1993-10-21 - TEMPEST and Public key programs

Header Data

From: blaster@rd.relcom.msk.su (Victor A. Borisov)
To: cypherpunks@toad.com
Message Hash: 18c8ea5c37507c266e8f6e7b1e302c6efa4f3933155153b4b2f2f4d4448f8f6d
Message ID: <AB5BbnimWD@rd.relcom.msk.su>
Reply To: N/A
UTC Datetime: 1993-10-21 09:22:55 UTC
Raw Date: Thu, 21 Oct 93 02:22:55 PDT

Raw message

From: blaster@rd.relcom.msk.su (Victor A. Borisov)
Date: Thu, 21 Oct 93 02:22:55 PDT
To: cypherpunks@toad.com
Subject: TEMPEST and Public key programs
Message-ID: <AB5BbnimWD@rd.relcom.msk.su>
MIME-Version: 1.0
Content-Type: text/plain


>   Electromagnetic Pulse Surveillance Technology. Victor, I have a long
>   (58K) document about this which I'll be glad to send you, just ask.
Please, send this paper direct to me.

>   any information. Victor, could your friend in the KGB arrange for such
>   an experiment??
Exuse me please, but I don`t see this man about two week! I also can`t
ask this man about all (I like fredom :( ). As security men saw: "if smaller
know then better sleep".

>   Victor seems to be saying that his friend is saying that DES is a
>   "group" (if I remember my terms correctly), which somebody was
>   supposed to have proven wasn't the case.  Although, strictly speaking,
>   a "group" was supposed to be f=des, where Victor just says it's "very
>   like DES."
DES is`t group - f() only like to DES (I think, that computing dificult of
f() like des() one).

>   But multiple encryptions as Victor describes are not used. Rather
>   alternating encryptions and DEcryptions.  For example triple DES
>   dese(k1, desd(k2, dese(k3, plaintext)))  where "dese" is DES
>   encryption and "desd" is DES decryption.  What does your friend in
>   the KGB have to say about that, Victor?  If triple-DES reduces to
>   any reasonable transformation of (some) 56-bit key then it's almost
>   as easy to break as single-DES which we now know only requires 3 hours
>   on a $1 million specialized machine.
I`ll ask he about this.

>   Of more interest here, Victor, is what your KGB friend says about the
>   IDEA cipher, RSA Public Key encryption, and the MD5 message digest,
>   all of which are used in PGP.  We would also like to know if the KGB
>   has found any weaknesses in PGP or if they've even had occasion to try
>   to find any.
He made same program (LanCrypto). That why, I hear only bad words from
he. :) You can read about this program in cypherpunks.
From other KGB-men, I hear, that prophesor Sidelnicov (the well known
cryptoanalisist from Russia) saw, that PGP has some weak places:
 - random number is`t "good" random number.
 - md5 has hole (but here man lapse into salence:( ).
 - PGP for DOS don`t have any anti-overloking tools.

BTW: LanCrypto play on last weakness: thay wrote litle resident DOS program.
This program crack PGP and than pgp sign (and check) only part of message.
LanCrypto public this resalt in buziness newspaper and show program on the big
computer-show. I think this is rough market, but it work well (as all, that
KGB made:))!!!

Now I know 3 powerful public-key Russian programs. All wrote by exKGB man:

- "LanCrypto" has vary fast algorithm, litle sign and several tools for anti-
  intruding.

- "Exelence" has number of anti-intruding tools and powerful cryptographic
  algorithms. This pakage also has inteligance hardware keys for prevent
  introding.

- "Blitc". The central bank try to use this program, but boys from LanCrypto
  find rough hole in hash function of this program and compromite this firm.

Now I contact with LanCrypto and Elias (autors of "Exelence"). I hope to
use thouse programs in my Computer Security Center. If you want I try to
write about this programs.

--- 
Victor A. Borisov aka blaster;	Relcom R&D;
Email: blaster@rd.relcom.msk.su;
Phone: +7(095)-943-4735; +7(095)-198-9510;
	=== Don`t panic! ===





Thread