achieved by national legislation in the state
which has jurisdiction over the TTP's actions. If it is accepted, as argued
in paragraphs 2 4 above, that there should not be a system of automatic
recognition of warrants from foreign authorities, then the legislation would
need to provide for the issue of a national warrant by the competent authority
in the "receiving" state, within an agreed framework of arrangements for
international cooperation. It is recognised that this sort of procedure will
introduce some delays into the process of obtaining keys, but these should
be considerably less than those which would arise from the provision of plain
text.
Criteria
9. The criteria for granting a key access request from another state might
be:
  - 
    the request has been made by a recognised competent authority in the "requesting"
    state (this might be an executive or a judicial authority according to the
    law of the requesting state);
  - 
    the request discloses information which satisfies the competent authority
    in the receiving state that the release of keys is required for the prevention
    or investigation of serious criminal offences, or in the interests of the
    national security or economic wellbeing of the requesting state;
  - 
    the request satisfies the competent authority in the receiving state that
    release of the requested keys would not adversely affect the national security
    or economic interests of the receiving state or any friendly state;
  - 
    the receiving authority is satisfied that there are adequate arrangements
    in the requesting state for ensuring that keys are held securely, not used
    for purposes other than those disclosed in the request, and are destroyed
    when no longer required.
Form of agreement
10. The international arrangements could be provided for either by bilateral
agreements or a multilateral convention. The commitments created by any
convention should ideally be the minimum necessary to achieve the desired
effect:
  - 
    states would be required to have legislation in place to enable them to consider
    requests for key access from other states which are parties to the convention;
  - 
    the competent authority to determine a request from another state should
    be a matter for national legislation;
  - 
    the authority in the receiving state should not be required to agree to any
    request unless the criteria of its national law on key access are fulfilled;
  - 
    a refusal by a competent national authority to comply with a request from
    another state should not be reviewable by any international tribunal.
Annex C: 
Explanation of Licensing criteria
  - 
    Competence of information security personnel.
    
    It will be necessary to ensure that TTP security personnel are competent,
    suitably qualified, trusted & have successfully completed a recognised
    security vetting procedure.
 
 
- 
    Competence of directors.
    
    Checks will need to be undertaken to ensure that the background and other
    business interests of directors would not compromise the trust placed in
    a TTP. 
 
 
- 
    Competence of information security management.
    
    TTPs will need to demonstrate that their system security policy is suitable
    for TTP operations and consistent with information security standards (such
    as BS 7799).
 
 
- 
    Technical assurance of IT security equipment used for key management and
    storage.
    
    Evaluation of the security system and IT security products will need to
    be undertaken, for example UK ITSEC, although formal evaluation by an independent
    third party may not be the sole evaluation procedure. 
     
    The Government seeks comments on whether mandatory ITSEC formal evaluation
    would be appropriate 
 
 
- 
    Adherence to quality standards and procedures.
    
    e.g. ISO 9000.
 
 
- 
    Assessment of business plan and longevity of interest in market.
    
    TTPs will need to demonstrate that their interest in providing a TTP service
    is not short term. They will also need to demonstrate that adequate procedures
    are in place to ensure the integrity and confidentiality of all information,
    in the event that the TTP withdraws such services. 
 
 
- 
    Isolation of TTP function from other business functions.
    
    Many organisations may wish to operate as TTPs while continuing other
    business interests. A TTP may need, therefore, to demonstrate that the TTP
    function is isolated from its other business functions.
 
 
- 
    Interface requirements to other Licensed TTPs.
    
    In order to achieve widespread interoperability, TTPs will be required
    to operate to common interface requirements. 
 
 
- 
    Company structure and ownership.
    
    Checks will be made to ensure that those who own, or effectively control,
    an organisation, are suitable candidates for ownership of a TTP. 
 
  Annex D:
Glossary of Terms
The following terms are described for information only and are not intended
to be interpreted as legal definitions:
                                                                                
                                                                                
Authentication:            The verification of a claimed identity.              
                                                                                
Central Repository:        Government department or agency set up by            
                           Government to act as a point of contact for          
                           interfacing between a TTP and the appropriate law    
                           enforcement agency.                                  
                                                                                
Confidentiality:           The prevention of the unauthorised disclosure of     
                           information.                                         
                                                                                
Cryptographic key:         Is a parameter used with a cryptographic algorithm   
                           to transform, validate, authenticate, encrypt or     
                           decrypt data.                                        
                                                                                
Cryptography:              The art or science of keeping messages secure.       
                                                                                
Digital Signature:         Data appended to a message that allows a recipient   
                           of the message to prove the source and integrity of  
                           the message.                                         
                                                                                
Dual Legality:             A legal request from a foreign agency must satisfy   
                           legal access conditions in both the requesting       
                           country and the country being asked.                 
                                                                                
Encryption Algorithm:      A mathematical function used to change plaintext     
                           into ciphertext (encryption) or vice versa           
                           (decryption).                                        
                                                                                
Integrity:                 Prevention of the unauthorised modification of       
                           information.                                         
                                                                                
Key escrow / recovery      A capability that allows authorised persons, under   
                           certain prescribed conditions, to decrypt            
                           ciphertext with the help of information supplied by  
                           one or more trusted parties.                         
                                                                                
Key management:            The process of generating, storing, distributing,    
                           changing, and destroying cryptographic keys.         
                                                                                
Key revocation:            Notification that a public cryptographic key is no   
                           longer valid.                                        
                                                                                
Private key:               The private (secret) part of a cryptographic key     
                           pair. Knowledge of which should be strictly          
                           limited.                                             
                                                                                
Public key certificate:    Public key information of an entity, signed by a     
                           trusted entity to certify the integrity of the       
                           public key.                                          
                                                                                
Public Key Infrastructure  Supporting infrastructure, including non-technical   
(PKI):                     aspects, for the management of public keys.          
                                                                                
Public key:                The public (i.e. non secret) part of a               
                           cryptographic key pair. This key is widely known     
                           and no secrecy should be attached to it.             
                                                                                
Time stamping:             An electronic equivalent of mail franking.           
                                                                                
Trusted Third Party        An entity trusted by other entities with respect to  
(TTP):                     security related services and activities.            
                                                                                
Annex E:
Minimum Functional Requirements for an International TTP Architecture
1. The framework should provide benefits to the legitimate user. It must
support electronic business transactions in terms of integrity, authenticity
and confidentiality.
This is important in order to encourage widespread acceptance and justify
any costs for users. 
2. It should provide for both national and international working.
Use of a local TTP would be encouraged; in some countries it might be
mandatory.
3. It should use well known techniques and thus be public and
unclassified.
It is recognised that well known techniques are essential for broad initial
acceptance and for subsequent confidence by users, although there is no direct
national security reasons for insisting upon this. Any truly international
system cannot, by definition, rely upon classified parts. This does not,
however, automatically exclude the system from use in protecting classified
information.
4. It should support all forms of electronic communication.
One-way communications, such as e-mail, must be included, but any proposal
must be suitable for all forms of communication.
5. It should be compatible with different laws and regulations of
participating countries concerning interception, use, supply and export.
The need for licences or other forms of authorisation is unaltered, although
a successful system should aim to make licensing arrangements easier for
all concerned.
6. It should provide access under warrant (or other legally-constituted
form of authority) to the data specified in the warrant, which includes both
incoming and outgoing communications. 
The warrant would be from a single jurisdiction.
7. It should not impede the due process of law and order. In particular,
it should allow near-real-time access when a warrant is held. The system
must not allow the user to detect that warranted access is taking or has
taken place. 
The system must cater for lawful access.
8. It should give the sender the opportunity to ensure that legitimate
access by the authorities to data specified by the warrant does not also
allow indefinite access.
There should therefore be technical and/or procedural means to enforce
the time limits (for access to the appropriate private confidentiality key)
laid down in the warrant. Such arrangements will help facilitate the confidence
of users.
9. It should provide for the use of a variety of data encryption algorithms
whether in hardware or software.
Use of software may not be appropriate for some security critical
applications, but it will inevitably be widely used and must therefore be
catered for.
10. It should not be possible to misuse information obtained under a warrant
to fabricate evidence.
Separation between confidentiality and authentication/non-repudiation
is needed, not least to ensure that the ability of the authorities to decrypt
data does not also put them in a position of being able to impersonate
anyone.
11. It should ensure that attempted abuse by the sender can be noticed
by the receiver. 
It should be impractical for user to subvert or bypass the legal access
provisions. If the recipient contributes to the process of producing the
data encryption key then this applies to both parties.
12. It should not require a user to deal with a Trusted Third party in
another country.
Users should be able to choose their own TTP, but any framework should
not force users (on technical or national policy grounds) to deal with foreign
TTPs. 
13. It should not require either regular or on-line communications between
Trusted Third Parties.
It would be unwise to presume permanent availability of all parts of a
network. TTPs need to provide a timely service, but not necessarily a 24-hour
one for users.
Annex F:
Frequently asked Questions and Answers
What is a TTP?
An entity trusted by other entities with respect to security related activities
and services.
Who will use a TTP?
Anyone who wishes to have secure communication between two parties, particularly
those that have never met.
Will use of a TTP be mandatory?
No. The market will decide if it wants to use TTP services. Those wishing
to do otherwise will be at liberty to do so.
Who will be able to be a TTP ? 
Any commercial or non-profit organisation would be eligible provided that
it can meet the appropriate licensing conditions.
What are the benefits for business ?
A network of TTPs, operating to a common architecture should present significant
benefits. For example, availability and interoperability of encryption products;
a supporting infrastructure that facilitates international public key
certification for authenticity, integrity, and confidentiality; expensive
and complex key management tasks and secure backup facilities to prevent
irretrievable loss of information. Secure communication between unknown parties,
without the need to depend on either expensive or multiple solutions, will
become common place and thus lead to increased confidence and use of the
information society.
Why should users trust a TTP ?
There should be no less reason to trust a TTP than there is to trust, for
example, a bank. A licensing regime will help to ensure that only reputable
service providers are able to become TTPs. It is important to note that whilst
a TTP will hold private confidentiality keys in escrow, it will not normally
have access to the encrypted traffic as this will be sent by the user over
whichever telecoms network he chooses.
Will there be a Government TTP ?
Government departments will need TTP services as much as other organisations,
especially where business is transacted with the public.
Why the need for licensing ?
Given the position of trust that a TTP would hold, and the importance its
clients will attach to their reliability, some form of regulation of the
activities of a TTP is necessary if only to protect the public.
Will UK citizens need to register with a UK TTP ?
No, but any foreign TTPs offering services in the UK will need to meet the
UK licensing conditions.
Will you attempt to control the length of encryption keys ?
No. For use in the UK that is an issue for the market to decide.
What involvement will industry have in the policy process ?
As is made clear in Mr Taylor's statement on 10 June 1996, the DTI will conduct
more formal consultation with all interested parties prior to introducing
legislative proposals. This consultation paper forms the major part of that
ongoing consultation process.
When will legislation be passed ?
After this consultation period is complete and at the earliest opportunity
in the legislative programme. Other circumstances permitting, we hope to
bring forward legislative proposals during the next Parliamentary session.
Are you adopting a purely national approach ?
No. Electronic commerce is global in nature and the international perspective
needs to be fully taken into account. The UK approach is consistent with
ideas being discussed in other fora such as OECD and the European Union.
How will law enforcement access be achieved ?
Where a warrant has been obtained under due process of law, TTPs holding
secret confidentiality keys will be required to release them to the law
enforcement authorities.
Will a TTP be able to access an encrypted message ?
No. It is important to be clear that it is not envisaged that the encrypted
communication would be routed via the TTP. Nor will the TTP encrypt the message,
it will merely assist (depending on the service offered) in the very complex
area of key management or Key Certification.
If such a system is not mandatory why bother, surely crooks and terrorists
will use something else ?
Criminals will often make use of whatever technology is conveniently available
to them. We expect TTPs to have a major role in conveying secure electronic
communications, especially where a payment for legitimate services is involved.
Surely this is just a front for security agencies to expand their "big
brother" role ?
No. The UK accepts that businesses have a need to safeguard both the integrity
and confidentiality of their information, and is keen to find effective means
of meeting this need. The TTP approach will provide such a means, but in
a way that would also meet another important need, namely to preserve the
effectiveness of the existing powers to intercept communications. Similar
safeguards to those that already exist under the Interception of Communications
Act 1985 will be established. Widespread encryption has the potential to
make legally intercepted messages unreadable, to the detriment of all law
abiding citizens.
What about export controls - will they be relaxed ?
Products for specific use within a licensed TTP network should not create
export difficulties. The fact that they would be for use under such a system
should allow them to be exported with minimum restrictions being applied.
  
[End]
Return to FIPR Policy Archive
Return to FIPR front page