display | more...

The art and science of stealing information securely and subliminally. Kleptographic attacks are primarily geared towards designing black box ciphers to leak secret key information securely and subliminally to the designer. Term coined by Adam Young and Moti Young at the Crypto '96 Rump Session Presentations. Key escrow is a special case of this, some real-world examples of products that use it include the Clipper chip and the ADK feature in PGP.

Log in or register to write something here or to contact authors.