851 lines
38 KiB
Plaintext
851 lines
38 KiB
Plaintext
![]() |
|
|||
|
|
|||
|
Computer underground Digest Tue Aug 17 1993 Volume 5 : Issue 62
|
|||
|
ISSN 1004-042X
|
|||
|
|
|||
|
Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
|||
|
Archivist: Brendan Kehoe
|
|||
|
Shadow-Archivists: Dan Carosone / Paul Southworth
|
|||
|
Ralph Sims / Jyrki Kuoppala
|
|||
|
Ian Dickinson
|
|||
|
Copie Editor: Etaoin Shrdlu, Senior
|
|||
|
|
|||
|
CONTENTS, #5.62 (Aug 17 1993)
|
|||
|
File 1--CU News ("Software felons," "Valuing Info," et. al.)
|
|||
|
File 2--CuNews ("Technofogies" and more)
|
|||
|
File 3--Another BBS Seizure in Hartford
|
|||
|
File 4--Call for Clipper Comments
|
|||
|
|
|||
|
Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
|
|||
|
available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The
|
|||
|
editors may be contacted by voice (815-753-0303), fax (815-753-6302)
|
|||
|
or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
|
|||
|
60115.
|
|||
|
|
|||
|
Issues of CuD can also be found in the Usenet comp.society.cu-digest
|
|||
|
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
|
|||
|
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
|
|||
|
libraries and in the VIRUS/SECURITY library; from America Online in
|
|||
|
the PC Telecom forum under "computing newsletters;"
|
|||
|
On Delphi in the General Discussion database of the Internet SIG;
|
|||
|
on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG
|
|||
|
WHQ) (203) 832-8441 NUP:Conspiracy; RIPCO BBS (312) 528-5020
|
|||
|
CuD is also available via Fidonet File Request from 1:11/70; unlisted
|
|||
|
nodes and points welcome.
|
|||
|
EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
|
|||
|
In ITALY: Bits against the Empire BBS: +39-461-980493
|
|||
|
|
|||
|
ANONYMOUS FTP SITES:
|
|||
|
UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud
|
|||
|
etext.archive.umich.edu (141.211.164.18) in /pub/CuD/cud
|
|||
|
halcyon.com( 202.135.191.2) in /pub/mirror/cud
|
|||
|
aql.gatech.edu (128.61.10.53) in /pub/eff/cud
|
|||
|
AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD.
|
|||
|
EUROPE: nic.funet.fi in pub/doc/cud. (Finland)
|
|||
|
ftp.warwick.ac.uk in pub/cud (United Kingdom)
|
|||
|
|
|||
|
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
|||
|
information among computerists and to the presentation and debate of
|
|||
|
diverse views. CuD material may be reprinted for non-profit as long
|
|||
|
as the source is cited. Authors hold a presumptive copyright, and
|
|||
|
they should be contacted for reprint permission. It is assumed that
|
|||
|
non-personal mail to the moderators may be reprinted unless otherwise
|
|||
|
specified. Readers are encouraged to submit reasoned articles
|
|||
|
relating to computer culture and communication. Articles are
|
|||
|
preferred to short responses. Please avoid quoting previous posts
|
|||
|
unless absolutely necessary.
|
|||
|
|
|||
|
DISCLAIMER: The views represented herein do not necessarily represent
|
|||
|
the views of the moderators. Digest contributors assume all
|
|||
|
responsibility for ensuring that articles submitted do not
|
|||
|
violate copyright protections.
|
|||
|
|
|||
|
----------------------------------------------------------------------
|
|||
|
|
|||
|
Date: Sat, 31 Jul 93 02:01:00 BST
|
|||
|
From: grmeyer@GENIE.GEIS.COM
|
|||
|
Subject: File 1--CU News ("Software felons," "Valuing Info," et. al.)
|
|||
|
|
|||
|
Software Felons
|
|||
|
===============
|
|||
|
A federal grand jury in California handed down felony indictments for
|
|||
|
software piracy near the first week of July. These are the first
|
|||
|
indictments under the law that makes copyright infringement a fel ony.
|
|||
|
The indictments follow coast-to-coast raids over the past four months
|
|||
|
where US Marshals seized over 9.5 millions dollars worth of MS-DOS
|
|||
|
and Windows operating systems.
|
|||
|
(Information Week. July 12, 1993. pg 8)
|
|||
|
|
|||
|
Valuing Information
|
|||
|
===================
|
|||
|
How much are your computer files really worth? The Information
|
|||
|
Systems Security Association has put together a panel to create a
|
|||
|
methodology for determining the value of information. Representatives
|
|||
|
from Chase Manhattan Bank, Bank America, and Motorola are among the
|
|||
|
panel members. The ISSA suggests that valuation can be determined in
|
|||
|
three ways: Cost to acquire/develop/maintain the info, value to
|
|||
|
owners/others, and commercial value.
|
|||
|
(Information Week. July 12, 1993. pg 62)
|
|||
|
|
|||
|
Virus "fax vote" results
|
|||
|
========================
|
|||
|
Information Week magazine recently conducted a self-selected survey
|
|||
|
of IS managers and virus security. Some of the more interesting
|
|||
|
results include:
|
|||
|
|
|||
|
Measures implemented to deal with virus threat:
|
|||
|
65% training
|
|||
|
86% purchased anti-viral software
|
|||
|
|
|||
|
Company practices altered as a result of virus threat:
|
|||
|
49% use of shareware
|
|||
|
47% downloading from BBSs
|
|||
|
|
|||
|
State of the virus threat during the past 12 months:
|
|||
|
48% increased
|
|||
|
34% stayed the same
|
|||
|
|
|||
|
Number of machines infected during past year:
|
|||
|
42% none
|
|||
|
46% less than 25%
|
|||
|
|
|||
|
For the complete results in each category, and for other questions
|
|||
|
and comments, refer to Information Week. July 19, 1993. Pgs 25 and
|
|||
|
following.
|
|||
|
|
|||
|
Holy Data Islands!
|
|||
|
==================
|
|||
|
The Wall Street Journal (July 12, 1993 p B-2) reports that a company
|
|||
|
founded by Ed Leonard has been farming out data for storage at
|
|||
|
monasteries. Customers like the prices, and the dedication and
|
|||
|
discretion of the monks is apparently unmatched.
|
|||
|
(Information Week. July 19, 1993. pg 62)
|
|||
|
|
|||
|
Singapore Piracy
|
|||
|
================
|
|||
|
Lotus and Novell have filed criminal charges against a man and wife
|
|||
|
in Singapore after they were found guilty in a civil suit for
|
|||
|
copyright and trademark violations. The companies obtained a court or
|
|||
|
der to freeze nearly one million dollars in assets belonging to the
|
|||
|
pair, who had sold thousands of illegal software copies in Southeast
|
|||
|
Asia.
|
|||
|
(Information Week. May 10, 1993. pg. 8)
|
|||
|
|
|||
|
Computer Ethics Institute Conference
|
|||
|
====================================
|
|||
|
Information Week reports that Congressman Edward Markey (D - Mass.)
|
|||
|
made the following remarks at the conference.
|
|||
|
|
|||
|
"Just because personal information can be collected electronically,
|
|||
|
can be gleaned off the network as people call 800 number or click
|
|||
|
channels on the television, or can be cross-referenced into
|
|||
|
sophisticated lists and put on line for sale to others, does not
|
|||
|
mean that it has been technologically predetermined that privacy
|
|||
|
and social mores should be bent to that capability. (...) The
|
|||
|
Constitution is a 200-year-old parchment, simply because we digitize
|
|||
|
the words should not suggest their meanings change." Later, Markey
|
|||
|
commented that "Real harm can be done in the virtual world."
|
|||
|
|
|||
|
Refer to "Ethics and Cyberculture" , Information Week, May 10, 1993
|
|||
|
pg. 60 for more information on the conference and Markey's speech.
|
|||
|
|
|||
|
Follow-up on Epson America Email Case
|
|||
|
=====================================
|
|||
|
Alana Shoars, plaintiff in a case against Epson America, reports that
|
|||
|
she's "slogging forward" with the case. Shoars was dismissed from her
|
|||
|
Email administrator job in January 1990 after she complained that by
|
|||
|
monitoring employees' Email the company was invading their privacy.
|
|||
|
Her wrongful termination lawsuit, as well as a class-action lawsuit
|
|||
|
brought on behalf of 170 Epson employees, is in appellate court.
|
|||
|
(Information Week. July 26, 1993. pg 62)
|
|||
|
|
|||
|
Political Censorship at Microsoft?
|
|||
|
==================================
|
|||
|
Gregory Steshenko was allowed to emigrate from the Soviet Union to
|
|||
|
the US in 1987. Last September he landed a job with Microsoft as a
|
|||
|
support engineer. Last month he was fired, he says, for sending
|
|||
|
political messages over the Internet. Microsoft contends it was solely
|
|||
|
for performance reasons. Steshenko's messages typically centered on
|
|||
|
the political situation in his native Ukraine, and his view that the
|
|||
|
Ukrainian government is more corrupt than the previous Communist
|
|||
|
government. ( In fact, Steshenko was once imprisoned in the Soviet
|
|||
|
Union for spreading "anti-Soviet propaganda"). He comments: ". ..it
|
|||
|
looks to me like I've found another kind of Big Brother. In the Soviet
|
|||
|
Union it was the party and the state. In the US, it is the
|
|||
|
corporation."
|
|||
|
(Information Week. July 26, 1993. pg 62)
|
|||
|
|
|||
|
Fraud Free with AT&T
|
|||
|
====================
|
|||
|
AT&T has announced a service that will help protect corporate calling
|
|||
|
card users from fraudulent use of their card number:
|
|||
|
|
|||
|
AT&T Card Protect (sm) Service gives you real control over card
|
|||
|
usage. To help prevent unauthorized use, we offer you a range of
|
|||
|
measures such as geographic restrictions, purchase limits and
|
|||
|
account passwords to meet your specific calling needs.
|
|||
|
24 hours a day, 7 days a week, our Fraud Analysis and Surveillance
|
|||
|
Center provides state-of-the-art security coverage for every one of
|
|||
|
your employee's cards. It helps to identify unauthorized card use
|
|||
|
in real time, allowing prompt action to be taken.
|
|||
|
|
|||
|
Dr. Dobb's Editor Speaks Out Against Clipper Chip
|
|||
|
=================================================
|
|||
|
Jonathan Erickson, editor-in-chief of Dr. Dobb's Journal, writes
|
|||
|
about the government's "clipper" chip in his July 1993 editorial. Mr.
|
|||
|
Erickson begins by describing some of the antics and crimes of Ke vin
|
|||
|
Poulsen, a hacker whose story is familiar to regular CuD readers.
|
|||
|
After discussing Paulsen, the gist of the FBI's proposal, and the
|
|||
|
clipper Erickson concludes with this statement:
|
|||
|
Money and export concerns aside, the real issues remain those of
|
|||
|
privacy and the government's attitude towards its citizens. What
|
|||
|
we're witnessing is a fundamental shift from what we've considered
|
|||
|
to be our Constitutional right to privacy to a view that the
|
|||
|
government is privy to our most private conversations. This alone
|
|||
|
is enough to make Kevin Poulsen look like nothing more than an
|
|||
|
angel with a dirty face.
|
|||
|
(Dr. Dobb's Journal. July 1993. pg 8)
|
|||
|
|
|||
|
Nosy Bosses
|
|||
|
===========
|
|||
|
Based on a survey in Macworld, an estimated 20 million US employees
|
|||
|
may be victims of electronic monitoring on the job. Of the 21% of
|
|||
|
employers admitting to checking up on employees, 74% had searched
|
|||
|
electronic work files, 42% had searched workers' email and 15% had
|
|||
|
searched voice mail. When the survey asked why, the nosy respondents
|
|||
|
replied that their snooping was to monitor work flow or to invest
|
|||
|
igate espionage and theft.
|
|||
|
(Communications of the ACM. Aug 1993. pg 9 reprinted with permission)
|
|||
|
|
|||
|
Lax on Tapes
|
|||
|
============
|
|||
|
The Clinton administration has been blasted by a federal judge on its
|
|||
|
promise to make good on preserving nearly 6,000 computerized White
|
|||
|
House records that hold millions of National Security Council e mail
|
|||
|
messages. In January the judge ordered the tapes copied for
|
|||
|
preservation. As of late June, the judge threatened to fine the White
|
|||
|
House and National Archives $50K a day for not complying with prior
|
|||
|
orders each day the tapes aren't copied. Justice Department lawyers
|
|||
|
have tried in vain to appeal the order, citing the timetable of the
|
|||
|
task as causing "irreparable disruption of White House operations".
|
|||
|
(Communications of the ACM. Aug 1993. pg 10 reprinted with permission)
|
|||
|
|
|||
|
Disco Tech
|
|||
|
==========
|
|||
|
Timothy Leary, the Harvard prof known for his hallucinogenic
|
|||
|
escapades in the '60s and Virtual Reality experimentation of more
|
|||
|
recent times, has designed the VR programs for Light, Wisdom, and
|
|||
|
Sound, a new night club in New York. VR could be on the brink of
|
|||
|
rivaling dance floors as nightlife entertainment. However, club
|
|||
|
owners are worried that happy clubbers may never leave the private
|
|||
|
VR sex room once they get in - it's one of the main attractions of
|
|||
|
the club.
|
|||
|
(Communications of the ACM. Aug 1993. pg 10 reprinted with permission)
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
From: grmeyer@GENIE.GEIS.COM
|
|||
|
Date: Sat, 7 Aug 93 21:38:00 BST
|
|||
|
Subject: File 2--CuNews ("Technofogies" and more)
|
|||
|
|
|||
|
Technofogies
|
|||
|
=============
|
|||
|
A survey by Dell Computer Corp found that technophobia is alive and
|
|||
|
well in the United States. In a survey of 500 adults and 1000
|
|||
|
teenagers found that about 25% of the adults has never used a
|
|||
|
computer, programmed a VCR, or set-up the stations on their car radio.
|
|||
|
About a third said they feared they might damage a computer during
|
|||
|
normal use, and a quarter of them said they wouldn't use a computer un
|
|||
|
less they were forced to do so. About the same percentage said they
|
|||
|
still miss their typewriters. As you might expect, the results were
|
|||
|
drastically different for the teens in the sample. Only 8% of them had
|
|||
|
never used a computer. About the same percentage said they felt
|
|||
|
uncomfortable using one without assistance. Roughly two-thirds of
|
|||
|
both groups said they wished computer terminology was easier to
|
|||
|
understand. Contact Dell Computer Corp for more information about the
|
|||
|
study.
|
|||
|
(Information Week. August 2, 1993 pg. 46)
|
|||
|
|
|||
|
More on "Tiger Teams"
|
|||
|
=====================
|
|||
|
Harlan Crouse, a security specialist with the US Army, has a guest
|
|||
|
editorial in the August 2, 1993 issue of Information Week (pg. 52).
|
|||
|
Crouse responds to IW's earlier story about firms that use so-called
|
|||
|
'tiger teams' of ex-hackers to test security. The following are some
|
|||
|
excerpts from the editorial.
|
|||
|
|
|||
|
...using convicted computer criminals to do information security work
|
|||
|
is the height of folly. We don't use former armed robbers as bank
|
|||
|
guards and we don't use child molesters as sex therapists; why should
|
|||
|
we trust our precious information to convicted felons?
|
|||
|
(...)
|
|||
|
Common sense dictates that if you something to valuable, you work to
|
|||
|
protect it. That means all the time - not just when it's convenient
|
|||
|
or when a security deficiency has become nearly disastrous. What would
|
|||
|
you think of people who lock the door to their houses only sometimes, or
|
|||
|
only after their houses have already been burglarized?
|
|||
|
|
|||
|
Lapses in security are almost always traceable, directly or indirectly,
|
|||
|
to management's inattention to the need to protect organizational
|
|||
|
assets. Yet managers are seldom held accountable for their negligence.
|
|||
|
Unfortunately, it's the taxpayers, customers, stockholders, and
|
|||
|
employees who pay.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Wed, 11 Aug 93 11:58:26 GMT
|
|||
|
From: Wes Morgan <morgan@ENGR.UKY.EDU>
|
|||
|
Subject: File 3--Another BBS Seizure in Hartford
|
|||
|
|
|||
|
This was posted to Usenet's alt.censorship newsgroup.
|
|||
|
|
|||
|
> * Forwarded by MATT GIWER from the Main Board conference.
|
|||
|
> * Original from DON KIMBERLIN to ALL on 08-09-93.
|
|||
|
>
|
|||
|
>Date: 08-03-93 (22:35) Number: 1089
|
|||
|
>From: KENNETH PAVLAK Refer#: NONE
|
|||
|
> To: ALL Recvd: NO
|
|||
|
>Subj: Sysop held on $500,000 Bail Conf: (24) F-Law&Dis
|
|||
|
>---------------------------------------------------------------------------
|
|||
|
>The Hartford Courant on August 5, 1993 (page b-4) stated that a 21 year
|
|||
|
>old computer BBS operator was arrested for maintaining a computer
|
|||
|
>bulletin board that had a bomb making recipe.
|
|||
|
>
|
|||
|
>Michael Elansky was charged by the West Hartford police with inciting
|
|||
|
>injury to persons or property - a felony charge - and risk of injury
|
|||
|
>to a minor.
|
|||
|
>
|
|||
|
>He was held in lieu of $500,000 bond (in CT the bond for a person accused
|
|||
|
>of murder is normally $100,000)
|
|||
|
>
|
|||
|
>Det. Capt. James Gustafson said the case was "sealed" and no information
|
|||
|
>could be released.
|
|||
|
>
|
|||
|
>Michal Elansky's father said information from the Anarchists Cook Book
|
|||
|
>(Available from Paladin Press, P.O. Box 1307, Boulder, CO 80306,
|
|||
|
>phone 303-443-7250) was on the bbs placed there by person or persons
|
|||
|
>unknown; it was impossible for his son to keep track of due to the
|
|||
|
>number of calls to his bbs.
|
|||
|
>
|
|||
|
>And so, Big Brother now says that passing along information will get
|
|||
|
>a person 21 years old locked up on a half a million dollars bail, while
|
|||
|
>accused murderers get out on 100,000 dollars. The newspaper did not
|
|||
|
>say if the computer or the files from it were taken.
|
|||
|
>
|
|||
|
>Can the people who were on that bbs look forward to a "Visit" from
|
|||
|
>the servants of Big Brother?
|
|||
|
>
|
|||
|
>Will they be arrested if they downloaded VERBOTEN information? Will
|
|||
|
>there be MASS ARRESTS of people who have knowledge that is no longer
|
|||
|
>permitted?
|
|||
|
>
|
|||
|
>Time will tell
|
|||
|
>
|
|||
|
>=== GEcho 1.00
|
|||
|
>
|
|||
|
> * SPEED 1.30 >01< * Remember, god works in meaningless ways.
|
|||
|
>
|
|||
|
>
|
|||
|
>--
|
|||
|
>Internet: Matt Giwer@mechanic.fidonet.org
|
|||
|
>UUCP: ...!myrddin!mechanic!326!Matt.Giwer
|
|||
|
>Note: mechanic is a Fidonet<>USENET gate for TAMPA BAY,FL.
|
|||
|
> The opinions stated in this post are only my own!
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
Date: Tue, 17 Aug 1993 14:23:16 EST
|
|||
|
From: Dave Banisar <banisar@WASHOFC.CPSR.ORG>
|
|||
|
Subject: File 4--Call for Clipper Comments
|
|||
|
|
|||
|
Call for Clipper Comments
|
|||
|
|
|||
|
The National Institute of Standards and Technology (NIST) has issued a
|
|||
|
request for public comments on its proposal to establish the
|
|||
|
"Skipjack" key-escrow system as a Federal Information Processing
|
|||
|
Standard (FIPS). The deadline for the submission of comments is
|
|||
|
September 28, 1993. The full text of the NIST notice follows.
|
|||
|
|
|||
|
CPSR is urging all interested individuals and organizations to express
|
|||
|
their views on the proposal and to submit comments directly to NIST.
|
|||
|
Comments need not be lengthy or very detailed; all thoughtful
|
|||
|
statements addressing a particular concern will likely contribute to
|
|||
|
NIST's evaluation of the key-escrow proposal.
|
|||
|
|
|||
|
The following points could be raised about the NIST proposal
|
|||
|
(additional materials on Clipper and the key escrow proposal may be
|
|||
|
found at the CPSR ftp site, cpsr.org):
|
|||
|
|
|||
|
* The potential risks of the proposal have not been assessed and many
|
|||
|
questions about the implementation remain unanswered. The NIST notice
|
|||
|
states that the current proposal "does not include identification of
|
|||
|
key escrow agents who will hold the keys for the key escrow
|
|||
|
microcircuits or the procedures for access to the keys." The key
|
|||
|
escrow configuration may also create a dangerous vulnerability in a
|
|||
|
communications network. The risks of misuse of this feature should be
|
|||
|
weighed against any perceived benefit.
|
|||
|
|
|||
|
* The classification of the Skipjack algorithm as a "national
|
|||
|
security" matter is inappropriate for technology that will be used
|
|||
|
primarily in civilian and commercial applications. Classification of
|
|||
|
technical information also limits the computing community's ability to
|
|||
|
evaluate fully the proposal and the general public's right to know
|
|||
|
about the activities of government.
|
|||
|
|
|||
|
* The proposal was not developed in response to a public concern or a
|
|||
|
business request. It was put forward by the National Security Agency
|
|||
|
and the Federal Bureau of Investigation so that these two agencies
|
|||
|
could continue surveillance of electronic communications. It has not
|
|||
|
been established that is necessary for crime prevention. The number
|
|||
|
of arrests resulting from wiretaps has remained essentially unchanged
|
|||
|
since the federal wiretap law was enacted in 1968.
|
|||
|
|
|||
|
* The NIST proposal states that the escrow agents will provide the key
|
|||
|
components to a government agency that "properly demonstrates legal
|
|||
|
authorization to conduct electronic surveillance of communications
|
|||
|
which are encrypted." The crucial term "legal authorization" has not
|
|||
|
been defined. The vagueness of the term "legal authorization" leaves
|
|||
|
open the possibility that court-issued warrants may not be required in
|
|||
|
some circumstances. This issue must be squarely addressed and
|
|||
|
clarified.
|
|||
|
|
|||
|
* Adoption of the proposed key escrow standard may have an adverse
|
|||
|
impact upon the ability of U.S. manufacturers to market cryptographic
|
|||
|
products abroad. It is unlikely that non-U.S. users would purchase
|
|||
|
communication security products to which the U.S. government holds
|
|||
|
keys.
|
|||
|
|
|||
|
|
|||
|
Comments on the NIST proposal should be sent to:
|
|||
|
|
|||
|
Director, Computer Systems Laboratory
|
|||
|
ATTN: Proposed FIPS for Escrowed Encryption Standard
|
|||
|
Technology Building, Room B-154
|
|||
|
National Institute of Standards and Technology
|
|||
|
Gaithersburg, MD 20899
|
|||
|
|
|||
|
Submissions must be received by September 28, 1993. CPSR has
|
|||
|
asked NIST that provisions be made to allow for electronic
|
|||
|
submission of comments.
|
|||
|
|
|||
|
Please also send copies of your comments on the key escrow
|
|||
|
proposal to CPSR for inclusion in the CPSR Internet Library, our
|
|||
|
ftp site. Copies should be sent to <clipper@washofc.cpsr.org>.
|
|||
|
|
|||
|
=================================================================
|
|||
|
|
|||
|
FEDERAL REGISTER
|
|||
|
VOL. 58, No. 145
|
|||
|
|
|||
|
DEPARTMENT OF COMMERCE (DOC)
|
|||
|
National Institute of Standards and Technology (NIST)
|
|||
|
|
|||
|
Docket No. 930659-3159
|
|||
|
RIN 0693-AB19
|
|||
|
|
|||
|
A Proposed Federal Information Processing Standard for an Escrowed
|
|||
|
Encryption Standard (EES)
|
|||
|
|
|||
|
58 FR 40791
|
|||
|
|
|||
|
Friday, July 30, 1993
|
|||
|
|
|||
|
Notice; request for comments.
|
|||
|
|
|||
|
SUMMARY: A Federal Information Processing Standard (FIPS) for an
|
|||
|
Escrowed Encryption Standard (EES) is being proposed. This proposed
|
|||
|
standard specifies use of a symmetric-key encryption/decryption
|
|||
|
algorithm and a key escrowing method which are to be implemented in
|
|||
|
electronic devices and used for protecting certain unclassified
|
|||
|
government communications when such protection is required. The
|
|||
|
algorithm and the key escrowing method are classified and are
|
|||
|
referenced, but not specified, in the standard.
|
|||
|
|
|||
|
This proposed standard adopts encryption technology developed by
|
|||
|
the Federal government to provide strong protection for unclassified
|
|||
|
information and to enable the keys used in the encryption and
|
|||
|
decryption processes to be escrowed. This latter feature will assist
|
|||
|
law enforcement and other government agencies, under the proper legal
|
|||
|
authority, in the collection and decryption of electronically
|
|||
|
transmitted information. This proposed standard does not include
|
|||
|
identification of key escrow agents who will hold the keys for the
|
|||
|
key escrow microcircuits or the procedures for access to the keys.
|
|||
|
These issues will be addressed by the Department of Justice.
|
|||
|
|
|||
|
The purpose of this notice is to solicit views from the public,
|
|||
|
manufacturers, and Federal, state, and local government users so that
|
|||
|
their needs can be considered prior to submission of this proposed
|
|||
|
standard to the Secretary of Commerce for review and approval.
|
|||
|
|
|||
|
The proposed standard contains two sections: (1) An announcement
|
|||
|
section, which provides information concerning the applicability,
|
|||
|
implementation, and maintenance of the standard; and (2) a
|
|||
|
specifications section which deals with the technical aspects of the
|
|||
|
standard. Both sections are provided in this notice.
|
|||
|
|
|||
|
DATES: Comments on this proposed standard must be received on or
|
|||
|
before September 28, 1993.
|
|||
|
|
|||
|
ADDRESSES: Written comments concerning the proposed standard should be
|
|||
|
sent to: Director, Computer Systems Laboratory, ATTN: Proposed FIPS
|
|||
|
for Escrowed Encryption Standard, Technology Building, room B-154,
|
|||
|
National Institute of Standards and Technology, Gaithersburg, MD
|
|||
|
20899.
|
|||
|
|
|||
|
Written comments received in response to this notice will be
|
|||
|
made part of the public record and will be made available for
|
|||
|
inspection and copying in the Central Reference and Records
|
|||
|
Inspection Facility, room 6020, Herbert C. Hoover Building, 14th
|
|||
|
Street between Pennsylvania and Constitution Avenues, NW.,
|
|||
|
Washington, DC 20230.
|
|||
|
|
|||
|
FOR FURTHER INFORMATION CONTACT: Dr. Dennis Branstad, National
|
|||
|
Institute of Standards and Technology, Gaithersburg, MD 20899,
|
|||
|
telephone (301) 975-2913.
|
|||
|
|
|||
|
SUPPLEMENTARY INFORMATION: This proposed FIPS implements the
|
|||
|
initiative announced by the White House Office of the Press
|
|||
|
Secretary on April 16, 1993. The President of the U.S. approved a
|
|||
|
Public Encryption Management directive, which among other actions,
|
|||
|
called for standards to facilitate the procurement and use of
|
|||
|
encryption devices fitted with key-escrow microcircuits in
|
|||
|
Federal communication systems that process sensitive, but
|
|||
|
unclassified information.
|
|||
|
|
|||
|
Dated: July 26, 1993.
|
|||
|
|
|||
|
Arati Prabhakar,
|
|||
|
Director.(NIST)
|
|||
|
|
|||
|
++++++++++++++++++++++++++++++++++++++++++++++++++++
|
|||
|
Federal Information Processing Standards Publication XX
|
|||
|
1993 XX
|
|||
|
Announcing the Escrowed Encryption Standard (EES)
|
|||
|
|
|||
|
Federal Information Processing Standards Publications (FIPS PUBS)
|
|||
|
are issued by the National Institute of Standards and Technology
|
|||
|
(NIST) after approval by the Secretary of Commerce pursuant to section
|
|||
|
111(d) of the Federal Property and Administrative Services Act of 1949
|
|||
|
as amended by the Computer Security Act of 1987, Public Law 100-235.
|
|||
|
|
|||
|
Name of Standard: Escrowed Encryption Standard (EES).
|
|||
|
|
|||
|
Category of Standard: Telecommunications Security.
|
|||
|
|
|||
|
Explanation: This Standard specifies use of a symmetric-key
|
|||
|
encryption (and decryption) algorithm and a Law Enforcement Access
|
|||
|
Field (LEAF) creation method (one part of a key escrow system) which
|
|||
|
provide for decryption of encrypted telecommunications when
|
|||
|
interception of the telecommunications is lawfully authorized. Both
|
|||
|
the algorithm and the LEAF creation method are to be implemented in
|
|||
|
electronic devices (e.g., very large scale integration chips). The
|
|||
|
devices may be incorporated in security equipment used to encrypt (and
|
|||
|
decrypt) sensitive unclassified telecommunications data. Decryption of
|
|||
|
lawfully intercepted telecommunications may be achieved through the
|
|||
|
acquisition and use of the LEAF, the decryption algorithm and escrowed
|
|||
|
key components.
|
|||
|
|
|||
|
To escrow something (e.g., a document, an encryption key) means
|
|||
|
that it is "delivered to a third person to be given to the grantee
|
|||
|
only upon the fulfillment of a condition" (Webster's Seventh New
|
|||
|
Collegiate Dictionary). A key escrow system is one that entrusts
|
|||
|
components of a key used to encrypt telecommunications to third
|
|||
|
persons, called key component escrow agents. In accordance with the
|
|||
|
common definition of "escrow", the key component escrow agents provide
|
|||
|
the key components to a "grantee" (i.e., a government agency) only
|
|||
|
upon fulfillment of the condition that the grantee properly
|
|||
|
demonstrates legal authorization to conduct electronic surveillance of
|
|||
|
communications which are encrypted using the specific device whose key
|
|||
|
component is requested. The key components obtained through this
|
|||
|
process are then used by the grantee to reconstruct the device unique
|
|||
|
key and obtain the session key (contained in the LEAF) which is used
|
|||
|
to decrypt the telecommunications that are encrypted with that device.
|
|||
|
The term, "escrow", for purposes of this standard, is restricted to
|
|||
|
the dictionary definition.
|
|||
|
|
|||
|
The encryption/decryption algorithm has been approved for
|
|||
|
government applications requiring encryption of sensitive unclassified
|
|||
|
telecommunications of data as defined herein. The specific operations
|
|||
|
of the algorithm and the LEAF creation method are classified and hence
|
|||
|
are referenced, but not specified, in this standard.
|
|||
|
|
|||
|
Data, for purposes of this standard, includes voice, facsimile and
|
|||
|
computer information communicated in a telephone system. Telephone
|
|||
|
system, for purposes of this standard, is limited to systems
|
|||
|
circuit-switched up to no more than 14.4 kbs or which use basic-rate
|
|||
|
ISDN, or to a similar grade wireless service.
|
|||
|
|
|||
|
Data that is considered sensitive by a responsible authority should
|
|||
|
be encrypted if it is vulnerable to unauthorized disclosure during
|
|||
|
telecommunications. A risk analysis should be performed under the
|
|||
|
direction of a responsible authority to determine potential threats
|
|||
|
and risks. The costs of providing encryption using this standard as
|
|||
|
well as alternative methods and their respective costs should be
|
|||
|
projected. A responsible authority should then make a decision, based
|
|||
|
on the risk and cost analyses, whether or not to use encryption and
|
|||
|
then whether or not to use this standard.
|
|||
|
|
|||
|
Approving Authority: Secretary of Commerce.
|
|||
|
|
|||
|
Maintenance Agency: Department of Commerce, National Institute of
|
|||
|
Standards and Technology.
|
|||
|
|
|||
|
Applicability: This standard is applicable to all Federal departments
|
|||
|
and agencies and their contractors under the conditions specified
|
|||
|
below. This standard may be used in designing and implementing
|
|||
|
security products and systems which Federal departments and agencies
|
|||
|
use or operate or which are operated for them under contract. These
|
|||
|
products may be used when replacing Type II and Type III (DES)
|
|||
|
encryption devices and products owned by the government and government
|
|||
|
contractors.
|
|||
|
|
|||
|
This standard may be used when the following conditions apply:
|
|||
|
|
|||
|
1. An authorized official or manager responsible for data security
|
|||
|
or the security of a computer system decides that encryption is
|
|||
|
required and cost justified as per OMB Circular A-130; and
|
|||
|
|
|||
|
2. The data is not classified according to the National Security
|
|||
|
Act of 1947, as amended, or the Atomic Energy Act of 1954, as amended.
|
|||
|
|
|||
|
However, Federal departments or agencies which use encryption
|
|||
|
devices for protecting data that is classified according to either of
|
|||
|
these acts may use those devices also for protecting unclassified data
|
|||
|
in lieu of this standard.
|
|||
|
|
|||
|
In addition, this standard may be adopted and used by non-Federal
|
|||
|
Government organizations. Such use is encouraged when it provides the
|
|||
|
desired security.
|
|||
|
|
|||
|
Applications: Devices conforming to this standard may be used for
|
|||
|
protecting unclassified communications.
|
|||
|
|
|||
|
Implementations: The encryption/decryption algorithm and the LEAF
|
|||
|
creation method shall be implemented in electronic devices (e.g.,
|
|||
|
electronic chip packages) that can be physically protected against
|
|||
|
unauthorized entry, modification and reverse engineering.
|
|||
|
Implementations which are tested and validated by NIST will be
|
|||
|
considered as complying with this standard. An electronic device shall
|
|||
|
be incorporated into a cyptographic module in accordance with FIPS
|
|||
|
140-1. NIST will test for conformance with FIPS 140-1. Cryptographic
|
|||
|
modules can then be integrated into security equipment for sale and
|
|||
|
use in an application. Information about devices that have been
|
|||
|
validated, procedures for testing equipment for conformance with NIST
|
|||
|
standards, and information about obtaining approval of security
|
|||
|
equipment are available from the Computer Systems Laboratory, NIST,
|
|||
|
Gaithersburg, MD 20899.
|
|||
|
|
|||
|
Export Control: Implementations of this standard are subject to
|
|||
|
Federal Government export controls as specified in title 22, Code of
|
|||
|
Federal Regulations, parts 120 through 131 (International Traffic of
|
|||
|
Arms Regulations -ITAR). Exporters of encryption devices, equipment
|
|||
|
and technical data are advised to contact the U.S. Department of
|
|||
|
State, Office of Defense Trade Controls for more information.
|
|||
|
Patents: Implementations of this standard may be covered by U.S. and
|
|||
|
foreign patents.
|
|||
|
|
|||
|
Implementation Schedule: This standard becomes effective thirty days
|
|||
|
following publication of this FIPS PUB.
|
|||
|
|
|||
|
Specifications: Federal Information Processing Standard (FIPS
|
|||
|
XXX)(affixed).
|
|||
|
|
|||
|
Cross Index:
|
|||
|
|
|||
|
a. FIPS PUB 46-2, Data Encryption Standard.
|
|||
|
|
|||
|
b. FIPS PUB 81, Modes of Operation of the DES
|
|||
|
|
|||
|
c. FIPS PUB 140-1, Security Requirements for Cryptographic
|
|||
|
Modules.
|
|||
|
|
|||
|
|
|||
|
Glossary:
|
|||
|
|
|||
|
The following terms are used as defined below for purposes of
|
|||
|
this standard:
|
|||
|
|
|||
|
Data-Voice, facsimile and computer information communicated in
|
|||
|
a telephone system.
|
|||
|
|
|||
|
Decryption-Conversion of ciphertext to plaintext through the
|
|||
|
use of a cryptographic algorithm.
|
|||
|
|
|||
|
Device (cryptographic)-An electronic implementation of the
|
|||
|
encryption/decryption algorithm and the LEAF creation method as
|
|||
|
specified in this standard.
|
|||
|
|
|||
|
Digital data-Data that have been converted to a binary
|
|||
|
representation.
|
|||
|
|
|||
|
Encryption-Conversion of plaintext to ciphertext through the
|
|||
|
use of a cryptographic algorithm.
|
|||
|
|
|||
|
Key components-The values from which a key can be derived (e.g., KU
|
|||
|
sub 1 + KU sub 2).
|
|||
|
|
|||
|
Key escrow -A process involving transferring one or more components
|
|||
|
of a cryptographic key to one or more trusted key component escrow
|
|||
|
agents for storage and later use by government agencies to decrypt
|
|||
|
ciphertext if access to the plaintext is lawfully authorized.
|
|||
|
|
|||
|
LEAF Creation Method 1-A part of a key escrow system that is
|
|||
|
implemented in a cryptographic device and creates a Law Enforcement
|
|||
|
Access Field.
|
|||
|
|
|||
|
Type I cryptography-A cryptographic algorithm or device approved by
|
|||
|
the National Security Agency for protecting classified information.
|
|||
|
|
|||
|
Type II cryptography-A cryptographic algorithm or device
|
|||
|
approved by the National Security Agency for protecting sensitive
|
|||
|
unclassified information in systems as specified in section 2315
|
|||
|
of Title 10 United State Code, or section 3502(2) of Title 44,
|
|||
|
United States Code.
|
|||
|
|
|||
|
Type III cryptography-A cryptographic algorithm or device
|
|||
|
approved as a Federal Information Processing Standard.
|
|||
|
|
|||
|
Type III(E) cryptography-A Type III algorithm or device that is
|
|||
|
approved for export from the United States.
|
|||
|
|
|||
|
Qualifications. The protection provided by a security product or
|
|||
|
system is dependent on several factors. The protection provided by
|
|||
|
this standard against key search attacks is greater than that
|
|||
|
provided by the DES (e.g., the cryptographic key is longer).
|
|||
|
However, provisions of this standard are intended to ensure that
|
|||
|
information encrypted through use of devices implementing this
|
|||
|
standard can be decrypted by a legally authorized entity.
|
|||
|
|
|||
|
Where to Obtain Copies of the Standard: Copies of this
|
|||
|
publication are for sale by the National Technical Information
|
|||
|
Service, U.S. Department of Commerce, Springfield, VA 22161. When
|
|||
|
ordering, refer to Federal Information Processing Standards
|
|||
|
Publication XX (FIPS PUB XX), and identify the title. When
|
|||
|
microfiche is desired, this should be specified. Prices are
|
|||
|
published by NTIS in current catalogs and other issuances. Payment
|
|||
|
may be made by check, money order, deposit account or charged to a
|
|||
|
credit card accepted by NTIS.
|
|||
|
Specifications for the Escrowed Encryption Standard
|
|||
|
|
|||
|
|
|||
|
1. Introduction
|
|||
|
|
|||
|
This publication specifies Escrowed Encryption Standard (EES)
|
|||
|
functions and parameters.
|
|||
|
|
|||
|
2. General
|
|||
|
|
|||
|
This standard specifies use of the SKIPJACK cryptographic algorithm
|
|||
|
and the LEAF Creation Method 1 (LCM-1) to be implemented in an
|
|||
|
approved electronic device (e.g., a very large scale integration
|
|||
|
electronic chip). The device is contained in a logical cryptographic
|
|||
|
module which is then integrated in a security product for encrypting
|
|||
|
and decrypting telecommunications.
|
|||
|
|
|||
|
Approved implementations may be procured by authorized
|
|||
|
organizations for integration into security equipment. Devices must be
|
|||
|
tested and validated by NIST for conformance to this standard.
|
|||
|
Cryptographic modules must be tested and validated by NIST for
|
|||
|
conformance to FIPS 140-1.
|
|||
|
|
|||
|
3. Algorithm Specifications
|
|||
|
|
|||
|
The specifications of the encryption/decryption algorithm
|
|||
|
(SKIPJACK) and the LEAF Creation Method 1 (LCM-1) are classified. The
|
|||
|
National Security Agency maintains these classified specifications and
|
|||
|
approves the manufacture of devices which implement the
|
|||
|
specifications. NIST tests for conformance of the devices implementing
|
|||
|
this standard in cryptographic modules to FIPS 140-1 and FIPS 81.
|
|||
|
|
|||
|
4. Functions and Parameters
|
|||
|
|
|||
|
4.1 Functions
|
|||
|
|
|||
|
The following functions, at a minimum, shall be implemented:
|
|||
|
|
|||
|
1. Data Encryption: A session key (80 bits) shall be used to
|
|||
|
encrypt plaintext information in one or more of the following modes of
|
|||
|
operation as specified in FIPS 81: ECB, CBC, OFB (64) CFB (1, 8, 16,
|
|||
|
32, 64).
|
|||
|
|
|||
|
2. Data Decryption: The session key (80 bits) used to encrypt the
|
|||
|
data shall be used to decrypt resulting ciphertext to obtain the data.
|
|||
|
|
|||
|
3. Key Escrow: The Family Key (KF) shall be used to create the
|
|||
|
Law Enforcement Access Field (LEAF) in accordance with the LEAF
|
|||
|
Creation Method 1 (LCM-1). The Session Key shall be encrypted with the
|
|||
|
Device Unique Key and transmitted as part of the LEAF. The security
|
|||
|
equipment shall ensure that the LEAF is transmitted in such a manner
|
|||
|
that the LEAF and ciphertext may be decrypted with legal
|
|||
|
authorization. No additional encryption or modification of the LEAF is
|
|||
|
permitted.
|
|||
|
|
|||
|
4.2 Parameters
|
|||
|
|
|||
|
The following parameters shall be used in performing the prescribed
|
|||
|
functions:
|
|||
|
|
|||
|
1. Device Identifier (DID): The identifier unique to a particular
|
|||
|
device and used by the Key Escrow System.
|
|||
|
|
|||
|
2. Device Unique Key (KU): The cryptographic key unique to a
|
|||
|
particular device and used by the Key Escrow System.
|
|||
|
|
|||
|
3. Cryptographic Protocol Field (CPF): The field identifying the
|
|||
|
registered cryptographic protocol used by a particular application and
|
|||
|
used by the Key Escrow System (reserved for future specification and
|
|||
|
use).
|
|||
|
|
|||
|
4. Escrow Authenticator (EA): A binary pattern that is inserted in
|
|||
|
the LEAF to ensure that the LEAF is transmitted and received properly
|
|||
|
and has not been modified, deleted or replaced in an unauthorized
|
|||
|
manner.
|
|||
|
|
|||
|
5. Initialization Vector (IV): A mode and application dependent
|
|||
|
vector of bytes used to initialize, synchronize and verify the
|
|||
|
encryption, decryption and key escrow functions.
|
|||
|
|
|||
|
6. Family Key (KF): The cryptographic key stored in all devices
|
|||
|
designated as a family that is used to create the LEAF.
|
|||
|
|
|||
|
7. Session Key (KS): The cryptographic key used by a device to
|
|||
|
encrypt and decrypt data during a session.
|
|||
|
|
|||
|
8. Law Enforcement Access Field (LEAF): The field containing the
|
|||
|
encrypted session key and the device identifier and the escrow
|
|||
|
authenticator.
|
|||
|
|
|||
|
5. Implementation
|
|||
|
|
|||
|
The Cryptographic Algorithm and the LEAF Creation Method shall be
|
|||
|
implemented in an electronic device (e.g., VLSI chip) which is highly
|
|||
|
resistant to reverse engineering (destructive or non-destructive) to
|
|||
|
obtain or modify the cryptographic algorithms, the KU, the EA, the
|
|||
|
CPF, the operational KS, or any KU, the EA, the CPF, the operational
|
|||
|
KS, or any other security or Key Escrow System relevant information.
|
|||
|
The device shall be able to be programmed/personalized (i.e., made
|
|||
|
unique) after mass production in such a manner that the DID, KU (or
|
|||
|
its components), KF (or its components) and EA fixed pattern can be
|
|||
|
entered once (and only once) and maintained without external
|
|||
|
electrical power.
|
|||
|
|
|||
|
The LEAF and the IV shall be transmitted with the ciphertext. The
|
|||
|
specifics of the protocols used to create and transmit the LEAF, IV,
|
|||
|
and encrypted data shall be registered and a CPF assigned. The CPF
|
|||
|
shall then be transmitted in accordance with the registered
|
|||
|
specifications.
|
|||
|
|
|||
|
The specific electric, physical and logical interface will vary
|
|||
|
with the implementation. Each approved, registered implementation
|
|||
|
shall have an unclassified electrical, physical and logical interface
|
|||
|
specification sufficient for an equipment manufacturer to understand
|
|||
|
the general requirements for using the device. Some of the
|
|||
|
requirements may be classified and therefore would not be specified in
|
|||
|
the unclassified interface specification.
|
|||
|
|
|||
|
------------------------------
|
|||
|
|
|||
|
End of Computer Underground Digest #5.62
|
|||
|
************************************
|
|||
|
|
|||
|
|