1995-10-25 - RE: 80 bit security from 40 bit exportab

Header Data

From: agermain@cmp.com (Germain Arthur)
To: jeffb@sware.com (Jeff Barber)
Message Hash: 8be9a3d18426e0c1aa028a2097a730b9bc0ac23d10efb31cc583b27faf9ba00c
Message ID: <1995Oct25.093122.1151.341074@smtpgate.cmp.com>
Reply To: N/A
UTC Datetime: 1995-10-25 13:31:05 UTC
Raw Date: Wed, 25 Oct 95 06:31:05 PDT

Raw message

From: agermain@cmp.com (Germain Arthur)
Date: Wed, 25 Oct 95 06:31:05 PDT
To: jeffb@sware.com (Jeff Barber)
Subject: RE: 80 bit security from 40 bit exportab
Message-ID: <1995Oct25.093122.1151.341074@smtpgate.cmp.com>
MIME-Version: 1.0
Content-Type: text/plain



I have unsubscribed from this mailing list. Please remove my name from   
your personal address lists. Thanks.

ahg3

 ----------
From:  Jeff Barber[SMTP:jeffb@sware.com]
Sent:  Tuesday, October 24, 1995 4:05 PM
To:  RobertW.Baldwin
Cc:  cypherpunks
Subject:  Re: 80 bit security from 40 bit exportable products


baldwin writes:
>
>         Long ago vendors should have put encryption into network layer
> products, but for a variety of reasons that effort was delayed or
> discouraged.  One effect of this lack is that almost every layer of
> the network stack is adding its own encryption.  For example, the
> HTTP session layer added S-HTTP and the TCP transport layer added
> SSL.  Soon we will have network layer encryption with IPsec.
>         The vendors for each layer can export a product that uses
> ciphers with 40 bit keys.  A user can then combine multiple
> products to get more than 40 bits worth of security.  For example,
> a web client might fetch an S-HTTP page over an SSL protected link
> via a firewall that supports IPsec tunnels.  That's three 40 bit
> keys protecting the data over the internet link (of course, this
> may not be equivalent to a 120 bit cipher, that depends on the
> details of the cipher systems and independence of the key setups).
> Interesting possibilities.
>                 --Bob Baldwin

Even if you assume complete independence of key setup, if a successful
decryption at each layer can be independently detected and verified
(which seems likely in your example), there're only about 3 * (2 ^ 40)
total operations in the worst case, NOT 2 ^ (3 * 40) operations needed
to expose the plaintext.  This is an effective 41.5 bits, not 120.


 -- Jeff







Thread