1996-01-25 - Re: NSA advanced knowledge

Header Data

From: koontz@MasPar.COM (David G. Koontz)
To: perry@piermont.com
Message Hash: e33828f6fca3b58f50d349b4985860732e743635681ceaaede6864582ade2ec1
Message ID: <9601252014.AA03836@argosy.MasPar.COM>
Reply To: N/A
UTC Datetime: 1996-01-25 21:47:22 UTC
Raw Date: Fri, 26 Jan 1996 05:47:22 +0800

Raw message

From: koontz@MasPar.COM (David G. Koontz)
Date: Fri, 26 Jan 1996 05:47:22 +0800
To: perry@piermont.com
Subject: Re: NSA advanced knowledge
Message-ID: <9601252014.AA03836@argosy.MasPar.COM>
MIME-Version: 1.0
Content-Type: text/plain


In 1987 there were a series of papers given out as part of the package to
CCEP vendors (or prospective vendors):
 
The Secure Data Network System: An Overview             (NSA)
        By: Gary L. Tater
            Edmund G. Kerut
 
SDNS Products in the Type II Environment        (contains refer to 1987 paper)
        John Linn 
        BBN Communications Corporation  (need for easy Key Management)
          Cambridge, Massachusetts
 
SDNS Services and Architecture
        Ruth Nelson
        Electronic Defense Communications Directorate
        GTE Government Systems Corporation
        77 A Street
        Needham, MA 02194
 
        ....
                Key Management
                --------------
 
            The heart of SDNS is the Firefly keying 
            system,  which is based on public key en-
            cryption.  Each terminal has a unique Fire-
            fly key which is bound together with a
            non-forgeable certificate.  The certificate
            identifies the terminal and specifies its
            security-relevent characteristics.  Two
            SDNS terminals desiring to communicate ex-
            change certificates and keying information
            (the Firefly excange) and make access con-
            trol decisions based on the identifying in-
            formation.  The exchange generates a traf- 
            fic key which is unique to the two 
            terminals and which is new for that key ex-
            change.  If communication is permissible,
            the terminals then negotiate the communca-    
            tions parameters for use of the traffic
            key.
       ...    
 
SP4:  A Transport Encapsulation Security Protocol
        Dennis Branstad, National Bureau of Standards
        Joy Dorman, Digital Equipment Corporation
        Russell Housley, Xerox Corporation
        James Randall, International Business Machines Corporation
 
Access Control Within SDNS
        by Edward R. Sheehan
           Analytics Incorporated
           9821 Broken Land Parkway
           Columbia, Maryland 21046
 
None of these contained any dates except the 1987 paper  reference      
------------------------------------------------------------------
 
This is the earliest reference I know of to government public key cryptography,
and I was under the impression this was where the reference in Gus Simmons
book came from.





Thread