From: Eric Blossom <eb@comsec.com>
To: stewarts@ix.netcom.com
Message Hash: ca002099c7c6d9f12e1cd789b32a3a6944fd1320fb9c9a81bbce1a002ef36d9e
Message ID: <199509262156.OAA21527@comsec.com>
Reply To: <199509232254.PAA11243@ix8.ix.netcom.com>
UTC Datetime: 1995-09-26 22:25:03 UTC
Raw Date: Tue, 26 Sep 95 15:25:03 PDT
From: Eric Blossom <eb@comsec.com>
Date: Tue, 26 Sep 95 15:25:03 PDT
To: stewarts@ix.netcom.com
Subject: Re: The Fortezza random number generator is not trustworthy
In-Reply-To: <199509232254.PAA11243@ix8.ix.netcom.com>
Message-ID: <199509262156.OAA21527@comsec.com>
MIME-Version: 1.0
Content-Type: text/plain
> On a technical note, I would have thought that Fortezza and/or CAPSTONE used
> some sort of hardware RNG, i.e. noisy Zener diodes or whatever. I've seen it
> mentioned on this list that some other NSA secure phones, such as STU-III,
> do that.
I was under the impression that a seed for the RNG is loaded into the
Fortezza at initialization time. This would make me think that they
are using a cryptographically strong PRNG. This would give data that
appears random, but is completely determined by the initial state.
I suspect that the "seed keys" provided by the two agencies used to
program the Clipper chips has the same properties. This makes the
question about how does the NSA get access to the key escrow database
moot. They don't need access. They know a priori all the unit keys.
Return to September 1995
Return to “Eric Blossom <eb@comsec.com>”