From: “Timothy C. May” <tcmay@got.net>
To: cypherpunks@toad.com
Message Hash: 3eee61c19cf84813b0c6faba93f12ff1d95acec555a2c91f7b231e6bf3ef5cda
Message ID: <v03007801aea869b8d096@[207.167.93.63]>
Reply To: <v02140b0aaea854a8000a@[192.0.2.1]>
UTC Datetime: 1996-11-08 04:44:55 UTC
Raw Date: Thu, 7 Nov 1996 20:44:55 -0800 (PST)
From: "Timothy C. May" <tcmay@got.net>
Date: Thu, 7 Nov 1996 20:44:55 -0800 (PST)
To: cypherpunks@toad.com
Subject: Re: Why is cryptoanarchy irreversible?
In-Reply-To: <v02140b0aaea854a8000a@[192.0.2.1]>
Message-ID: <v03007801aea869b8d096@[207.167.93.63]>
MIME-Version: 1.0
Content-Type: text/plain
At 7:20 PM -0800 11/7/96, Peter Hendrickson wrote:
...
>I cannot speak for the GAK advocates. However, you could establish a
>system where messages between two countries are encoded with keys
>which are made available to only the two countries in question.
>
>A really simple scheme to do this would be for each country to publish
>a public key. You would be required to encrypt the key to the message
>with the national public key. That scheme would be fast to deploy.
Well, this is not what the proposals for GAK involve. If it were _only_ a
matter of each country requiring GAK for communicatons entering its
country, then this would be as you describe (not that many of us would
approve of it).
What complicates matters is that the U.S. proposes that _it_ keep
records/escrows of communications with, say, recipients in Libya. Or
Russia, or Burma, or Tazbekinoya. This means automatically that simplistic
models ("encrypt to the public key of Tazbekinoya" will not be sufficient).
>In a more complicated and secure scheme, you would be given a public key
>from each country that was unique for your communications at the same
>time you were granted your international communications license. The
>unique public key would be managed by a small group of people. This
>means that if it was ever compromised, most message traffic would be
>secure and those who were responsible would be easy to find.
>
>The only way you are at the mercy of the Libyans is if you do business
>in Libya.
No, I think you are missing the point. The issue about Libya is that the
GAK system must make decisions about when and under what conditions it
accedes to government wishes--for governments we may be hostile toward.
Or governments may be hostile toward us.
As I said in another message, I don't think there can be a unified GAK
policy. I believe the U.S. Administration hopes to browbeat enough nations
into compliance such that it--the U.S. government--controls which keys are
released and which are not. My point about "rogue" governments is that the
problems of Burma, Libya, etc. will not vanish. Clearly the U.S. government
will not settle for waiting for Libya or Burma to co-release keys....
And nothing in GAK says one gets to communicate with Libyan parties by
encrypting with the public key of Libya, thus bypassing the U.S. decryption
capabilities!
--Tim May
"The government announcement is disastrous," said Jim Bidzos,.."We warned IBM
that the National Security Agency would try to twist their technology."
[NYT, 1996-10-02]
We got computers, we're tapping phone lines, I know that that ain't allowed.
---------:---------:---------:---------:---------:---------:---------:----
Timothy C. May | Crypto Anarchy: encryption, digital money,
tcmay@got.net 408-728-0152 | anonymous networks, digital pseudonyms, zero
W.A.S.T.E.: Corralitos, CA | knowledge, reputations, information markets,
Higher Power: 2^1,257,787-1 | black markets, collapse of governments.
"National borders aren't even speed bumps on the information superhighway."
Return to November 1996
Return to ““Timothy C. May” <tcmay@got.net>”