Skip to main content

Clipper Chip

Clipper Chip


the clipper chip is a cryptographic device intended to protect private communications for all but authorized monitoring by government agencies. Termed the clipper chip, the device would permit secure encrypted voice communications, but would also allow United States law enforcement and intelligence agencies to monitor those communications by obtaining the algorithm keys to decrypt the transmissions.

As initially proposed the government would allow the keys to be maintained in a database held by an independent agent. Access to those keys would be permitted only as legally authorized. Critics and privacy advocates immediately questioned the vague and broad use of the term legally authorized.

A chip similar in design and performance specifications, the Capstone chip, could be similarly regulated to allow secure data transmissions that could also be easily decrypted by United States law and intelligence agencies via known algorithmic keys.

An algorithm defines a repeatable step-by-step series of mathematical or language manipulation procedures to encrypt or decrypt a message or communication. Cryptology systems utilize algorithms and the labels, mechanics, recursive procedures, or other solutions are termed keys to the algorithm.

Use of the clipper chip was initially authorized in the United States in 1994. The National Institute of Standards and Technology (NIST) and the Department of the Treasury were designated to be the database repositories or escrow agents for the algorithmic keys. Rules regarding access to the keys were developed in accord with state and national security wiretap orders.

The clipper chip utilizes the SKIPJACK algorithm as part of the Escrowed Encryption Standard (EES) program. SKIPJACK was developed as a classified algorithm by the National Security Agency (NSA). SKIPJACK was initially developed as part of the Fortezza encryption suite and is a symmetric cipher with a fixed key length of 80 bits. Security experts assert that multiple encryption programs may eventually replace SKIPJACK like encryption-decryption programs.

See also Computer hardware security; Computer keystroke recorder; Computer software security; Microchip.



Baker, Stewart A. Dont Worry, Be Happy: Why Clipper Is Good for You. Wired. June 1994

Johnson, George. The Spies Code and How It Broke, New York Times, Week in Review. July 16, 1995

Cite this article
Pick a style below, and copy the text for your bibliography.

  • MLA
  • Chicago
  • APA

"Clipper Chip." The Gale Encyclopedia of Science. . 19 Sep. 2018 <>.

"Clipper Chip." The Gale Encyclopedia of Science. . (September 19, 2018).

"Clipper Chip." The Gale Encyclopedia of Science. . Retrieved September 19, 2018 from

Learn more about citation styles

Citation styles gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).

Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.

Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, cannot guarantee each citation it generates. Therefore, it’s best to use citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:

Modern Language Association

The Chicago Manual of Style

American Psychological Association

  • Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
  • In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.