textfiles/programming/CRYPTOGRAPHY/rsa_news.txt

1018 lines
46 KiB
Plaintext
Raw Blame History

CIPHERTEXT
The RSA Newsletter
Volume 1, No. 1, Fall 1993
A publication of RSA Data Security, Inc. Copyright _ 1993 RSA Data Security,
Inc. All rights reserved. For reprints, call your RSA representative.
IN THIS ISSUE:
Clipper Controversy Continues Page 1
1994 RSA Data Security Conference Page 1
Apple Ships System 7 Pro Page 2
Internet PEM Arrives Page 2
RSA Opens Certificate Services Center Page 3
New Wireless Security Standards Page 4
Arkhon Extends Kerberos With RSA Page 4
Hilgraeve Licenses RSA for
Best-Selling Asynch Package Page 5
RSA Licensee Spotlight: Datamedia Page 5
Difficulty of Factoring Page 6
Factoring Challenge Update Page 6
RSA Laboratories Report Page 6
PKCS Update Page 7
Clipper: One Scientist's Perspective Page 7
The SmartCard That Needs No Reader Page 9
1994 RSA Conference Registration Form Page 11
THE CLIPPER CONTROVERSY CONTINUES
The government's involvement in cryptography standards and public policy have
again provoked strong reactions in the crypto community with the announcement
of the Clipper Chip, an encryption scheme with an acknowledged, built-in
system for government law-enforcement and intelligence agency monitoring. We
present here a relatively technical overview of the proposal. Dr. Martin
Hellman offers his personal opinions later in this Newsletter. -Ed.
Clipper is an encryption chip developed and sponsored by the U.S. government
as part of the Capstone project. Announced by the White House in April, 1993
Clipper was designed to balance the competing concerns of federal law-
enforcement agencies with those of private citizens and industry. The law-
enforcement agencies wish to have access to the communications of suspected
criminals, for example by wire-tapping; these needs are threatened by secure
cryptography. Industry and individual citizens, however, want secure
communications, and look to cryptography to provide it.
Clipper technology attempts to balance these needs by using escrowed keys. The
idea is that communications would be encrypted with a secure algorithm, but
the keys would be kept by one or more third parties (the "escrow agencies"),
and made available to law-enforcement agencies when authorized by a court-
issued warrant. Thus, for example, personal communications would be impervious
to recreational eavesdroppers, and commercial communications would be
impervious to industrial espionage, and yet the FBI could listen in on
suspected terrorists or gangsters. In the case of Clipper, each key is split
into two parts, each of which is stored at one of two escrow agencies; both
parts must be known in order to recover the key.
Clipper has been proposed as a U.S. government standard; it would then be used
by anyone doing business with the federal government as well as for
communications within the government. For anyone else, use of Clipper is
strictly voluntary. AT&T has announced a secure telephone that uses the
Clipper chip.
The Clipper chip contains an encryption algorithm called Skipjack, whose
details are classified. Each chip also contains a unique 80-bit unit key U,
which is escrowed in two parts at two escrow agencies. Also present is a
serial number and an 80-bit "family key" F; the latter is common to all
Clipper chips. The chip is manufactured so that it cannot be reversed
engineered; this means that the Skipjack algorithm and the keys cannot be read
off the chip.
When two devices wish to communicate, they first agree on an 80-bit "session
key" K. The method by which they choose this key is left up to the
implementer's discretion; a public-key method such as RSA or Diffie-Hellman
seems a likely choice. The message is encrypted with the key K and sent; note
that the key K is not escrowed. In addition to the encrypted message, another
piece of data, called the law-enforcement block, is created and sent. It
includes the session key K encrypted with the unit key U, then concatenated
with the serial number of the sender and an authentication string, and then,
finally, all encrypted with the family key. The receiver decrypts the law-
enforcement block, checks the authentication string, and decrypts the message
with the key K.
Now suppose a law-enforcement agency wishes to tap the line. It uses the
family key to decrypt the law-enforcement block; the agency now knows the
serial number and has an encrypted version of the session key. It presents an
authorization warrant to the two escrow agencies along with the serial number.
The escrow agencies give the two parts of the unit key to the law-enforcement
agency, which then decrypts to obtain the session key K. Now the agency can
use K to decrypt the actual message.
It has not yet been decided which organizations will serve as the escrow
agencies, that is, keep the Clipper chip keys. No law-enforcement agency will
be an escrow agency, and it is possible that at least one of the escrow
agencies will be an organization outside the government.
It is essential that the escrow agencies keep the key databases extremely
secure, since unauthorized access to both escrow databases could allow
unauthorized eavesdropping on private communications. In fact, the escrow
agencies are likely to be one of the major targets for anyone trying to
compromise the Clipper system; the Clipper chip factory is another likely
target.
The encryption algorithm contained in the Clipper chip is known as Skipjack
and was designed by the NSA. It uses an 80-bit key to encrypt 64-bit blocks of
data; the same key is used for the decryption. Skipjack can be used in the
same modes as DES and may be more secure than DES, since it uses 80-bit keys
and scrambles the data for 32 steps, or 'rounds'; by contrast, DES uses 56-bit
keys and scrambles the data for only 16 rounds.
The details of Skipjack are classified, although the government has invited a
small group of independent cryptographers to examine the algorithm. The
decision not to make the details of the algorithm publicly available has been
widely criticized. Many people are suspicious that Skipjack is not secure,
either due to oversight by its designers, or by the deliberate introduction of
a secret trapdoor. Another consequence of Skipjack's classified status is that
it cannot be implemented in software, but only in hardware by government-
authorized chip manufacturers.
Controversy has arisen in many areas: first, there is controversy about the
whole idea of forced escrow of keys. Those in favor of escrowed keys see it as
a way to provide secure communications for the public at large while allowing
law-enforcement agencies to monitor the communications of suspected criminals.
Those opposed to escrowed keys see it as an unnecessary and ineffective
intrusion of the government into the private lives of citizens. They argue
that escrowed keys infringe their rights of privacy and free speech. It will
take a lot of time and much public discussion for society to reach a consensus
on what role, if any, escrowed keys should have.
The second area of controversy concerns various objections to the specific
Clipper proposal, that is, objections to this particular implementation of
escrowed keys, as opposed to the idea of escrowed keys in general. Common
objections include: the Skipjack algorithm is not public and may not be
secure; the key escrow agencies will be vulnerable to attack; there are not
enough key escrow agencies; the keys on the Clipper chips are not generated in
a sufficiently secure fashion; there will not be sufficient competition among
implementers, resulting in expensive and slow chips; software implementations
are not possible; and the key size is fixed and cannot be increased if
necessary.
Silvio Micali has recently proposed an alternative system that also attempts
to balance the privacy concerns of law-abiding citizens with the investigative
concerns of law-enforcement agencies. Called fair public-key cryptography, it
is roughly similar to the Clipper chip proposal but users can choose their own
keys, which they register with the escrow agencies. Also, the system does not
require secure hardware, and can be implemented completely in software.
- Paul Fahn
APPLE SHIPS RSA DIGITAL SIGNATURES IN LONG-AWAITED SYSTEM 7 PRO
On October 4th, Apple Computer introduced millions of new users to the RSA
Digital Signature. The products are called PowerTalk and PowerShare, and they
are part of System 7 Pro, a revolutionary new version of the Macintosh's
advanced operating system.
Evolving personal communications needs, coupled with organizational trends,
have fueled demand for a whole new class of applications, which Apple calls
collaborative applications, which enable individuals to communicate and work
together with each other more effectively. To establish the foundation for
such applications, Apple extended its System 7 operating system with a tightly
integrated set of capabilities called PowerTalk and PowerShare.
PowerTalk and PowerShare consist of five components, tightly integrated with
the operating system itself: Messaging, Electronic Mail, Directories, Privacy
and Authentication, and Digital Signatures. Every user will have access to RSA
Digital Signature technology for messaging authentication and RSA's lightning
fast RC4 symmetric stream cipher for server-to-server link encryption.
Furthermore, every application developer has access to these services as well,
and third party Mac products using PowerTalk's RSA capabilities are available
now from Shana Corporation, and many others are coming soon.
PowerTalk is compliant with the Public Key Cryptography Standards (PKCS),
which Apple helped develop, and users will receive a voucher for a free
unaffiliated "residential" digital certificate, good for use with any secure
PKCS or Internet PEM-compliant application (see Certificate Services article,
next page).
For more information on System 7 Pro or PowerTalk and its RSA security
implementation, contact Pierre LeClercq at Apple Computer at 408/974-3179.
- Kurt Stammberger
INTERNET PRIVACY ENHANCED MAIL ARRIVES
Several commercial and "freeware" versions of Internet Privacy-Enhanced Mail
are available right now. Here are just a few that you can use to start
sending encrypted, authenticated mail over the Internet.
TechMail
Written at MIT, TechMail provides an easy-to-use electronic mail reading
program for Macintosh and (soon) Windows platforms. TechMail includes a full
implementation of the Internet PEM RFC's, using RSA's TIPEM toolkit as its
security "engine." TechMail is a client of the Internet "Post Office Protocol"
(or just POP). With POP, E-mail is not directly delivered to a person's PC or
Macintosh but instead is delivered to a POP server. This is important when
people wish to turn off (or take home with them!) their systems at the end of
the day - their mail will be accepted and held at the "Post Office" until they
request it. Today, TechMail for the Mac (both SLIP and non-SLIP) is available
on the Internet via anonymous FTP from net.dist.mit.edu (in pub/TechMail).
Although only the Macintosh versions of TechMail are available today, work is
progressing on the Microsoft Windows version which should be available
shortly.
TIS/PEM and T-Mail
TIS/PEM is a non-commercial freeware implementation of Internet PEM that was
developed by Trusted Information Systems under contract with ARPA and
agreement with RSADSI, and is available in source code for academic research
or exploratory use by corporations and individuals on the Internet. TIS/PEM
was designed by TIS to be easily integrated into any UNIX-based E-mail message
handling package. Currently, TIS/PEM operates on a majority of the UNIX
systems used on the Internet, and has also been integrated with the widely
used Rand MH Mail User Agent software, which is fully compatible with SMTP-
based MTA's (such as Sendmail and MMDF). T-Mail, or "Trusted Mail" is TIS's
commercial, supported version of the TIS/PEM product, and is available on
multiple platforms. For more information on T-Mail or TIS/PEM, please send
requests via E-mail to tispem-support@tis.com, or call Frederick Avolio at TIS
at (301) 854-6889.
TIPEM 1.1
TIPEM version 1.1 is the latest release of RSA's Toolkit for Interoperable
Privacy-Enhanced Messaging. The upgrade includes several new modules which
allow developers to create applications that comply to the Internet Privacy-
Enhanced Mail (PEM) standards, as well as the commercial Public Key
Cryptography Standards (PKCS) established by vendors including Lotus, Apple,
Novell and Microsoft. The toolkit, which has been used for major
communications security development projects such as Apple's PowerTalk, allows
software developers to easily add RSA public key encryption and authentication
features to any mail, mail-enabled or messaging-based application. TIPEM is
available direct from RSA Data Security, Inc.
RIPEM
RIPEM is another "freeware" public key encryption program designed for
Internet PEM. RIPEM version 1.1 implements a subset of Internet Privacy-
Enhanced Mail (PEM), as described in Internet RFC's 1421-1424. RIPEM
implements a number of mechanisms to manage public keys. RIPEM can obtain
public keys from user-managed files, from Internet key servers, and via the
Internet "finger" protocol. The Internet host ripem.msu.edu acts as a RIPEM
key server for users who choose to register their keys. RIPEM is for the
Macintosh, MS-DOS, Windows NT, OS/2, and all major versions of UNIX. RIPEM is
available via anonymous FTP to rsa.com, and via non-anonymous FTP to
ripem.msu.edu.
RSA CERTIFICATE SERVICES CENTER OPENS FOR BUSINESS
Last month, the RSA Certificate Services Center (CSC) officially opened for
business. Right now, today, you can obtain real certificates with your name,
public key, and organizational affiliation safely embedded in a
cryptographically tamper-proof digital document. These RSA digital
certificates are your "digital I.D.", needed for use with Apple PowerTalk,
Internet Privacy-Enhanced Mail, or any X.509 certificate-based secured
application. The Certificate Services Center is designed to provide one-stop
shopping for everyone's needs, whether you just need one certificate for
yourself <20> or the ability to issue millions for your employees.
Getting a Certificate
There are two primary types of certificates that are supported by the RSA
Certificate Services Center: affiliated and unaffiliated. The first type of
certificate has an organizational affiliation; e.g., "John Doe, Engineering,
Apple Computer, Inc." The second type of certificate has none: just "John
Doe". Of course, any given person may have multiple certificates.
There are three ways to get a certificate:
1. You can issue your own affiliated certificates, using RSA's Certificate
Issuing System (CIS). When you purchase RSA's Certificate Issuing System
(CIS), you establish your company or organization as a Certification
Authority. You can issue your own certificates for your employees and
affiliates in the RSA Commercial Hierarchy.
2. The CSC can issue affiliated certificates for you, using a CIS housed at
the Certificate Services Center ("Co-Issuer Relationship"). Alternately, your
company or organization can "rent space" on a CIS housed at RSA's Certificate
Services Center. Your organization's RSA private keys are stored inside the
CIS and managed by CSC personnel. CSC personnel process requests from your
organization and issue digital certificates on your behalf.
3. You can purchase individual unaffiliated certificates directly from the
CSC. You can generate a request form for a certificate, known as a
Certificate-Signing Request using RSA-licensee packages like Apple's PowerTalk
or RSA's own TIPEM developer's toolkit. Once that form is notarized, you send
it to the CSC for fulfillment, and the CSC sends back your certificate on
diskette or via E-mail.
Revoking a Certificate
Just like a credit card, occasionally a certificate needs to be "hot listed"
or revoked. This situation may arise if the integrity of the certificate is
jeopardized in any way, for example:
o the owner's RSA Private Key is stolen or compromised;
o the certificate owner changes her name (gets married);
o the owner of an affiliated certificate loses affiliation (i.e. graduates
from a University or is fired from a job)
The CSC manages and disseminates Certificate Revocation Lists (CRLs) for the
entire hierarchy, and revokes certificates on the behalf of its Co-issuer and
Unaffiliated customers.
Verifying a Certificate
There will be occasions when you want an up-to-the-second check on the
validity status of a certificate. The RSA Certificate Services Center offers
several different ways to accomplish this:
Telephone <20> the CSC maintains an automated voice response unit that gives the
current status of any certificate in the entire Hierarchy, simply by keying in
the certificate and issuer serial numbers on your touch-tone phone.
Internet <20> the CSC maintains an automated certificate status E-mail responder.
Modem <20> you can dial directly into the CSC host and gain certificate status
information from the RSA Commercial Hierarchy BBS.
For more information contact George Parsons, CSC Manager, at 415/595-8782.
RSA ENTERS WIRELESS ARENA IN NEW CDPD STANDARDS
A group of major cellular carriers recently announced release 1.0 of the
Cellular Digital Packet Data specification, an open standard designed to
enable customers to send computer data over existing cellular networks. The
release of the specification is a milestone for the communications and
computer industries, enabling the introduction of a variety of new products
and applications to serve business and consumer users who need access to
information anytime, anywhere.
But what makes the CDPD standards particularly significant is that they are
the first cellular specifications to include built-in encryption and
authentication, using two technologies in the BSAFE toolkit from RSA Data
Security, Inc.: the Diffie-Hellman Key Agreement public key algorithm and the
RC4 Symmetric Stream Cipher. The specification will aid applications such as
secure wireless electronic mail messages, database queries or credit card
authorization.
Network manufacturers with CDPD projects under development include AT&T
Network Systems, Motorola, Hughes Network Systems, Cascade Communications
Corporation and Steinbrecher, Inc. Software companies such as EDS, Alcatel
TITN, Retix and Cellular Data, Inc. are already developing platforms that will
drive the CDPD engine. A number of hardware companies have also announced
plans to introduce CDPD-based products, including Apple, IBM, Eo and
Cincinnati Microwave, Inc. Virtually the entire cellular carrier industry is
behind the CDPD effort, with funding provided by carriers such as McCaw,
NYNEX, PacTel, Ameritech and many others.
The CDPD 1.0 specification provides network and customer equipment
manufacturers the parameters for building to this nationwide approach that
sends packets of data in previously "wasted" or unused bandwidths, such as in
the pauses between words in a cellular telephone conversation. The spec
includes details of the CDPD architecture, airlink, external network
interfaces, network support services, network applications services, network
management, radio resource management, radio media access control and, of
course, encryption and authentication. Those interested in obtaining a copy of
the CDPD specification can contact Tom Solazzo, CDPD Project Coordinator at
714/545-9400 ext. 235.
RSA is offering low-cost, standardized BSAFE licensing terms for all CDPD
implementors. Contact Paul Gordon at RSA at 415/595-8782 for more information.
ARKHON TECHNOLOGIES BUILDING RSA-EXTENDED KERBEROS NETWORK SECURITY SYSTEM
Arkhon Technologies. Inc., located in Cerritos, California, has recently
joined the RSA family. Arkhon's new enterprise management product requires the
distribution and maintenance of private keys throughout a large network, which
is divided into a number of Kerberos V domains, and incorporates multiple
vendors and protocols. The Arkhon solution to these security requirements,
which is being built with RSA's TIPEM toolkit, provides secure key management
for any number of distributed Kerberos V servers supporting both logical and
physical domains.
There are three distinct levels of enterprise management in Arkhon's product:
l. the management of the physical network and the distributed
communications environment itself;
2. the remote administration and automation of the control functions for
distributed nodes of the network;
3. the remote administration and automation of the control functions for
sub-systems and application software running on the distributed
platforms.
Arkhon has joined together with the pre-eminent system software vendors in the
industry, including companies such as RSA, Oracle and OCSG. Sometimes called a
"virtual corporation", such partnerships allow a group of specialized
companies to combine their expertise synergistically to create products with
complex functionality in a more timely fashion than traditional software
producers.
Arkhon's architecture allows the modular incorporation of any required system
or application software, providing to the user a single programming interface
and a consistent look and feel. Additionally, Arkhon offers consolidated
support, training, on-line documentation, and tutorial software for its full
product line. Arkhon and its partners constitute the only virtual corporation
with complex solutions to the problems of enterprise management. Contact
Arkhon at 310/809-0760.
- Stan Tomsic, Arkhon Technologies
RSA LICENSEE UPDATE
You can find RSA technology in more products from more vendors than ever
before! Here is a partial list of products available now or coming soon:
Security in the OS
o Novell NetWare 4.0
o Apple System 7 Pro PowerTalk (AOCE)
o Microsoft Windows NT
Secure E-mail
o Enterprise Solutions X.400 Mail
o Trusted Information Systems T-Mail
o Datamedia SecurExchange
Secure Telephone & Fax
o Motorola Commercial STU's
o AT&T 3600, 4100
o Secure Communications, Inc. (ICTI)
Secure Workgroup
o Lotus Notes
o Microsoft Windows for Workgroups
Secure Electronic Forms
o WordPerfect InForms
o Delrina PerForm PRO
o BLOC F3 Forms Automation
Link and Node Encryption
o Semaphore Communications NEU's
o Racal Datacom Datacryptors
o Cylink Link Encryptors
o Newbridge Networks TAP System
o IBM 4755 and 4753
o Northern Telecom X.25 PDSO
Secure Remote Access
o Hilgraeve HyperACCESS/5
o ANS CO+RE InterLock
o Hughes NetLock TCP/IP
o Fischer International RSA/3270
HILGRAEVE LICENSES RSA FOR BEST-SELLING ASYNCH PACKAGE
Hilgraeve, Inc. is about to release the very first mass-market asynchronous
communications package with RSA encryption capabilities built right in. And
the current release of that software, HyperACCESS/5, is already a market
leader.
HyperACCESS/5 is Hilgraeve's top-of-the-line communications software for DOS,
OS/2 and Windows. It is Hilgraeve's flagship product, providing asynchronous
communications and remote workstation control via modem, ISDN telephone
deskset, networked or RS232 connections. HyperACCESS/5 has received PC
Magazine's Editors' Choice Award three out of the last five years for its
quality, performance and ease of use.
Now, using RSA's BSAFE cryptographer's toolkit, point-to-point encryption will
be integrated as a standard feature in future versions of the HyperACCESS/5
product.
Founded in 1987, Hilgraeve is a privately-held company, a pioneer developer
and patent holder in the field of high performance communications software.
For more information on HyperACCESS/5, contact Matt Gray at Hilgraeve at
313/243-0576.
RSA LICENSEE SPOTLIGHT: DATAMEDIA'S SECUREXCHANGE
Datamedia Corporation, based in Nashua, New Hampshire, joined the RSA family
last May with the goal of creating a piece of software that could be used to
bring RSA's state-of-the-art security and authentication features to any E-
mail system. They have since achieved that goal: the product is called
SECURExchange, and it can be used to secure virtually any existing DOS,
Windows or Macintosh E-mail system.
In analyzing the market potential for this new product, Datamedia realized
that while electronic mail networks have become critical parts of the
communication infrastructure in most organizations, most commercial E-mail
systems have little or no capability to protect sensitive information
transmitted over networks. And the E-mail packages that do claim "encryption"
features typically use unproven, cryptographically weak homegrown scrambling
schemes.
In its market survey, Datamedia discovered that many organizations that were
aware of the risks inherent in unsecured E-mail transmission of sensitive
documents placed tight restrictions on what could and could not be sent via E-
mail, thereby devaluing the company's substantial investment in the
technology, and forcing the organization back to expensive, inefficient
transport mechanisms, such as next day air or sealed interoffice mail for
sensitive documents.
Datamedia is helping companies gain back the E-mail advantages of speed,
convenience and cost savings for any document. Datamedia's product is designed
to help organizations realize the full potential of their E-mail investment,
by allowing transmission of even the most confidential or tamper-sensitive
information over existing unsecured E-mail systems.
SECURExhange is an add-in software application that upgrades your existing E-
mail infrastructure with privacy, authentication and positive identification
features. To accomplish this, SECURExchange uses:
RSA Digital Envelopes
Files transmitted using SECURExchange can be placed in a secured electronic
"envelope" that can only be opened by the addressee. The envelope consists of
one or more files which are encrypted using the RSA Public Key Cryptosystem
and DES.
RSA Digital Signatures
Files digitally signed by SECURExchange cannot be tampered with without the
recipient's knowledge, and the recipient can furthermore be absolutely assured
of the identity of the signer in any given message.
RSA Digital Certificates
SECURExchange uses industry standard X.509/PKCS Digital Certificates to prove
identity and RSA Public Key ownership over a network. Certificates, combined
with SECURExchange's compliance to the Public Key Cryptography Standards
(PKCS) mean that users can securely communicate worldwide with users of a
growing family of secured applications, including Internet Privacy-Enhanced
Mail, Apple PowerTalk and BLOC F3 Forms Automation.
SECURExchange has been fully tested with many existing electronic mail
systems, including cc:Mail, Microsoft Mail, DaVinci Mail, Beyond Mail,
Internet, Compuserve, MCI Mail, AT&T EasyLink and many, many more. For more
information on SECURExchange, call Datamedia at 603/886-1570.
DR. RON RIVEST ON THE DIFFICULTY OF FACTORING
(Since the difficulty of "cracking" the RSA algorithm has long been believed
to be roughly equivalent to the difficulty of factoring a given RSA modulus,
we have decided to reprint one of Ron Rivest's classic papers on the
difficulty of the factoring problem. -Ed.)
Abstract
Here are the results of some simple estimations I have done on the projected
difficulty of factoring various sizes of numbers for the next 25 years.
The basic question is:
"In the year YYYY, what size number will I be able to factor for an investment
of $DDDD?"
To be specific, I've looked at
YYYY= 1990, 1995, 2000, 2005, 2010, 2015
and
$DDDD = $25K, $25M, and $25G
(that is, $25,000, $25,000,000, and $25,000,000,000). The three levels might
correspond to "individual", "corporate", and "national" levels of attack. All
calculations are done in 1990 dollars.
Each of these estimates is also done in an "high," "average," and "low" point
of view. (That is, the high estimates are for the greatest number of digits
possible, while the low estimates are for the least number possible.)
The estimates are done in terms of MIP-years, a computational unit of power
analogous to a "kilowatt-hour" of electricity. Specifically, a MIP-year is the
computational power of a one-MIP machine running for one year. A MIP (more
correctly, a MIPS) is a "million-instruction per second" machine. Today's
workstations run in the 1 to 10 MIPS range, and 100 MIPS machines are under
development. One MIP-year corresponds to 3.15x1013 operations.
Factoring algorithms
To factor a number n with current technology using the best known algorithms,
we need a number of operations roughly equal to
L(n) = exp (_ ln n ln ln n) (1)
(Using, say, the quadratic sieve algorithm.) We use this formula for our "low"
estimates, since this is currently achievable. For our "average" estimate, we
use the formula
A(n) = min (L(n), exp (2.08 (ln n)l/3 (ln ln n)2/3)) (2)
This presupposes that the number field sieve (NFS) can be generalized to
handle ordinary (cryptographic) numbers, as conjectured in the 1990 ACM STOC
article. Finally, for the high estimates, we use the formula
H(n) = exp (1.526 (ln n)l/3 (ln ln n)2/3) (3)
which is the number of operations that NFS now uses for rarefied numbers.
(Achieving this formula would be quite a breakthrough.)
Costs of computation
I estimate that today a MIP-year costs about $10, as follows. You can buy
(parts for) a 10-MIP machine for about $500. With a lifetime of five years,
you get 50 MIP-years out of the machine.
As for rates of technological progress, for the "low" estimate I assume that
technology only advances at 20%/year. For the "average" estimate I assume that
technology advances at 33%/year, and for the "high" estimate I assume
45%/year. These are measured in terms of the drop in the cost of a MIP-year in
constant 1990 dollars. Thus, under the high estimate, $10 will buy 1.45 MIP-
years in 1991 and 2.10 MIP-years in 1992, etc.
At this rate, we can estimate the number of MIP-years that can be bought for
$1 as follows:
Year Low Average High
1990 0.100 0.100 0.100
1995 0.249 0.416 0.641
2000 0.619 1.732 4.109
2005 1.540 7.207 26.340
2010 3.833 30.000 168.800
2015 9,540 124.800 1082.000
2020 23.74 519.500 6935.000
Combining this with our "low" ($25K), "average" ($25M), and "high" ($25G)
estimates for dollars available, we arrive at the following chart for the
number of MIP-years affordable. (Here T is the abbreviation for "tera," i.e.
1012.)
Year Low Average High
1990 2.5K 2.5M 2.5G
1995 6K 10M 16G
2000 15K 43M 103G
2005 38K 180M 658G
2010 96K 750M 4.2T
2015 239K 3.1G 27T
2020 549K 13G 173T
That is, in the year 2020, a determined opponent with $25G might be able to
afford 173 tera MIP-years to attack a number.
Results
We now give the number of operations required to factor numbers of various
sizes under our low, average, and high estimates (formulas (1), (2), and (3)).
These are given in MIP-years.
Digits Low Average High
100 74 74 0.1
150 1M 1M 38
200 4G 4G 4K
250 6T 2T 261K
300 5 x 1015 3 x 1014 10M
350 2 x 1018 2 x 1016 252M
400 9 x 1020 1018 5G
450 2 x 1023 6 x 1019 81G
500 4 x 1025 2 x 1021 1T
Combining the above charts with some additional calculation, we end up with
our low, average, and high estimates for the size of a number (in digits) that
an attacker would be able to factor at various points in time.
Year Low Average High
1990 117 155 388
1995 122 163 421
2000 127 172 455
2005 132 181 490
2010 137 190 528
2015 142 199 567
2020 147 204 607
Conclusions
If one wishes to devise a "standard" based on a 25-year lifetime for an
average attack, then a recommendation of 200 decimal digits (665 bits) seems
justified. A "super-master" key over the same lifetime might well be chosen to
be three times that length (600 decimal digits, or 1994 bits).
- Dr. Ron Rivest
RSA FACTORING CHALLENGE UPDATE
The RSA Factoring Challenge, sponsored by RSA, is essentially a list of very
long numbers posted on the RSA host on the Internet (rsa.com). The Challenge
serves two purposes: it provides a testing platform for new factoring
algorithms, and it also provides data which RSA (and others) use to measure
the advance of factoring technology. RSA then turns around and uses these data
to recommend key sizes for various customer projects, based on the customer's
security needs.
The numbers in the factoring challenge are of two types; so-called partition
numbers, which can act as a good general assessment of factoring algorithms,
and RSA challenge numbers which are numbers of the type that would typically
be used as RSA moduli, because they are assumed to be particularly difficult
to factor.
There are cash prizes for the most successful factorers, although the rules by
which the money is distributed ensure that factoring a smaller partition
number that has remained unfactored for a relatively long time is rewarded
more than the factoring of a larger partition number. Factoring any RSA
challenge number is a considerable achievement in itself, and is rewarded
accordingly. Prizes vary anywhere from the tens to the thousands of dollars,
and unrewarded prize money rolls over in a "kitty" from month to month, much
like a State Lottery.
Since its inception in March 1991, over a thousand partition numbers have been
factored, providing a complex picture of the success of different algorithms
for numbers of varying sizes. By contrast, only three RSA challenge numbers,
of lengths 100, 110 and 120 decimal digits have been factored. "RSA-110,"
consisting of 110 decimal digits, required an estimated 75 mips-years of
computer time, while "RSA-120," which was successfully factored only last
June, consumed over 800 mips-years of computation.
From these data it is clear that even a small increase in the length of
typical RSA moduli requires the use of considerable additional computing
effort. A typical RSA modulus (some 512 bits long, consisting of 155 decimal
digits) can be expected to lie well out of reach of current techniques for the
foreseeable future.
Information and rules for the factoring challenge can be obtained by E-mail
from challenge@rsa.com. A thorough review of the data accumulated over the
past two years has recently been completed, and will soon be available as an
RSA Laboratories technical report.
- Dr. Matthew Robshaw
RSA LABORATORIES REPORT
Over recent months, RSA Laboratories has become increasingly busy. As well as
the customary work of technical support and independent consulting, we
continue to maintain our close awareness of recent work in the cryptographic
community, particularly new results from recent IACR meetings such as
Eurocrypt '93. We are releasing an increasing number of RSA Laboratories
technical reports and we anticipate the imminent publication of the newly
updated version of "Frequently Asked Questions".
New projects have included an analysis of the vast quantity of data received
as a result of the RSA Factoring Challenge. The challenge was established over
two years ago with the aim of assessing the limits in factoring ability. A
full analysis of this data is now being concluded and the full report will be
available soon.
A particularly exciting development has recently become a major research
priority at the Labs. Research at RSA Laboratories has revealed a
cryptographic technology that could provide a solution to some of the more
pressing problems associated with the distribution of data by CD-ROM. Patent
applications have been filed, and the project code-named "Arcade".
Recently we were pleased to host our first annual RSA Laboratories Seminar
Series. Diverse sessions provided not only a full review of many of today's
issues, but also news and assessment of the very latest advances within the
cryptographic community. We are pleased to report that there was considerable
interest in this new venture, with scientists and developers from many of our
major licensees attending. Currently, of course, we are quite busy planning
technical sessions for January's upcoming 1994 RSA Data Security Conference <20>
we hope to see you there!
- Dr. Matthew Robshaw
PUBLIC KEY CRYPTOGRAPHY STANDARDS UPDATE
RSA Laboratories just sent out for comments the first set of revisions to the
Public-Key Cryptography Standards. Major improvements include the following:
o PKCS #7, the cryptographic message standard, now supports certificate-
revocation lists (CRLs), "certificates-only" messages, and messages
encrypted with only secret-key algorithms
o PKCS #10, a new standard for certification requests, is added. The
standard gives compact formats for requesting key certification services
such as those offered by RSA Data Security and other certification
authorities.
Editorial improvements include updates to the references and the addition of a
revision history. PKCS #1 now gives a comparison of MD2, MD4, MD5; the
overview addresses compatibility between PKCS and new work, including NIST's
proposed Digital Signature Standard, ISO/IEC 9796, and ANSI X9.30 and .31; and
the examples reflect new naming conventions.
The proposed revisions, pending approval by the PKCS participants, should be
released in September. Suggestions for further improvements are welcome.
Since its publication in June 1991, PKCS has become a part of several
standards and products, including Privacy-Enhanced Mail, the NIST/OSI
Implementors' Workshop, BLOC F3 Forms Automation, Apple's PowerTalk, Shana
Informed, Fischer International's Workflow 2000, and RSA's TIPEM and BSAFE.
More is just around the corner.
- Dr. Burton S. Kaliski
THE CLIPPER CHIP: ONE SCIENTIST'S PERSPECTIVE
Dr. Martin Hellman is one of the co-inventors of Public Key technology, a
Distinguished Associate of RSA Laboratories, and is currently a professor of
Electrical Engineering at Stanford University. -Ed.
The CLIPPER and CAPSTONE initiatives have hit the crypto community like an
asteroid impacting Earth. Some dinosaurs are likely to become extinct (DES and
the lack of a public key standard). But the impact is so great that
cryptographic evolution itself might seem threatened: What good is
cryptography if someone else can access your key without your knowledge or
permission? Here I offer some thoughts on how to maximize the probability of
evolution continuing, and perhaps even benefiting from this unexpected impact.
(The first I heard of it was in the New York Times!)
Looking back to my fight with NIST and NSA over DES in the 1975-80 time frame,
I see that fighting them did not work very well. I got a lot of good press,
but not one additional bit of key size (my main goal). NSA has immense power
to determine what gets manufactured and what does not. As evidence that DES
was not an anomaly, AT&T has already decided to shift its 3600 encrypted
telephone from DES to CLIPPER. This time, I would like to get more of what I
want on the technical side, even though compromise does not make as many
headlines.
Based on my experience with DES, the algorithm and key size are probably
frozen in concrete, but the administrative procedures governing key escrow,
and possibly even the secrecy of the SKIPJACK encryption algorithm used by
both CLIPPER and CAPSTONE, might still be influenced. Thus, while I would like
to see the key size increased from 80 bits (why limit it if keys are
escrowed?), and I would prefer triply-encrypted DES to SKIPJACK, that is not
where I am putting my main effort. Rather, my main hope is on the following
three administrative changes.
1. More than one court order should be required for a key to be divulged.
While most judges will not succumb to governmental hysteria over
"communist threats" or whatever replaces them, some will think like
Richard Nixon, John Mitchell, or J. Edgar Hoover. If multiple court
orders would slow the process down too much, an after-the-fact GAO-type
audit might suffice, with overly zealous judges removed from future
decisions.
2. If even one of the judges involved in the process believes that the
wiretap request is an illegal abuse of power, as in Watergate or J.
Edgar Hoover' s excesses, penalties should be levied on the requesting
of official. At a minimum, the intended target of the wiretap should be
officially notified, and I would prefer the official be barred from
making any future requests.
3. I would like government officials, from the President on down, to be
subject to the same key escrow requirements as the rest of us. This
would help insure the safety of the escrow system (they would have a
major incentive to make sure it was working!), and would help prevent
illegal activities on the part of the government- everything from Iran-
Contra-type abuses through illegal wiretapping.
Interested readers can obtain the full text of my comments to NIST, on which
this article is based, by anonymous ftp over Internet on isl.stanford.edu in
the file /pubs/hellman/nist clipper.txt.
- Dr. Martin Hellman
SMARTDISK - THE SMARTCARD THAT NEEDS NO READER
How would you like to get your hands on a single pocket-sized device that
could: identify users to the system, store their passwords and crypto-keys and
protect access to PCs and data? What if that device plugged straight into the
front of most computers without the need for any additional hardware
connector, cables or readers? And suppose that it could also provide a trusted
time source and generate random numbers <20> would you want one? Well, now you
can.
It is a SmartDisk; it is shaped like a regular 3.5" floppy and fits into a
standard disk-drive but it contains no magnetic media. The SmartDisk is a
solid state electronic device containing a microprocessor, memory, real-time
clock and special magnetic interface circuitry that allows it to interface
directly with floppy disk-drive heads. It has its own embedded operating
system firmware <20> SDOS <20> which provides all the functions necessary to support
a wide range of computer and data security applications.
The SmartDisk is effectively a high performance smartcard which doesn't need a
reader. However, in addition to the normal smartcard functions such as
password verification and secure data storage, the SmartDisk can also provide
hardware "boot protection" for PC access control applications. This is
achieved by a unique function within SDOS which, on insertion of the SmartDisk
into a disk drive, will output special bootstrap software for direct execution
in the PC at power-up (or re-boot) before the PC disk operating system (DOS)
is loaded. This special bootstrap is fully programmable by the SmartDisk
systems integrator and can be used to gain complete control over the PC
environment without the need to install special hardware on the PC's internal
bus.
The first application available for the SmartDisk is SafeBoot, a complete PC
access control package which is virtually unhackable. Unlike most software-
only security systems, SafeBoot stores its encryption algorithm and key on the
SmartDisk rather than on the PC's hard disk, where they can be relatively
easily found using low level software tools such as Norton Utilities.
Various other applications are currently under construction by SmartDiskette
Security Corporation (supplier of the SmartDisk) and third party vendors. A
full range of "SmartDisk Application Integration Tools" is also available
including a 'C' language dynamic linkable library (DLL) for Windows
applications. For further information contact Gene Wagner or Jon Kaplan at
Fischer International at 813/643-1500.
- Paul Barrett, SmartDiskette
UPCOMING RSA TRADESHOW APPEARANCES
National Computer Security Expo
Anaheim Hilton & Towers
November 8 <20> 9, 1993
1994 RSA Data Security Conference
Hotel Sofitel, Redwood Shores, CA
January 12 <20> 14, 1994
Networks Expo
John B. Hynes Veterans Memorial Convention Center, Boston
February 15 <20> 17, 1994
Electronic Mail Association
Anaheim Hilton & Towers
April 18 <20> 21, 1994
Networld/Interop Spring
Las Vegas Convention Center
May 4 <20> 6, 1994
Networld/Interop Fall
Atlanta, Georgia World Congress Center
September 12 <20> 14, 1994
REGISTER NOW FOR THIRD ANNUAL RSA DATA SECURITY CONFERENCE
What's happening?
RSA Data Security is pleased to announce our third annual Data Security
Conference, to be held at the Hotel Sofitel in Redwood Shores, California. The
conference is set for Wednesday through Friday, January 12-14 1994.
Who should attend?
Cryptographers, software developers, product line managers, security analysts,
product marketing professionals, mathematicians, secure product buyers,
consultants... anyone that has an interest in cryptography and the products
that use it.
What will be covered?
You'll see presentations and products from RSA's major licensees, including
Apple, Microsoft, Novell, Lotus and many others... Panel discussions from
experts from government and industry... Tutorials going all the way from the
basics to the cutting edge of crypto theory and application. A detailed
conference & tutorial schedule will be available November 1st.
How do I register?
Fill out the registration form and fax it back to RSA. Space is extremely
limited: we can only admit the first 400 people that register, so sign up now!
There will be no registration at the door. $245 admits you to the conference
and all tutorials and includes the full hardcopy conference proceedings, a
cocktail reception, and breakfast and lunch all three days.
Conference Dates:
January 12-14, 1994.
Registration Deadline:
Friday, December 17, 1993.
No onsite registration.
Tutorial Selection Deadline:
Friday, December 17, 1993.
Registration Fee: $245 per person
(CA residents add applicable sales tax)
Registration fee includes breakfast and lunch all three days, admission to the
conference and all tutorials, a hardcopy of the full conference proceedings,
cocktail reception, and conference souvenir. Tutorial selection forms will be
sent to conference registrees starting November 1st. Cancellations are subject
to a $50 administrative fee.
Travel Information
Hotel Sofitel
Guaranteed rate $103 per night
(415) 598-9000
The Hotel Sofitel offers a complimentary airport shuttle.