1998-01-06 - Re: Silly Shrinkwrapped Encryption

Header Data

From: Adam Back <aba@dcs.ex.ac.uk>
To: jim@mentat.com
Message Hash: 0ccf97156e1969a37c38b44c53b8aaabf238b433120619ac09dd0901d743f272
Message ID: <199801062128.VAA00264@server.eternity.org>
Reply To: <9801062004.AA18375@mentat.com>
UTC Datetime: 1998-01-06 21:37:07 UTC
Raw Date: Wed, 7 Jan 1998 05:37:07 +0800

Raw message

From: Adam Back <aba@dcs.ex.ac.uk>
Date: Wed, 7 Jan 1998 05:37:07 +0800
To: jim@mentat.com
Subject: Re: Silly Shrinkwrapped Encryption
In-Reply-To: <9801062004.AA18375@mentat.com>
Message-ID: <199801062128.VAA00264@server.eternity.org>
MIME-Version: 1.0
Content-Type: text/plain




Jim Gillogly <jim@mentat.com> writes:
> Eric Cordian says:
> > Could someone poke through Lotus Notes with a debugger and see exactly how
> > this "giving 24 bits to the government" is implemented? 
> 
> Lotus produced a "backgrounder" called "Differential Workfactor Cryptography"
> when they first promulgated the 64/40 stuff.  It says (in part):
> 
> 	We do that by encrypting 24 of the 64 bits under a public RSA key
> 	provided by the U.S. government and binding the encrypted partial
> 	key to the encrypted data.
> 
> I haven't seen the USG RSA key -- if it's 512 bits, that would be a humorous
> next factoring target.

It would be humorous to even have the modulus and exponent -- if
someone can obtain them, I'll package it up as a working PGP key, and
give it user id of Spook GAK key <dirnsa@nsa.gov>, and submit to the
keyservers.  Then we have solved the key escrow implementation
problems for the US government -- anyone who wants to send them a
message can simply add DIRNSA to the list of recipeints.

I don't have a copy of Notes, otherwise I thought this a most fun
exploit to attempt.

The above "solution" to key escrow infra-structure calls from Freeh
etc., should be credited to Carl Ellison; probably others have
proposed it also.  Carl offered to sign some cheif spooks key, if he
would generate one for the purpose, cheif spook declined the offer.

I observed a few times before that now that Lotus have organised with
the NSA to produce such a key, we can do the job of implementing the
voluntary key escrow infrastructure for them.  (It is voluntary
right?)

Adam
-- 
Now officially an EAR violation...
Have *you* exported RSA today? --> http://www.dcs.ex.ac.uk/~aba/rsa/

print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`






Thread