262 lines
14 KiB
Plaintext
262 lines
14 KiB
Plaintext
SUBJECT: SECRET CRYPTOGRAPHIC STANDARD FILE: UFO3234
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Impact of a Secret Cryptographic Standard
|
|
on Encryption, Privacy, Law Enforcement
|
|
and Technology
|
|
|
|
Whitfield Diffie
|
|
Sun Microsystems
|
|
11 May 1993
|
|
|
|
I'd like to begin by expressing my thanks to Congressman
|
|
Boucher, the other members of the committee, and the committee staff
|
|
for giving us the opportunity to appear before the committee and
|
|
express our views.
|
|
|
|
|
|
On Friday, the 16th of April, a sweeping new proposal for
|
|
both the promotion and control of cryptography was made public on the
|
|
front page of the New York Times and in press releases from the White
|
|
House and other organizations.
|
|
|
|
This proposal was to adopt a new cryptographic system as a
|
|
federal standard, but at the same time to keep the system's
|
|
functioning secret. The standard would call for the use of a tamper
|
|
resistant chip, called Clipper, and embody a `back door' that
|
|
will allow the government to decrypt the traffic for law enforcement
|
|
and national security purposes.
|
|
|
|
So far, available information about the chip is minimal and to
|
|
some extent contradictory, but the essence appears to be this: When a
|
|
Clipper chip prepares to encrypt a message, it generates a short
|
|
preliminary signal rather candidly entitled the Law Enforcement
|
|
Exploitation Field. Before another Clipper chip will decrypt the
|
|
message, this signal must be fed into it. The Law Enforcement
|
|
Exploitation Field or LEEF is tied to the key in use and the two must
|
|
match for decryption to be successful. The LEEF in turn, when
|
|
decrypted by a government held key that is unique to the chip,
|
|
will reveal the key used to encrypt the message.
|
|
|
|
The effect is very much like that of the little keyhole in the
|
|
back of the combination locks used on the lockers of school children.
|
|
The children open the locks with the combinations, which is supposed
|
|
to keep the other children out, but the teachers can always look in
|
|
the lockers by using the key.
|
|
|
|
In the month that has elapsed since the announcement, we have
|
|
studied the Clipper chip proposal as carefully as the available
|
|
information permits. We conclude that such a proposal is at best
|
|
premature and at worst will have a damaging effect on both business
|
|
security and civil rights without making any improvement in law
|
|
enforcement.
|
|
|
|
|
|
|
|
To give you some idea of the importance of the issues this
|
|
raises, I'd like to suggest that you think about what are the most
|
|
essential security mechanisms in your daily life and work. I believe
|
|
you will realize that the most important things any of you ever do by
|
|
way of security have nothing to do with guards, fences, badges, or
|
|
safes. Far and away the most important element of your security is
|
|
that you recognize your family, your friends, and your colleagues.
|
|
Probably second to that is that you sign your signature, which
|
|
provides the people to whom you give letters, checks, or documents,
|
|
with a way of proving to third parties that you have said or promised
|
|
something. Finally you engage in private conversations, saying things
|
|
to your loved ones, your friends, or your staff that you do not wish
|
|
to be overheard by anyone else.
|
|
|
|
These three mechanisms lean heavily on the physical: face to
|
|
face contact between people or the exchange of written messages.
|
|
At this moment in history, however, we are transferring our medium
|
|
of social interaction from the physical to the electronic at a pace
|
|
limited only by the development of our technology. Many of us spend
|
|
half the day on the telephone talking to people we may visit in person
|
|
at most a few times a year and the other half exchanging electronic
|
|
mail with people we never meet in person.
|
|
|
|
Communication security has traditionally been seen as an
|
|
arcane security technology of real concern only to the military and
|
|
perhaps the banks and oil companies. Viewed in light of the
|
|
observations above, however, it is revealed as nothing less than the
|
|
transplantation of fundamental social mechanisms from the world of
|
|
face to face meetings and pen and ink communication into a world of
|
|
electronic mail, video conferences, electronic funds transfers,
|
|
electronic data interchange, and, in the not too distant future,
|
|
digital money and electronic voting.
|
|
|
|
No right of private conversation was enumerated in the
|
|
constitution. I don't suppose it occurred to anyone at the time that
|
|
it could be prevented. Now, however, we are on the verge of a world
|
|
in which electronic communication is both so good and so inexpensive
|
|
that intimate business and personal relationships will flourish
|
|
between parties who can at most occasionally afford the luxury of
|
|
traveling to visit each other. If we do not accept the right of these
|
|
people to protect the privacy of their communication, we take a long
|
|
step in the direction of a world in which privacy will belong only
|
|
to the rich.
|
|
|
|
Even when a letter was intercepted, opened, and read, there was
|
|
no guarantee, despite some people's great skill with flaps and seals,
|
|
that the victim would not notice the intrusion.
|
|
|
|
The development of the telephone, telegraph, and radio have
|
|
given the spies a systematic way of intercepting messages. The
|
|
telephone provides a means of communication so effective and
|
|
convenient that even people who are aware of the danger routinely put
|
|
aside their caution and use it to convey sensitive information.
|
|
Digital switching has helped eavesdroppers immensely in automating
|
|
their activities and made it possible for them to do their listening a
|
|
long way from the target with negligible chance of detection.
|
|
|
|
Police work was not born with the invention of wiretapping and at
|
|
present the significance of wiretaps as an investigative tool is quite
|
|
limited. Even if their phone calls were perfectly secure, criminals
|
|
would still be vulnerable to bugs in their offices, body wires on
|
|
agents, betrayal by co-conspirators who saw a brighter future in
|
|
cooperating with the police, and ordinary forensic inquiry.
|
|
|
|
Moreover, cryptography, even without intentional back doors,
|
|
will no more guarantee that a criminal's communications are secure
|
|
than the Enigma guaranteed that German communications were secure
|
|
in World War II. Traditionally, the richest source of success in
|
|
communications intelligence is the ubiquity of busts: failures to
|
|
use the equipment correctly.
|
|
|
|
Even if the best cryptographic equipment we know how to build
|
|
is available to them, criminal communications will only be secure to
|
|
the degree that the criminals energetically pursue that goal. The
|
|
question thus becomes, ``If criminals energetically pursue secure
|
|
communications, will a government standard with a built in inspection
|
|
port, stop them.
|
|
|
|
It goes without saying that unless unapproved cryptography is
|
|
outlawed, and probably even if it is, users bent on not having their
|
|
communications read by the state will implement their own encryption.
|
|
If this requires them to forgo a broad variety of approved products,
|
|
it will be an expensive route taken only by the dedicated, but this
|
|
sacrifice does not appear to be necessary.
|
|
|
|
The law enforcement function of the Clipper system, as it has been
|
|
described, is not difficult to bypass. Users who have faith in the
|
|
secret Skipjack algorithm and merely want to protect themselves from
|
|
compromise via the Law Enforcement Exploitation Field, need only encrypt
|
|
that one item at the start of transmission. In many systems, this would
|
|
require very small changes to supporting programs already present. This
|
|
makes it likely that if Clipper chips become as freely available as has
|
|
been suggested, many products will employ them in ways that defeat a
|
|
major objective of the plan.
|
|
|
|
What then is the alternative? In order to guarantee that the
|
|
government can always read Clipper traffic when it feels the need,
|
|
the construction of equipment will have to be carefully controlled to
|
|
prevent non-conforming implementations. A major incentive that has been
|
|
cited for industry to implement products using the new standard is that
|
|
these will be required for communication with the government. If this
|
|
strategy is successful, it is a club that few manufacturers will be able
|
|
to resist. The program therefore threatens to bring communications
|
|
manufacturers under an all encompassing regulatory regime.
|
|
|
|
It is noteworthy that such a regime already exists to govern the
|
|
manufacture of equipment designed to protect `unclassified but
|
|
sensitive' government information, the application for which Clipper is
|
|
to be mandated. The program, called the Type II Commercial COMSEC
|
|
Endorsement Program, requires facility clearances, memoranda of
|
|
agreement with NSA, and access to secret `Functional Security
|
|
Requirements Specifications.' Under this program member companies
|
|
submit designs to NSA and refine them in an iterative process before
|
|
they are approved for manufacture.
|
|
|
|
The rationale for this onerous procedure has always been, and with
|
|
much justification, that even though these manufacturers build equipment
|
|
around approved tamper resistant modules analogous to the Clipper chip,
|
|
the equipment must be carefully vetted to assure that it provides
|
|
adequate security. One requirement that would likely be imposed on
|
|
conforming Clipper applications is that they offer no alternative or
|
|
additional encryption mechanisms.
|
|
|
|
Beyond the damaging effects that such regulation would have on
|
|
innovation in the communications and computer industries, we must
|
|
also consider the fact that the public cryptographic community has been
|
|
the principal source of innovation in cryptography. Despite NSA's
|
|
undocumented claim to have discovered public key cryptography, evidence
|
|
suggests that, although they may have been aware of the mathematics,
|
|
they entirely failed to understand the significance. The fact that
|
|
public key is now widely used in government as well as commercial
|
|
cryptographic equipment is a consequence of the public community being
|
|
there to show the way.
|
|
|
|
Farsightedness continues to characterize public research in
|
|
cryptography, with steady progress toward acceptable schemes for
|
|
digital money, electronic voting, distributed contract negotiation, and
|
|
other elements of the computer mediated infrastructure of the future.
|
|
|
|
Even in the absence of a draconian regulatory framework, the effect
|
|
of a secret standard, available only in a tamper resistant chip, will be
|
|
a profound increase in the prices of many computing devices.
|
|
Cryptography is often embodied in microcode, mingled on chips with other
|
|
functions, or implemented in dedicated, but standard, microprocessors at
|
|
a tiny fraction of the tens of dollars per chip that Clipper is
|
|
predicted to cost.
|
|
|
|
What will be the effect of giving one or a small number of companies
|
|
a monopoly on tamper resistant parts? Will there come a time,as
|
|
occurred with DES, when NSA wants the standard changed even though
|
|
industry still finds it adequate for many applications? If that occurs
|
|
will industry have any recourse but to do what it is told? And who will
|
|
pay for the conversion?
|
|
|
|
One of the little noticed aspects of this proposal is the arrival of
|
|
tamper resistant chips in the commercial arena. Is this tamper
|
|
resistant part merely the precursor to many? Will the open competition
|
|
to improve semiconductor computing that has characterized the past
|
|
twenty-years give way to an era of trade secrecy? Is it perhaps tamper
|
|
resistance technology rather than cryptography that should be regulated?
|
|
|
|
Recent years have seen a succession of technological developments
|
|
that diminish the privacy available to the individual. Cameras watch us
|
|
in the stores, x-ray machines search us at the airport, magnetometers
|
|
look to see that we are not stealing from the merchants, and databases
|
|
record our actions and transactions. Among the gems of this invasion is
|
|
the British Rafter technology that enables observers to determine what
|
|
station a radio or TV is receiving. Except for the continuing but
|
|
ineffectual controversy surrounding databases, these technologies
|
|
flourish without so much as talk of regulation.
|
|
|
|
|
|
Cryptography is perhaps alone in its promise to give us more privacy
|
|
rather than less, but here we are told that we should forgo this
|
|
technical benefit and accept a solution in which the government will
|
|
retain the power to intercept our ever more valuable and intimate
|
|
communications and will allow that power to be limited only by policy.
|
|
|
|
o The Skipjack algorithm and every other aspect of this proposal
|
|
should be made public, not only to expose them to public scrutiny
|
|
but to guarantee that once made available as standards they will not
|
|
be prematurely withdrawn. Configuration control techniques pioneered
|
|
by the public community can be used to verify that some pieces of
|
|
equipment conform to government standards stricter than the
|
|
commercial where that is appropriate.
|
|
|
|
o I likewise urge the committee to recognize that the right to
|
|
private conversation must not be sacrificed as we move into a
|
|
telecommunicated world and reject the Law Enforcement Exploitation
|
|
Function and the draconian regulation that would necessarily come
|
|
with it.
|
|
|
|
o I further urge the committee to press the Administration to
|
|
accept the need for a sound international security technology
|
|
appropriate to the increasingly international character of the
|
|
world's economy.
|
|
|
|
|
|
|
|
*********************************************************************
|
|
* -------->>> THE U.F.O. BBS - http://www.ufobbs.com/ufo <<<------- *
|
|
********************************************************************* |