Re: time dependant

2000-03-07 Thread Zulfikar A Ramzan


One nice number-theoretic approach to the problem of preventing someone
(including the original sender) from decrypting a message before a
certain amount of time elapses can be found in the paper:  

Time-lock puzzles and timed-release Crypto
by Ronald L. Rivest, Adi Shamir, and David A. Wagner.

which is avaialable from:

http://theory.lcs.mit.edu/~rivest/publications.html

The difficulty with this problem, in general, is that the notions of
cpu time and real time don't often coincide.

Hope this help,

Zulfikar.




Re: [Fwd: Export Administration Act of 1979]

2000-03-07 Thread David Honig

At 11:49 AM 3/7/00 -0500, William Allen Simpson wrote:
>It was reported that Clinton was keeping the export controls going by 
>executive order, even tho' congress had failed to re-authorize the 
>sunsetted legislation.  

Clinton has waged wars without congressional approval.  
We don't need no stinkin' laws, we're the government.








  







Re: time dependant

2000-03-07 Thread Michael Paul Johnson

At 05:05 3/8/2000 +0800, Arrianto Mukti Wibowo wrote:
>Hi,
>
>I want to know whether there is a crypto building block which doesn't allow
>someone to open an encrypted message before a certain date.
>
>[Damn hard. Math functions don't grok "date". The only reasonable way
>to do this without a trusted third party is to pick an encryption
>algorithm that will take at least as long to decrypt (in likely
>available computer time) as are needed. -Perry]

Perry is right. If you have a trusted third party with a secure location, 
you could simply have the trusted third party release the key on the 
appointed date.




___

Michael Paul Johnson
http://ebible.org/mpj




Re: time dependant

2000-03-07 Thread Arnold G. Reinhold

At 5:05 AM +0800 3/8/2000, Arrianto Mukti Wibowo wrote:
>Hi,
>
>I want to know whether there is a crypto building block which doesn't allow
>someone to open an encrypted message before a certain date.
>
>[Damn hard. Math functions don't grok "date". The only reasonable way
>to do this without a trusted third party is to pick an encryption
>algorithm that will take at least as long to decrypt (in likely
>available computer time) as are needed. -Perry]
>
>In another word, I need to know several "date/time-related" crypto papers
>around. Can somebody give me pointers?
>

Here is something I posted to sci.crypt on the subject in 1996. (You 
can find it at http://deja.com/usenet by searching on the thread: ' 
Cryptographically secured "Time Vaults" '):
 
  PGP and the Packwood problem.
  Arnold G. Reinhold
  January 19, 1996
 
  The downfall of Senator Packwood of Oregon after his diaries were
  subpoenaed by the Ethics committee of the US Senate may have
  brought to justice a man who abused the public trust, but it must also
  worry historians. Even though Packwood helped surface his
  diaries by attempting to use them in his own defense, many
  politicians will be reluctant to keep candid, private diaries in the future.
 
  Cryptography can provide at least a partial answer to this
  problem. I would propose that some recognized historical societies publish a
  series of PGP public keys. The corresponding private
  keys would be held in escrow for a fixed time frame and then
  released to the public at one year intervals on or about December 31. Thus
  there might be a 1996 key which would become public on Dec 31, 1996, a
  1997 key that would be revealed on December 31, 1997, and so on. The
  keys could be produced at a special event held in conjunction with a
  historical or cryptography meeting. Two
  hundred years worth of keys, say through the year 2100 could be
  generated at one session. The secret keys would be kept both in magnetic
  and printed form, say in a Swiss bank. Or the secret keys might also be
  split into thirds, with two copies of each third and distributed to six
  societies world wide.
 
  Anyone who wished could down load  one of the keys from the
  standard key servers. The key fingerprints might be printed in
  one or more historical journals.  A diarist could simply use the key to
  encrypt his work or use the key to encrypt his own private key. The later
  option would allow him access to his own diaries. He
  could destroy his unencrypted key when trouble arose, before it was
  subpoenaed.
 
  There is always the threat that a judge could attempt to subpoena the
  historical societies' private keys. That is why the keys should be kept in
  countries whose laws would make that difficult. Since the keys might be
  used by more than one individual, the societies might have a strong
  argument against releasing them.
 
  There is also the danger that technology might overtake the
  public key technology that was used in making the keys, In that case the
  historical societies could make new, longer keys. Since the existence of most
  diaries would still be secret, the diarists or their estates could 
super-encrypt
  with the new keys.
 
  The technology threat suggests another option for a secret diarist: He
  could make a guess as to when a certain key size is likely to be breakable.
  He could then make a key of that size and throw away the public key. If he
  did this in front of witnesses, he could have a subpoena-proof diary with
  confidence that his words would
  become readable eventually.



Re: time dependant

2000-03-07 Thread Steven M. Bellovin

In message <010601bf8879$2f4c1980$82d08489@muki>, "Arrianto Mukti Wibowo" write
s:
> Hi,
> 
> I want to know whether there is a crypto building block which doesn't allow
> someone to open an encrypted message before a certain date.
> 
> [Damn hard. Math functions don't grok "date". The only reasonable way
> to do this without a trusted third party is to pick an encryption
> algorithm that will take at least as long to decrypt (in likely
> available computer time) as are needed. -Perry]
> 
> In another word, I need to know several "date/time-related" crypto papers
> around. Can somebody give me pointers?
> 
In the future, it may be possible to base something like this on physical 
principles.  For example (and if I haven't dropped a decimal point), Jupiter 
is never closer than about 2079 light-seconds from Earth.  A message encrypted 
with the public key of a satellite in that orbit could not be received in the 
clear on Earth in less that 4158 seconds.  One could postulate a network of 
such satellites at various distances -- but it would sure strain our 
technology to get any reasonable delays with a single hop.

Second-best would be to use repeated decryptions -- say, a message addressed 
to Pluto Equilateral (about 5.5 light hours away), encrypted with its key, and 
containing a message encrypted with an Earthstation key.  That message in turn 
is encrypted with Pluto Equilateral's key; iterate as needed.

--Steve Bellovin





Re: time dependant

2000-03-07 Thread Eric Murray

On Wed, Mar 08, 2000 at 05:05:24AM +0800, Arrianto Mukti Wibowo wrote:
> Hi,
> 
> I want to know whether there is a crypto building block which doesn't allow
> someone to open an encrypted message before a certain date.
> 
> [Damn hard. Math functions don't grok "date". The only reasonable way
> to do this without a trusted third party is to pick an encryption
> algorithm that will take at least as long to decrypt (in likely
> available computer time) as are needed. -Perry]
> 
> In another word, I need to know several "date/time-related" crypto papers
> around. Can somebody give me pointers?

I don't think it's exactly what you were asking for, but couldn't you
encrypt the data with a session key and then not give the recipient
the key until the certain date?

A related method would be to encrypt the session/bulk key with
a private key who's public key is in a cert which is not valid
until the certain date.  At least that way you can send the data
(and encryted key and cert) at once and not require the recipient to
connect back for the key.  Unfortunately you're depending on
the cert-verifying software that the recipient uses to
actually enforce the cert's Validity... and current s/w is
notoriously lax on that.  Any software solution like
that would be hackable on the recipient's machine.

-- 
 Eric Murray www.lne.com/~ericm  ericm at the site lne.com  PGP keyid:E03F65E5



time dependant

2000-03-07 Thread Raph Levien

mukti wrote:
> I want to know whether there is a crypto building block which doesn't allow
> someone to open an encrypted message before a certain date.

The way I'd do this is to split up the encryption key with a shared
secret scheme, then give the shares to a number of trusted third
parties, who agree to release the shares at the agreed-upon time and
no sooner. If they all decide to cheat on their agreement, then you
lose, although if the fraction over your threshold decide to stay
honest, then you win even if the rest cheat.

It sounds like there might be a business in this. It's relatively
straightforward to implement, and there don't seem to be any
excruciatingly difficult issues of trust and policy, just whether or
not the trusted third party is going to follow the agreement.

Raph



time dependant

2000-03-07 Thread Arrianto Mukti Wibowo

Hi,

I want to know whether there is a crypto building block which doesn't allow
someone to open an encrypted message before a certain date.

[Damn hard. Math functions don't grok "date". The only reasonable way
to do this without a trusted third party is to pick an encryption
algorithm that will take at least as long to decrypt (in likely
available computer time) as are needed. -Perry]

In another word, I need to know several "date/time-related" crypto papers
around. Can somebody give me pointers?

Thanxalot,

-mukti


Check out my homepage: www.geocities.com/amwibowo
  > NEW...! Scholarship information website (6/2/00) (bahasa Indonesia)
 www.geocities.com/amwibowo/beasiswa.html
  > Indonesian E-Commerce Resource Website (bahasa Indonesia)
 www.geocities.com/amwibowo/resource.html





Re: [Fwd: Export Administration Act of 1979]

2000-03-07 Thread Declan McCullagh

At 11:49 3/7/2000 -0500, William Allen Simpson wrote:
>It was reported that Clinton was keeping the export controls going by
>executive order, even tho' congress had failed to re-authorize the
>sunsetted legislation.  I asked my local congress-critter about it, and
>here is the response.  I found it enlightening.

And quoted his congresscritter:
>Congress often lets programs ride until a consensus can be reached. There is
>some talk that the EAA may be reauthorized this year.

Following is some info on this, including a presidental declaration of 
emergency and an excerpt from the Bernstein legal team docs.

-Declan

http://www.eff.org/bernstein/Legal/970107_supplemental.complaint
STATUTORY AND REGULATORY CONTEXT
7.  The EAA expired on August 20, 1994.
 8.  The President has continued the EAR to the extent
permitted by law under authority of the International Emergency
Economic Powers Act ("IEEPA"), 50 U.S.C. sec. 1701 et seq.  Executive
Order 12,924 (1994) ("EO 12924"), 59 Fed.Reg.  43437; Notice of Aug.
15, 1995, 60 Fed.Reg.  42767 (Aug.  17, 1995); Notice of Aug. 14, 1996,
61 Fed.Reg. 42527 (Aug. 14, 1996).



Date: Fri, 14 Aug 1998 11:35:05 -0700 (PDT)
From: Declan McCullagh <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
[Actually, it's just extending the existing one. So the White House can
continue to restrict exports of crypto software like Netscape and
Microsoft's web browsers. --Declan]
 CONTINUATION OF EMERGENCY
 REGARDING EXPORT CONTROL REGULATIONS
 On August 19, 1994, consistent with the authority provided me
under the International Emergency Economic Powers Act (50 U.S.C. 1701
et seq.), I issued Executive Order 12924.  In that order, I declared
a national emergency with respect to the unusual and extraordinary
threat to the national security, foreign policy, and economy of the
United States in light of the expiration of the Export Administration
Act of 1979, as amended (50 U.S.C. App. 2401 et seq.).  Because the
Export Administration Act has not been renewed by the Congress, the
national emergency declared on August 19, 1994, must continue in
effect beyond August 19, 1998.  Therefore, in accordance with section
202(d) of the National Emergencies Act (50 U.S.C. 1622(d)), I am
continuing the national emergency declared in Executive Order 12924.
 This notice shall be published in the Federal Register and
transmitted to the Congress.
 WILLIAM J. CLINTON
 THE WHITE HOUSE,
 August 13, 1998





VERISIGN ACQUIRES NETWORK SOLUTIONS

2000-03-07 Thread Arnold G. Reinhold

VERISIGN ACQUIRES NETWORK SOLUTIONS TO FORM
WORLD'S LARGEST PROVIDER OF INTERNET TRUST SERVICES
 
Mountain View, CA & Herndon, VA, March 7, 2000 - - VeriSign, Inc. 
(Nasdaq:VRSN), the leading
provider of Internet trust services, and Network Solutions, Inc. 
(Nasdaq: NSOL), the world's leading
  provider of Internet domain name registration and global registry 
services, today announced the
signing of a definitive agreement for VeriSign to acquire Network 
Solutions in an all-stock purchase
transaction. This transaction combines two infrastructure leaders 
whose trust services support
businesses and consumers from the moment they first establish an 
Internet presence through the
entire lifecycle of e-commerce activities.

Under the agreement, VeriSign will issue 2.15 shares of VeriSign 
common stock for each share of
Network Solutions stock as constituted prior to the 2-for-1 split of 
Network Solutions stock to be
completed on March 10, 2000. The transaction, valued at approximately 
$21 billion based on
yesterday's closing price of VeriSign common stock, has been approved 
by both companies' Boards of
Directors and is subject to approval by VeriSign and Network 
Solutions stockholders. The acquisition is
expected to close in the third quarter of 2000, subject to customary 
conditions, including obtaining
necessary regulatory approvals. The resulting company expects to add 
to its existing employee base to
exploit new market opportunities. At closing, Network Solutions will 
become a subsidiary of VeriSign
and CEO of VeriSign.

[more at http://www.verisign.com/press/2000/corporate/netsol.html]



[Fwd: Export Administration Act of 1979]

2000-03-07 Thread William Allen Simpson

It was reported that Clinton was keeping the export controls going by 
executive order, even tho' congress had failed to re-authorize the 
sunsetted legislation.  I asked my local congress-critter about it, and 
here is the response.  I found it enlightening.

Now, they are checking to see whether there was any _explicit_ funding
for the export controls.  Perhaps that could be blocked, as a money-
saving initiative.

The last line might be taken as a call to action -- we need to watch.

   Original Message 
 If congress did not
accept his action, it could have legislated his executive order out of
existence. Certainly, when the Republicans took control of congress in 1995,
they could have rescinded his order if they did not want it to operate.
Since 1994, the 104th, 105th and 106th congresses have chosen to allow the
Export Administration Act to exist under emergency authority.

Many, possibly, hundreds of programs whose authorization has run out, are in
existence. Congress frequently appropriates funds for these programs. For
example, the National Endowment for the Arts' authorization ran out. Even
though many in the current majority would like to eliminate the NEA, each
year it is funded because a majority of all members want to. It is not
brought up for reauthorization because no one wants to engage in the fight.

The authorization for the Great Lakes Environmental Research Lab has expired
also. Even so, it is funded every year. 

Congress failed to reauthorize the Federal Aviation Administration. However,
it continues to be funded. Reauthorization legislation was up last year, but
no consensus was reached on certain key issues.

Congress often lets programs ride until a consensus can be reached. There is
some talk that the EAA may be reauthorized this year.



RE: X.BlaBla in PGP??? BWAHAHAHAHAHA!!!!

2000-03-07 Thread Peter Gutmann

"Phillip Hallam-Baker" <[EMAIL PROTECTED]> writes:

>I think you are probably refering to Ron's paper in FC'98. I presented an
>alternative and somewhat radical architecture at RSA'99 which demonstrated
>that it was practical to distribute revocation info in real time for a
>population of 5 billion certs.

There are many good alternatives (actually pretty much everything is better
than CRL's, so it's difficult to come up with a bad alternative), but the
problem they all have is that they're not CRL's.  To paraphrase Bob Jueneman
"The market has spoken.  The answer is CRL's, although noone can quite remember
what the question was".  Given that it's going to be very difficult to make any
headway against this unless you've got a vertical-market application where you
can design things the way you want them, my approach has been to try to turn
CRL's into a silk purse through some form of reprocessing (a CRL -> OCSP
gateway would be an example of this).  That way, you can pretend to have CRL's
(giving the customer exactly what they asked for) while also having a system
which works.  The warning from Padlipsky's "Elements of Networking Style" is
still appropriate here though for anyone trying to work around the problem of
CRL's: "The schoolmen couldn't find how many teeth a horse had in Aristotle; a
student suggested they look in some horses mouths. They expelled him".

Peter.




Re: [Fwd: Export Administration Act of 1979]

2000-03-07 Thread William Allen Simpson

LOTT EYES CLOTURE FOR EXPORT ADMINISTRATION REAUTHORIZATION:
Senate leaders have yet to determine this week's schedule, but
Senate Majority Leader Trent Lott, R-Miss., today said he would like to
move tomorrow or Wednesday to a bill (S 1712) to reauthorize the Export
Administration Act. The measure would rewrite the Cold War-era law
regulating exports with dual commercial and military uses. Lott said he may
have to file cloture to proceed because several senators object to the
bill, contending that it could weaken national security. Bill sponsor Phil
Gramm, R-Texas, and several committee chairmen met Friday to try to reach a
compromise, but aides said they still have some work left. "We should move
forward on this even if there are concerns about it," said Minority Whip
Harry Reid, D-Nev. A cloture vote on either the bill or the motion to
proceed could occur Wednesday if cloture is filed today.