From: fergp@sytex.com (Paul Ferguson)
To: cypherpunks@toad.com
Message Hash: 83e6d4a13a0be53848c6be02ceef962a8091afb052577b45d313a72733940809
Message ID: <ycye3B1w165w@sytex.com>
Reply To: N/A
UTC Datetime: 1993-04-22 17:18:26 UTC
Raw Date: Thu, 22 Apr 93 10:18:26 PDT
From: fergp@sytex.com (Paul Ferguson)
Date: Thu, 22 Apr 93 10:18:26 PDT
To: cypherpunks@toad.com
Subject: Fowarded messages from RISKS
Message-ID: <ycye3B1w165w@sytex.com>
MIME-Version: 1.0
Content-Type: text/plain
Greets.
These two forwarded message are from the RISKS Forum (14.51). I
thought some of you folks might be interested. (Padgett Peterson is
a fellow assembler buff who is better known on comp.virus.)
---- Forwded Messages --------------------------
Date: Mon, 19 Apr 93 9:21:53 EDT [RISKS-14.51]
From: Clipper Chip Announcement <clipper@first.org>
Organization: FIRST, The Forum of Incident Response & Security Teams
Subject: Slide presented at White House briefing on Clipper Chip
Note: The following material was handed out a press briefing on the
Clipper Chip on 4/16.
Chip Operation
Microchip
User's Message +----------------------+
------------------> | | 1. Message encrypted
| Encryption Algorithm | with user's key
| |
| Serial # | 2. User's key
encrypted
| |--> with chip unique
key
| Chip Unique Key |
User's Encryption | | 3. Serial # encrypted
Key | Chip Family Key | with chip family
key
------------------> | |
| |
+----------------------+
For Law Enforcement to Read a Suspect's Message
1. Need to obtain court authorized warrant to tap the suspect's
telephone.
2. Record encrypted message
3. Use chip family key to decrypt chip serial number
4. Take this serial number *and* court order to custodians
of disks A and B
5. Add the A and B components for that serial number = the chip
unique key for the suspect user
6. Use this key to decrypt the user's message key for
this recorded message
7. Finally, use this message key to decrypt the recorded message.
- ------------------------------
Date: Sat, 17 Apr 93 09:12:57 -0400 [RISKS-14.51]
From: padgett@tccslr.dnet.mmc.com (A. Padgett Peterson)
Subject: "Clipper Chip"
I suppose we should have expected something after all of the sound and
fury of the last few years. The announcement does not really give
enough information though.
My first thought involves conventional compromise: what happens if the
keys are captured through theft *and you know about it* - how
difficult is it to change the keys ? What do you do between the time
the loss is detected and the time a new key set is approved. How
difficult is it to program the chip or do you need a new one ? (and
if the chip can be reprogrammed, how do you prevent covert changes
that will not be discovered until authorization to tap is received and
the agency finds out that it cannot ?). Potentially this must occur
every time a trusted employee leaves.
For some time, I have been playing with dynamic access cards ("tokens")
as seeds for full session encryption rather than just for password
devices. Since the encryption requires three parts (PIN, challenge, and
token) which are only physically together at the secure system, and since
only the challenge passes on the net, and since once encryption starts
you have not only provided protection to the session, you have also
authenticated both ends simultaneously (by the fact that you can
communicate), it seems ideal. *And everything necessary already exists*.
From several US companies. It just has not been put together as a
commercial product (FUD at work 8*(.
Since key generation is on-the-fly at the onset of the session, obviously
what the gov needs is not the key but the "key to the key" (of course
computers, even a PC, are really good at this.
The real question is "Why a new chip ?" The technology to do this has
been around for years and several DES chips are available commercially
today. The BCC laptop (I like Beaver better 8*) 007 provides this
internally today with (I believe) the LSI-Logic chip and
Enigma-Logic's PC-SAFE (plugs) does the same with software alone. As
indicated in the announcement, financial institutions have been using
encrypted transmissions for years without any great outcry.
IMHO the real hold-up has been $$$ - cheap error-correcting modem
technology to prevent synch losses rather than a lack of good crypto
algorithms. Today this is a done deal (actually we have known how to
keep in synch since the sixties but you couldn't buy 56kb for under
$300.00 at BizMart - now part of K-Mart ! - then).
True, there are a lot of questions yet to be answered, but again IMHO
most center on the exception cases and not the encryption technology
itself.
Padgett
---- End Forwarded Messages --------------------------
Cheers.
Paul Ferguson | Uncle Sam wants to read
Network Integration Consultant | your e-mail...
Centreville, Virginia USA | Just say "NO" to the Clipper
fergp@sytex.com | Chip...
Return to April 1993
Return to “fergp@sytex.com (Paul Ferguson)”
1993-04-22 (Thu, 22 Apr 93 10:18:26 PDT) - Fowarded messages from RISKS - fergp@sytex.com (Paul Ferguson)