Safekipedia
Encryption debateHistory of cryptographyKleptographyMass surveillance

Clipper chip

Adapted from Wikipedia · Discoverer experience

A close-up of the MYK-78 Clipper Chip, an important encryption device used in technology.

The Clipper chip was a special type of chipset created by the United States National Security Agency (NSA) in the early 1990s. Its purpose was to help protect voice and data messages by using encryption. However, the chip also had a hidden feature called a backdoor. This backdoor was designed so that government agencies could decode messages if they were ever intercepted.

MYK-78 "Clipper chip"

The idea behind the Clipper chip was to balance security for everyday users with the needs of law enforcement to access information in special cases. It was suggested for use by companies that send voice messages and data over long distances.

Introduced in 1993, the Clipper chip did not become widely used. By 1996, it was no longer in use. The story of the Clipper chip is an important part of the history of technology and discussions about privacy and security online.

Key escrow

The Clipper chip used a special way to send information, created by the National Security Agency. This method was kept secret at first, so others could not check it. Later, the details were shared with everyone.

The main idea was key escrow. When a new device with a Clipper chip was made, it had a secret code given to the government. If the government had permission, they could use this code to read messages sent by that device. Some people called this "key surrender" because they thought it meant giving away secrets.

Clinton Administration

The Clinton Administration believed the Clipper chip was important for law enforcement to stay strong as technology improved in the United States. Some people worried the device might help terrorists, but the Administration said it would actually help keep the country safe. They thought terrorists would need to use it to talk to banks, suppliers, and contacts, which would let the government listen to those conversations.

Other proponents

Some people supported the Clipper chip. They believed it was safe and useful for helping police and other officials understand secret messages when they had proper permission. Howard S. Dakoff wrote in a law journal that the technology was secure and the rules for using it made sense. Stewart Baker wrote in Wired magazine, explaining what he thought were misunderstandings about the chip.

Backlash

Wired magazine's anti-Clipper graphic

Organizations like the Electronic Privacy Information Center and the Electronic Frontier Foundation spoke out against the Clipper chip. They were worried that it would let the government watch people's messages too closely and that the chip's design was kept secret, so no one could check if it was truly safe.

Because of this backlash, strong encryption tools like Nautilus, PGP, and PGPfone became popular. People believed these tools would stay available no matter what the government tried to do.

Technical vulnerabilities

In 1994, a researcher named Matt Blaze showed that the Clipper chip had a big problem. The chip sent a special 128-bit code needed to unlock encrypted messages, but it used a short 16-bit security check to protect this code. This check wasn’t strong enough, and someone could easily create a fake code that would trick the chip into working without giving away the real unlock information.

MYK-78

Later, in 1995, two other experts found another way around the chip’s security. They showed that the special code from one chip could be used with messages from a different chip, letting people bypass the system meant to help law enforcement. These discoveries highlighted serious weaknesses in how the Clipper chip was designed to keep information secure.

Main article: Protocol Failure in the Escrowed Encryption Standard

Lack of adoption

The Clipper chip was not widely accepted by people or companies, and it became unimportant by 1996. The main buyer of phones with this chip was the United States Department of Justice. The U.S. government tried to encourage the use of a system called key escrow by giving rewards to companies. This would have made it easier to export certain types of software.

However, the growth of strong encryption technologies like PGP made these efforts less effective, as these technologies were not controlled by the U.S. government. Even today, most cell phone calls are not strongly encrypted. While there are secure phone devices and smartphone apps, they often need special hardware and both parties in a conversation must use the same encryption method. These apps usually send messages through secure Internet paths, such as ZRTP, rather than regular phone networks.

Later debates

After the Snowden disclosures in 2013, companies like Apple and Google decided to use strong encryption on smartphones so that not even the companies could access users' data. This decision caused concern among some law enforcement officials, who felt it would make it harder to investigate certain crimes. Some people suggested special methods to allow government access to encrypted data when needed, but others warned that such methods could create serious security risks and privacy issues.

This article is a child-friendly adaptation of the Wikipedia article on Clipper chip, available under CC BY-SA 4.0.

Images from Wikimedia Commons. Tap any image to view credits and license.