|
|
Newsgroups: sci.crypt |
|
|
Path: cantaloupe.srv.cs.cmu.edu!das-news.harvard.edu!noc.near.net!howland.reston.ans.net!wupost!mont!mizzou1.missouri.edu!C445585 |
|
|
From: [email protected] (John Kelsey) |
|
|
Subject: Corporate acceptance of the wiretap chip |
|
|
Message-ID: <16[email protected]> |
|
|
Sender: [email protected] |
|
|
Nntp-Posting-Host: mizzou1.missouri.edu |
|
|
Organization: University of Missouri |
|
|
References: <[email protected]> <1[email protected]> <115863@bu.edu> <strnlghtC5nrHw.1[email protected]> <pgf.735187239@srl03.cacs.usl.edu> |
|
|
Date: Mon, 19 Apr 93 01:13:29 CDT |
|
|
Lines: 60 |
|
|
|
|
|
|
|
|
[email protected] (David Sternlight) writes: |
|
|
> |
|
|
>>What follows is my opinion. It is not asserted to be "the truth" so no |
|
|
>>flames, please. It comes out of a background of 20 years as a senior |
|
|
>>corporate staff executive in two Fortune 50 companies. |
|
|
> |
|
|
>>I |
|
|
>>they told me it was more secure than DES, and in particular resistant to |
|
|
>>attempts by Japanese, French, and other competitive companies and |
|
|
>>governments to break. |
|
|
> |
|
|
>>I |
|
|
>>the bona fides of the escrow agencies (the Federal Reserve would certainly |
|
|
>>satisfy me, as would something set up by one of the big 8 accounting firms). |
|
|
|
|
|
I don |
|
|
It |
|
|
and it |
|
|
proposed scheme *is* a major improvement in telephone security to what |
|
|
exists now. |
|
|
|
|
|
The problem is that, with any security scheme of this kind, you have to |
|
|
concern yourself with the weakest link in the chain. I suspect that NSA |
|
|
has put a fairly strong encryption algorithm in this wiretap chip of theirs, |
|
|
probably at least as strong as (say) DES in OFB-mode. Unfortunately, the |
|
|
existence of the key-registry system seems to make possible all kinds of |
|
|
possible attacks at a small fraction of the expense of trying to build (say) |
|
|
a DES keysearch machine. |
|
|
|
|
|
As originally described, it sounded like any police / court combination |
|
|
could acquire the key for a given chip. I hope that |
|
|
it would imply a glaring hole. (How much does it cost to find *one* crooked |
|
|
jodge and *one* crooked cop? Especially for a foreign intelligence agency |
|
|
or organized crime boss?) However, even if more intelligent schemes are used |
|
|
to allow access to the unencrypted phone conversations, there will be weak- |
|
|
nesses. They may be very expensive, and very difficult. But who would |
|
|
trust his/her confidential information to an encryption scheme that, for |
|
|
(say) $100,000 could by cracked one time in a hundred? (DES, for all the |
|
|
complaints about a 56-bit key, would probably cost several million dollars |
|
|
to build a keysearch machine for.) |
|
|
|
|
|
How many million dollars would the confidential phone messages of |
|
|
the GM headquarters be worth to Nissan, Chrysler, or Audi? How about |
|
|
home phones of major execs and important engineers and designers? |
|
|
"Gee, Mr Jones, I understand you've had some financial problems lately. |
|
|
Maybe I can help..." |
|
|
|
|
|
>>I |
|
|
>>Swiss or anybody Japanese. |
|
|
|
|
|
Indeed, if NSA really designed the algorithm to be secure, it |
|
|
as secure as IDEA or 2-key DES. However, the system as a whole isn |
|
|
to "practical cryptanalysis." In _The Puzzle Palace_, Bamford describes how |
|
|
several NSA employees were turned by foreign (presumably KGB) agents, despite |
|
|
security measures that I doubt any Big 8 accounting firm could match. And |
|
|
NSA confidential data was *not* subject to being requested by thousands of |
|
|
police organizations and courts across the land. |
|
|
|
|
|
--John Kelsey, [email protected] |
|
|
|