From: “Jean-Francois Avon” <jf_avon@citenet.net>
To: “Cypherpunks” <cypherpunks@toad.com>
Message Hash: 7c0e510b15d4a715aeecb80f1d3b7446d39fc9fcaa44a0774e24547c8b979a10
Message ID: <199807172040.QAA09454@cti06.citenet.net>
Reply To: N/A
UTC Datetime: 1998-07-17 20:26:02 UTC
Raw Date: Fri, 17 Jul 1998 13:26:02 -0700 (PDT)
From: "Jean-Francois Avon" <jf_avon@citenet.net>
Date: Fri, 17 Jul 1998 13:26:02 -0700 (PDT)
To: "Cypherpunks" <cypherpunks@toad.com>
Subject: No Subject
Message-ID: <199807172040.QAA09454@cti06.citenet.net>
MIME-Version: 1.0
Content-Type: text/plain
The original paper is available at:
http://www.cisco.com/warp/public/146/july98/2.html
For any precise analysis, use the original document at the aforementionned address.
------------- begin "cut and paste" text ---------------
White Paper
The Export of Certain Networking Encryption Products under ELAs As An Alternative to
"Key Escrow/Recovery Products" under KMI: A Networking Industry White Paper on
Encryption Export Controls
by
Elizabeth Kaufman, Cisco Systems, Inc. and
Roszel C. Thomsen II, Thomsen & Burke LLP
Encryption Press Release
PR Contact: Doug Wills, (408) 527-9475, dwills@cisco.com
Executive Summary
The Clinton Administration's export control policy is designed to promote development of cryptographic products that provide law enforcement agencies with
access to encrypted data. Products that implement key escrow/recovery to provide such access are broadly exportable under License Exception KMI.
Although some customers have indicated interest in products that implement key escrow/recovery for stored data, customers generally oppose mandatory key
escrow/recovery for data in transit. This White Paper proposes that certain networking encryption products that provide for authorized access without key
recovery should also be eligible for broad export under appropriate Encryption Licensing Arrangements.
The Administration's export control policy must also reflect the equities of the intelligence community. Therefore, the proposed Encryption Licensing
Arrangements should be approved subject to riders and conditions designed to prevent the export of strong encryption products to military end-users, for
military end-uses, or to any government ministry, agency or department of certain countries.
The operational characteristics of networking encryption products to be eligible for export under appropriate Encryption Licensing Arrangements are not
complex. Simply stated, the operator action model delivers a 'private door-bell,' not a 'house-key' to parties lawfully seeking access to data. Qualifying
products must incorporate an operator-controlled management interface that enables dynamic, real-time access to specified network traffic prior to
encryption, or after decryption, at a designated access point.
Background
In Executive Order 13026 of November 15, 1996, President Clinton said that cryptographic products implementing the Key Management Infrastructure
("KMI") would be eligible for export without licenses after a one-time technical review.1 On December 30, 1996, the Commerce Department's Bureau of
Export Administration ("BXA") published an interim rule amending the Export Administration Regulations ("EAR", 15 CFR Part 730 et seq.) that implements
Executive Order 13026.2
The better-known provision of this interim rule states that "key escrow or key recovery products" are exportable under License Exception KMI. The term
"key escrow or key recovery products" is defined in great detail in Section 740.8(d)(1)(i) and Supplement No. 4 to Part 742 of the EAR.
A lesser-known provision of this interim rule states that "other recoverable encryption products" shall receive "favorable consideration" for export. The term
"other recoverable encryption items" is defined briefly in Section 740.8(d)(1)(ii) of the EAR, and the type of "favorable consideration" that should be accorded
to such products is not defined at all. The ambiguity of this provision provides an opportunity to explore new approaches to exporting cryptographic products.
Overview
Industry has studied the technical, market and policy issues surrounding the KMI. These studies suggest that there may be market demand for products
implementing key escrow/recovery techniques for retrieval of encrypted stored data. Such products would also appear to meet law enforcement's
requirements for retrieval of encrypted stored data. However, no market demand exists for products implementing key escrow/recovery techniques for
retrieval of encrypted transient data. Eminent cryptographers have argued that key escrow/recovery techniques create unnecessary risks for encrypted
transient data.3 The National Security Agency ("NSA") has confirmed these findings.4
The networking industry proposes that certain networking encryption products described in this White Paper may receive wide market acceptance and meet
the requirements of law enforcement with respect to transient data without implementing key recovery. The intelligence community's equities, though not
reflected in the EAR, must be respected as well.
Analysis of Market Requirements
In order to meet market requirements, networking encryption products must: (1) provide strong security, (2) adhere to open standards, and (3) support an
operator-controlled management mechanism to specify encrypted flows.
Strong security is essential for products that encrypt transient data. Customers, particularly service providers, have stated repeatedly and emphatically that they
will not purchase products that encrypt transient data, if those products also facilitate unauthorized, covert surveillance by third parties. The government should
encourage the deployment of products that implement strong security, because such products will deter certain kinds of crimes, like theft of trade secrets by
third parties.
Deployment of products that encrypt transient data requires open standards. Without open standards, different vendors' products will not inter-operate, and
broad deployment will not be possible. The government should encourage the deployment of standards-compliant products, because it has a shared interest in
a common cross-vendor solution and the rapid deployment of strong new viable technologies.
Some customers also have indicated that operator-control of encryption flows is a useful feature for network diagnostics and reporting, and for allowing the
efficient transmission of non-sensitive data. Customers in regulated industries, such as banking and securities, also may need to monitor their employees'
communications from time-to-time. Most customers also desire the ability to respond to a court order without exposing all of their data across the Internet or
the public switched telephone network.
Analysis of Government Requirements
The EAR describes key escrow/recovery products primarily in terms of their utility to law enforcement. The government's interests, however, are not
monolithic. The law enforcement and intelligence communities have different requirements.
Law enforcement's main priority has been to establish procedures for access to encrypted data in transit that are comparable to existing procedures for voice
communications and therefore capable of introduction into evidence in a court of competent jurisdiction. The technical characteristics of the networking
encryption products described in this White Paper will be of greatest interest to law enforcement, because these technical characteristics are the key to
meeting law enforcement's requirements for access to plaintext.
The intelligence community, on the other hand, has not shown much confidence that key escrow/recovery will meet its requirements since the secret Skipjack
algorithm and governmental escrow agents featured in the original Clipper Chip were abandoned in favor of vendor-selected algorithms and commercial
escrow agents. Its primary concern currently appears to be the broad deployment of encryption technology that does not interfere with current best
operational practices. In this regard, the technical characteristics of qualifying products may be of secondary importance to the intelligence community, and
proposed riders and conditions on the ELA may be of greater importance.
An Alternative to Key Escrow/Recovery for Networking Products
Although key escrow/recovery is not acceptable for data in transit, some customers require a mechanism that can reveal real-time plaintext for network
diagnostics and reporting, the transmission of non-sensitive data, occasional employee monitoring, and to support law enforcement. The proposed alternative
to key escrow/recovery does not require weakened cryptography, yet provides access similar to that currently available for voice communications.
Packet switched data networks handle traffic differently than circuit-switched voice networks. Circuit switched voice networks are characterized by the
opening of a dedicated circuit where communications are transferred in "real time." Packet switched networks are a statistically-multiplexed environment where
communications are routed packet-by-packet, so that data is fragmented but delivered in near real time. In spite of these differences, packet switched data
networks can, with some limitations, enable real-time access to plaintext. The proposed alternative to key recovery provides customers with full-strength
encryption, while simultaneously enabling the dynamic creation of an access point that allows real-time interception of plaintext based upon the target's source
or destination, whether the product is located within an enterprise or at a service provider's premises.
Two Access Scenarios: Access in the Enterprise, and Access at a Service Provider's Premises
The access point concept is not a perfect solution for all products. For example, it does not easily apply to user-to-user desktop applications. However, it
does appear to offer a reasonable alternative to key recovery on many classes of network applications and platforms. Specifically, it is a viable approach to
access to plaintext for devices where the individual responsible for data creation/reception is not the same individual responsible for platform operation. Such
devices constitute a significant percentage of the available networked platforms, including firewalls, routers, switches and other networking devices.
Classes of Network Devices
Self-managed
3rd party-managed
Single-user
Home PC
Enterprise desktop
Enterprise telephone
Set-top box
Service Provider VPN
Outsourced firewall
Multi-user
Enterprise network
Enterprise server
Multi-user workstation
Can provide access to plaintext without the end user's knowledge
Meeting Law Enforcement Requirements
In order to be exportable under the proposed Encryption Licensing Arrangements, networking encryption products must contain a management interface that
dynamically controls encryption by source and destination address, and by network protocol, to enable real-time access to selected network traffic prior to
encryption or after decryption. The operational characteristics of these products may be summarized below:
a) A qualifying network encryption product must incorporate an encryption management interface that:
i) is remotely accessible;
ii) controls the encryption configuration of the platform;
iii) configures encryption policy by source and destination network address;
iv) enables a remote operator to modify the encryption configuration dynamically;
v) enables the interception of network traffic between a specific source and destination either prior to encryption or after decryption at a defined access
point;
b) A qualifying network encryption product may:
i) be hardware, software, or a combination of hardware and software;
ii) encrypt any network protocol and/or at any network layer;
iii) support any
a) encryption algorithm
b) key length
c) key generation mechanism
d) key management scheme;
iv) be standalone, or integrated with other functions;
v) be a single user, multi-user or infrastructure platform;
vi) enable interception on the wire, on media (such as a hard disk), via a specialized communications port, or at another defined access point.
Two figures that illustrate how qualifying products may provide access to plaintext are set forth in Figures 1 and 2 of this paper.
Meeting Intelligence Community's Requirements
Current best operational practices are not widely understood by the public, and they may be compromised by the broad deployment of networking encryption
products, whether of US or of foreign manufacture. However, the possible loss of access to plaintext communications due to use of commercial cryptography
must be analyzed within the broader framework of advances in new technologies. As one eminent cryptographer testified before the Senate Judiciary
Subcommittee on Technology and the Law, "Advances in emitter identification, network penetration techniques, and the implementation of cryptanalytic or
crypto-diagnostic operations within intercept equipment are likely to provide more new sources of intelligence than are lost as a result of commercial use of
cryptography."5
In further recognition of and deference to the intelligence community's equities, industry is not requesting authorization to export products with key lengths
exceeding 56 bits to military end-users or for military end-uses, or to any government ministry, agency or department of the countries listed in "Tier 3" (as
defined for purposes of computer export controls). Exports of products exceeding 56 bits to these end-users would require a separate license issued by BXA
after full inter-agency review under applicable Executive Orders. The differences between the proposed ELA and export under License Exception KMI are
summarized in the chart below:
License Exception KMI
Proposed ELA
Eligible Products
Key recovery products
Products providing access to plaintext at intermediate stations of the data network
Territory
All except Cuba, Iran, Iraq, Libya, North Korea,
Sudan and Syria
Same as KMI
Eligible End-users
All end-users are eligible
(1) All end-users are eligible for 56 bit products,
HOWEVER,
(2) Products exceeding 56 bits would not be eligible for government agencies and
military end-users in Tier 3 countries
Duration
Indefinite
Three years, renewable in three year increments
Reporting
Biannual
Same as KMI
Conclusion
This White Paper has defined a class of networking encryption products that should be authorized for export under appropriate Encryption Licensing
Arrangements. The operational characteristics of qualifying products ensure that law enforcement will continue to enjoy authorized real-time access to plaintext
References:
1. 61 FR 58767.
2. 61 FR 68572.
3. The Risk of Key Recovery, Key Escrow and Trusted Third Party Encryption,
H.Abelson et al. on June, 1998.
4. Threat and Vulnerability Model for Key Recovery (KR), NSA, X3
on February 18, 1998.
5. Key Escrow: Its Impact and Alternatives, testimony of Dr. Whitfield Diffie,
Distinguished Engineer, Sun Microsystems, Inc. before the Senate Judiciary
Subcommittee on Technology and Law on May 3, 1994.
Cisco Systems
Cisco Systems, Inc. (NASDAQ: CSCO) is the worldwide leader in networking for the Internet. News and information are available at
http://www.cisco.com.
For more information visit Cisco PR Contacts
All contents copyright (c) 1992--1998 Cisco Systems Inc. Important notices.
---------- end of "cut and paste" text ---------------
Jean-Francois Avon, B.Sc. Physics, Montreal, Canada
DePompadour, Socit d'Importation Lte
Limoges fine porcelain and french crystal
JFA Technologies, R&D physicists & engineers
Instrumentation & control, LabView programming
PGP keys: http://bs.mit.edu:8001/pks-toplev.html
PGP ID:C58ADD0D:529645E8205A8A5E F87CC86FAEFEF891
PGP ID:5B51964D:152ACCBCD4A481B0 254011193237822C
Return to July 1998
Return to ““Jean-Francois Avon” <jf_avon@citenet.net>”
1998-07-17 (Fri, 17 Jul 1998 13:26:02 -0700 (PDT)) - No Subject - “Jean-Francois Avon” <jf_avon@citenet.net>