364 lines
22 KiB
Plaintext
364 lines
22 KiB
Plaintext
#######################################
|
|
# #
|
|
# #
|
|
# ======== =\ = ====== #
|
|
# == = \ = = #
|
|
# == = \ = ====== #
|
|
# == = \ = = #
|
|
# == = \= ====== #
|
|
# #
|
|
# #
|
|
# <Tolmes News Service> #
|
|
# ''''''''''''''''''''' #
|
|
# #
|
|
# #
|
|
# > Written by Dr. Hugo P. Tolmes < #
|
|
# #
|
|
# #
|
|
#######################################
|
|
|
|
|
|
Issue Number: 05
|
|
Release Date: November 19, 1987
|
|
|
|
|
|
This issue is made up of only one article (a very good one.) The article
|
|
comes from the August/September issue of Technology Review. It is a very good
|
|
article and deals with many aspects of computer security. This includes:
|
|
encryption, early cryptography, modern cryptography, the development of
|
|
security systems, and other information dealing with military/government
|
|
security.
|
|
|
|
This is not the entire article. Some uninteresting parts have been
|
|
intentionally left out. I hope that the article will be helpful.
|
|
|
|
|
|
|
|
><><> Dr. Hugo P. Tolmes <><><
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Electronic cryptography can protect any digital message- any message
|
|
communicated in a stream of binary digits, or "bits." A "key"- a series of
|
|
bits -is fed to the encryption device to scramble the message. Only the holder
|
|
of the right digital key can translate the message back into unencrypted
|
|
"clear-text."
|
|
Destined to help shape our future, encryption technology has not itself
|
|
been finally shaped. Competing lines of development exist, and they have very
|
|
different social implications. Conventional encryption- the kind
|
|
championed by the National Security Agency (NSA) -works much like a
|
|
combination mailbox. Anyone who has the combination (the digital key) can lock
|
|
and unlock the box (send messages and decode other messages sent with he same
|
|
key). Since senders and receivers must exchange secret keys, conventional
|
|
"ciphers," or cryptosystems, are best suited to a limited set of users.
|
|
Systems of this type are common in military, diplomatic, and financial
|
|
communications; they are widely known and in many ways define the public
|
|
perception of encryption. Unfortunately, they couldn't serve as
|
|
the basis for security in an extensive electronic communications system open
|
|
to use by many individuals.
|
|
"Public-key" encryption systems, though less commonly understood, could
|
|
serve this way. According to former NSA director Bobby Inman, the agency
|
|
dscovered and classified public-key encryption in the early 1970s. In 1976
|
|
cryptologist Whitfield Diffie and Stanford professor Martin Hellman
|
|
rediscovered public key and published a paper describing the idea. Today,
|
|
public key remains an idea in development, though RSA Data Security
|
|
in Redwood City, Calif., is already marketing one system.
|
|
Public-key systems work like mailboxes with two different combinations,
|
|
one for locking and one for unlocking. The locking combination (the "public"
|
|
key used to encrypt messages) can be given out freely, so that anyone can,
|
|
in effect, put a letter in your mailbox(the decryption key) secret, so only you
|
|
can remove letters.
|
|
Since senders and receivers never need to exchange secret keys, individuals
|
|
could ask friends, businesses, or even strangers to encrypt messages to them.
|
|
The implications of the concept become clear only when we think of a
|
|
system in widespread and routine use, with public keys in directories like
|
|
phone books. Both individuals and institutions could use the keys to
|
|
secure phone calls, electronic mail, and other telecommunications. The
|
|
possibilities are enormous, and the main point is clear: this approach
|
|
doesn't require citizens to trust institutions any more than institutions
|
|
are required to trust citizens.
|
|
One recently proposed adaptation of public-key cryptography offers even
|
|
more benefits. Civil libertarians are concerned about the increasing ease
|
|
with which large organizations, whether governmental or private, can amass
|
|
extensive electronic dossiers on individuals- records of who they
|
|
telephone, where they've worked, how much money they spend, whether they've
|
|
been arrested (even if later acquitted). In this adaptation,
|
|
public-key systems would employ "digital pseudonyms" to short-circuit
|
|
the collection of dossiers while still making it possible to conduct the
|
|
bread-and-butter transactions of an information economy- electronic
|
|
purchases, credit verification, and so on.
|
|
|
|
Secret Cryptography
|
|
|
|
In conventional ciphers, the "algorithm," or matematical method by
|
|
which signals are scrambled, is itself often classified. Proponents say this
|
|
helps strengthen the cipher, but the matter is unclear. In any case,
|
|
public-kay systems can be designed so that disclosure of their algorithms
|
|
poses no security threat. Knowing the internal workings of the cipher doesn't
|
|
help to break it; individual messages still can't be deciphered without the
|
|
secret decryption key. Those who favor public key often assert that this kind
|
|
of open approach is characteristic of modern cryptography.
|
|
How is such elegance achieved? By basing ciphers on mathematical problems
|
|
that are, in the understated lexicon of theoretical mathematics "hard."
|
|
Deciphering a message without the key would require solving one of these
|
|
problems. There are many, and some have resisted solution for thousands of
|
|
years. If mathematics make sudden progress on one of them tomorrow, it
|
|
will be news. Anyone using a cipher based on the problem would immediately
|
|
know.
|
|
Advocates of public-key cryptography fear that it is being squelched by NSA
|
|
, the most powerful
|
|
exponent of conventional ciphers. Though its budget is estimated to be
|
|
five times greater than the CIA's, NSA is so secret that for many years the
|
|
government denied that it even existed. Today, it's known that NSA has two
|
|
primary functions. The first one- "signals intelligence" -consists
|
|
primarily of intercepting messages deemed critical to national security.
|
|
The agency routinely monitors phone calls to and from the United States,
|
|
and a Senate intelligence committee report stated that between 1967 and 1973
|
|
, NSA illegally spied on 1,200 Americansal
|
|
activities. NSA's second role is "communications security"- protecting
|
|
the United States from foreign spying. In this capacity the agency has set out
|
|
to market a new family of encryption systems.
|
|
These ciphers are to be sold as pre-sealed and tamper-resistant
|
|
integrated circuits: the encryption algorithm hidden within the chips will
|
|
be classified. It will remain unknown even to the engineers who will
|
|
incorporate the chips into security devices for computers or telephones.
|
|
Critics fear that such secrecy offers NSA the chance to build a "trap door"
|
|
through which it could decipher messages the senders think are secure.
|
|
"With a hardware black box you can describe several schemes that would be
|
|
almost impossible to test for from the outside and could, ineffect, constitute
|
|
a hardware Trojan Horse [i.e., trap door]," says Herb Bright, an officer of
|
|
the private data-security firm Computation Planning Associates. Bright
|
|
is a member of the American National Standards Association/American Bankers
|
|
Association committee that is evaluating NSA's new ciphers.
|
|
NSA proposes a strange way for users of new ciphers to obtain keys for
|
|
encoding and decoding. The agency hopes to provide these keys itself. It will
|
|
assign keys to all government agencies using the systems, while civilian users
|
|
will have the choice of obtaining keys from NSA or generating their own.
|
|
However, the second course will be discouraged. Last year Walter Deeley, then
|
|
NSA deputy director for communications security, told Science magazine, "It's
|
|
not a trivial thing to produce a good key." He went on to insist that NSA
|
|
wouldn't keep copies of the keys it assigned.
|
|
Several factors will help NSA promote the ciphers. Starting in 1988,
|
|
they will be mandated as the official U.S. civilian encryption standard. The
|
|
current civilian standard, authorized by the National Bureau of Standards
|
|
(NBS), and known as DES (for Data Encryption Standard), has come into
|
|
widespread use among banks, financial services, and government agencies.
|
|
Although such an encryption standard is officially the only advisory,practical
|
|
considerations dictate its use. For example, if the Federal Reserve switches
|
|
to a certain system, banks that deal with the Fed will have severe logistical
|
|
problems if they don't follow suit. And the use of a standard is becoming a
|
|
recognized measure of legal due care. Suppose a bank uses a non-standard
|
|
system- one sold commercially but not certified by the government -and a
|
|
thief alters electronic funds transfers. The bank is far more legally
|
|
vulnerable than if it had stuck to the standard.
|
|
In 1984 the administration put out National Security Decision Directive
|
|
145 (NSDD-145), which will help enforce NSA's standard. NSDD-145 gives a
|
|
committee controlled by NSA authority to set policies concerning a wide range of
|
|
|
|
communications-security issues. The directive specifically designates this
|
|
committee to oversee "sensitive, but unclassified, government or
|
|
government-derived information, the loss of which could adversely affect
|
|
the national security."
|
|
The AUnion (ACLU) considers the very category of
|
|
"unclassified" national security informaion dangerous- "a deliberate,
|
|
calculated effort to expand the realm of what can be considered to be
|
|
'national-security' information." Jerry Berman, head of the ACLU's Privacy and
|
|
Technology Project, fears that no one really knows what's to be included in
|
|
this vague realm. Large inter-bank funds transfers probably qualify, as do
|
|
high-level communicatons of major federal contractors. But where does the
|
|
government draw the line? Warren Reed, director of information management and
|
|
technology at the General Accounting Office, observes that rulings like
|
|
NSDD-145 could bring flight-safety information, financial and industrial
|
|
forecasts, and even medical records under NSA control.
|
|
According to Electronics magazine, the NSA director is now, for all
|
|
practical purposes, "setting standards for the entire U.S. data-processing
|
|
industry." And the Institute of Electrical and Electronic Engineers has
|
|
gone on record warning against the "dangers we see in implementing the
|
|
directive's rules for unclassified, sensitive, non-governmental information
|
|
and private-sector telecommunications." Whitfield Diffie, now at Bell Northern
|
|
Research in Mountain View, Calif., has said, "I will not be pleased if NSA
|
|
succeeds in capturing the market for domestic communications-security
|
|
equipment." Like many other cryptographers, Diffie sees a "great need"
|
|
for systems designed to protect individual privacy.
|
|
|
|
A Peculiar History
|
|
|
|
NSA's history with civilian encryption technology enforces critics'
|
|
concerns about the new ciphers. Problems began during the early 1970s,
|
|
when the agency was involved in codifying DES. In 1973 the NBS called
|
|
for a national civilian encryption system. IBM was in the final stages of
|
|
developing its Lucifer system, and Lucifer won hands down. It was by all
|
|
reports very good- so good that it upset NSA, which had considered itself
|
|
comfortably ahead of the rest of the world in the still-arcane art of
|
|
cryptography. Although at the time NSA had no formal role in setting the
|
|
encryption standard, it was the preeminent government agency concerned
|
|
with encryption, and NBS felt bound to honor its advice. Rather than approving
|
|
Lucifer as it was, NSA modified it several strange ways to create DES.
|
|
While Lucifer's size was 128 bits, DES has a key of only 56 bits, so that
|
|
it is far more vulnerable to "brute-force" attack. Such an attack is
|
|
mounted by trying all possible keys- in this case all 56-digit binary numbers-
|
|
to see which one works. There are 2(to the 56th)- about 7 X 10(to the 16th)-
|
|
possibilities. Large as this number may seem, it is tens of millions of times
|
|
smaller than the number of possible keys in ciphers approved for military
|
|
use. The original 128-bit key would be much more secure, for it presents 2
|
|
(to the 128th) possibilities- about 3 X 10 (to the 38th). Even with today's
|
|
supercomputers, brute-force attacks would be out of the question.
|
|
NSA's weakening of Lucifer appears to have been deliberate. According to
|
|
David Kahn, the noten who wrote The Codebreakers,
|
|
Lucifer set off a debate within NSA. "The codebreaking side wanted to make
|
|
sure that the cipher was weak enough for the NSA to solve it when used by
|
|
foreign nations and companies," he wrote in Foreign Affairs. On the other
|
|
hand, "the code-making side wanted any cipher it was certifying for use by
|
|
Americans to be truly good." Kahn says the resulting "bureaucratic compromise"
|
|
made the key shorter. Alan Konheim, former manager of IBM's Lucifer research
|
|
project, recollects, "If they [NSA] had had their way, they would have had 32
|
|
bits.... I was told at one time that they wanted 40 bits, and at IBM we
|
|
agreed that 40 was not enough."
|
|
At the same time that NSA shortened Lucifer's key, it used
|
|
classified criteria to redesign several numberical tables known as
|
|
"substition boxes" or "S-boxes." When a bitstream (a stream of binary digits)
|
|
comes into DES, it's broken into chunks. The bits in each chunk are
|
|
repeatedly permuted (that is, rearanged) in a way that depends upon
|
|
both the key and the numbers in the S-boxes. These boxes are thus crucial
|
|
to the strength of DES, and NSA's critics feel that the changed in them
|
|
make the system vulnerable to a "cryptoanalytic" attack. In other words,
|
|
the boxes may now conceal a trap door- a secret numberical regularity that
|
|
allows NSA to decipher any DES-encrypted text even without the key.
|
|
NSA's refusal to publish the criteria under which it redesigned the S-boxes
|
|
has reinforced the critics' fears.
|
|
Despite persistent rumors, a trap door has never been found. Years of
|
|
analysis at institutions including Bell Labs; the Catholic University in
|
|
Leuven, Belgium; and the Center for Mathematics and Computer Science in
|
|
Amsterdam have failed to either vindicate or convict NSA. However,
|
|
mathematicians have unearthed several peculiar properties in the S-boxes-
|
|
for example, certain numerical irregularities that weren't present in
|
|
IBM's original design. And they've demonstrated the possibility of
|
|
introducing hidden regularities into the S-boxes that weaken the algorithm.
|
|
Still, no one has managed to use these findings to mount a successful
|
|
cryptoanalytic attack on DES. They may mean nothing. But since NSA has never
|
|
declassified the criteria for redesigning the S-boxes, it's not
|
|
certain. Because of lingering suspicions, the Swiss and Scandinavians
|
|
have turned elsewhere for their civilian encryption systems.
|
|
The controversy over DES eventually subsided, but in late 1985
|
|
NSA suddenly and gracelessly abandoned the system. Directly contradicting
|
|
years of reassurances, Walter Deely, NSA's deputy director for communications
|
|
security, told Science that he "wouldn't bet a plugged nickel on the
|
|
Soviet Union not breaking [DES]." Said Barton O'Brien, sales manager for RSA
|
|
Data Security, "People in the industry feel betrayed." And according to Herb
|
|
Bright of Computation Planning Associates, quite an uproar ensued in
|
|
the normally quiet halls of the American National Standards Institute
|
|
when NSA announced its new ciphers. Bankers were particualarly upset, since
|
|
they were comm of encrypting electronic funds
|
|
transfers. NSA was later compelled to announce that DES would remain
|
|
certified for such transfers.
|
|
NSA's new shift raises even more issues. The agency has still declined
|
|
to declassify evidence that would settle the question of DES's strength.
|
|
If an avenue of cryptoanalytic attack has been found, then isn't NSA wrong to
|
|
let banks continue using DES? And if the problem is a brute-force attack,
|
|
then isn't it a consequence of the reduced key length? Why not just make
|
|
the key longer?
|
|
NSA officials say they don't want to trust the rising volume of sensitive
|
|
data to DES, because all of its major elements except the criteria for S-box
|
|
design have been widely published. Yet cryptologist are trained to be dubious,
|
|
and they will never trust a classified cipher. They have more confidence in
|
|
mathematical interactability. A cipher will be trusted if it is open to
|
|
require solving a very difficult numerical problem. Such ciphers do in
|
|
fact exist and they enjoy a freedom from suspicion that NSA's new ciphers
|
|
can never hope to share.
|
|
Historical evidence suggests that intelligence agencies do promote flawed
|
|
ciphers under cover. In the most famous case, British Intelligence
|
|
secretly broke the German ENIGMA machines during World War II. "After
|
|
World War II, Britain rounded up thousands of ENIGMA machines that
|
|
Germany had used and sold them to some of the emerging nations," writes David
|
|
Kahn. This allowed Britain to "keep tabs on what each country was planning."
|
|
The fact that ENIGMA had been broken in the 1940s remained classified until
|
|
1974.
|
|
In The Puzzle Palace, a study of NSA, investigative reporter James
|
|
Bamford says that the agency has similarly attempted to exploit a secret
|
|
cipher. In 1957 NSA covertly send William Friedman, a cryptologist, to
|
|
meet his old friend Boris Hagelin, then a major supplier of cryptomachins.
|
|
"Hagelin was asked to supply to NSA [with] details about various
|
|
improvements and modifications... made to cipher machines his companies had
|
|
supplied to other governments, including, especially, the member
|
|
countries of NATO." Bamford was not able to learn whether Hagelin
|
|
cooperated. But NSA's attempt to build a trap door into an encryption system
|
|
can only abet suspicions about its new ciphers.
|
|
|
|
Cryptography Goes Public
|
|
|
|
Over the last decade, NSA has had some success in its efforts to classify
|
|
sensitive cryptographic research. Yet know-how has spread anyway.
|
|
Mathematicians doing basic research with no thought of secrecy may find that
|
|
their work has significant cryptographic implications. For
|
|
instance, complexity theory examines problems not to solve them but to
|
|
understand how hard they really are. Since truly hard problems provide the
|
|
basis for strong ciphers whose inner workings are open to inspection,
|
|
complexity theory is one conduit through which cryptology has "gone
|
|
public," in Kahn's words.
|
|
Today, all but the poorest nations secure high-level dispatches behind
|
|
ciphers that can be broken only with the greatest difficulty. Intelligence
|
|
agencies are often on unclassified
|
|
communications- and to studying who calls rather than what they say.
|
|
Intelligence agencies can also be foiled when their adversaries are
|
|
low-tech: Iran sidesteps U.S. electronic espionage by sending sensitive
|
|
information by hand.
|
|
But while governments are becoming more secure, individuals are becoming
|
|
more vulnerable. The use of electronic mail and interactive cable TV is
|
|
increasing, and the technology for tapping phone conversations is improving.
|
|
In The Rise of the Computer State, New York Times reporter David Burnham
|
|
writes that the high cost of paying people to listen to conversations may
|
|
be as significant a deterrent to wiretaps as legal strictures. Wiretaps
|
|
are more widespread in low-wage countries such as the Soviet Union and
|
|
India. This bodes ill, for voice-recognition technology is making
|
|
automated wiretapping much easier. Computers can now screen calls and notify
|
|
human agents only upon encountering designated words.
|
|
If used to establish a decentralized cryptosystem in the
|
|
telecommunications network, public-key cryptology could go a long way toward
|
|
preventing wiretaps. Public-key systems also enable users to sign messages with
|
|
unforgetable electronic signatures. As Hellman puts it, such signatures are
|
|
"like written signatures in that they're easily produced by the legitimate
|
|
signer, easily recognized by any recipient, and yet impossible, from a
|
|
practical point of view, to forge." To send messages using such a signature,
|
|
you publish the decryption half of a two-part key. Only if a message is
|
|
"signed" with the secret encryption half will decryption yeld a meaningful
|
|
cleartext.
|
|
Like conventional encryption systems, public-key systems can be
|
|
based on a variety of algorithms. The best-known public-key algorithm is RSA
|
|
(after Riverst, Shamir, and Adleman, the mathematicians who developed it).
|
|
It is based on the difficulty of factoring prime numbers, a problem that
|
|
mathematicians have been studying for thousands of years without fundamental
|
|
progress. Factoring small numbers is simple: 40 can be factored into 10 and
|
|
4 (since 10 X 4 = 40) or even into 20 and 2 (since 20 X 2 = 40). But factoring
|
|
even slightly larger numbers is much harder. Factoring 5,893 (produced by
|
|
multiplying 71 and 83) requires a number of trials. and because 71 and 83
|
|
are both prime numbers (divisible only by themselves and by 1), there's only a
|
|
single answer.
|
|
To break an RSA-based cipher, you have to factor an enormous number, which
|
|
can be hundreds of digits long, into so-called "cryptographic primes"- primes
|
|
that can themselves be hundreds of digits long. Factoring the product,
|
|
which is embedded in the public key, into its component primes- a process
|
|
necessary to break the cipher- is effectively impossible, even with
|
|
supercomputers. And no conceivable breakthroughs in computer technology
|
|
will make any difference: factoring will remain hard until there is a
|
|
breakthrough in number theory, a breakthrough that may not even be in the
|
|
cards.
|
|
However, once a user obtains cryptographic primes- a number of
|
|
sourcmpany marketing a cryptosystem, could provide
|
|
them- only limited computer power is necessary to multiply them together and
|
|
perform the other operations necessary to generate keys. Users could do this
|
|
provately on microcomputers- without the aid of a centralized authority such
|
|
as NSA.
|
|
|
|
|
|
|
|
|
|
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
|
|
|
|
NOTA:
|
|
|
|
This article has given vital information on cryptology. Some of the
|
|
things pointed out were flaws in the DES, how encryption works, and how to
|