Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-17 Thread John Young

John Gilmore wrote:

There have been allegations that NSA influenced Microsoft's encryption
support (one reason that NSA could afford to relax export controls
could be that they've already subverted the highest volume US
products).  It's pretty well acknowledged that NSA did this to Crypto
AG's hardware products decades ago, and has been reading the traffic
of those who depended on those products.  An eavesdropper doesn't need
to break the encryption if they can break the user interface and make
it lie about whether it is really encrypting.

While John may be speculating about NSA subversion of strong crypto,
specific examples of this would be very helpful. Here are a few firms
for consideration as candidates for today's Crypto AGs besides Microsoft 
(meaning latest products, not those that have been suspected in the past):

Cylink
IBM
Lotus
TIS
RSA
PGP

Perhaps it would be fair to list all firms that are now exporting strong
crypto if John's speculation is accurate.

How to get any compromise out in the open is the question. Presumably, 
secrecy agreements or NDAs are in effect for any complicit firm and its 
employees.We've gotten a couple of anonymous letters recently about 
Cylink but nothing on the others.

Duncan Campbell's exchanges with Microsoft have been squelched
by MS, but one final exchange is in the works which summarizes
what MS has publicly stated and what suspicions remain unanswered.
Similar queries in depth could be made to the other crypto exporters,
if for no other reason than to assure their foreign customers that they
can take and answer hard criticism. Otherwise, suspicions of
complicity may undermine credibility of all US crypto products.




RE: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-17 Thread Rodger, William

John wrote:

 There have been allegations that NSA influenced Microsoft's encryption
 support (one reason that NSA could afford to relax export controls
 could be that they've already subverted the highest volume US
 products). 
John Glimore wrote:
 
 There have been allegations that NSA influenced Microsoft's encryption
 support (one reason that NSA could afford to relax export controls
 could be that they've already subverted the highest volume US
 products). 


The FBI has been pretty blatant about their efforts, too. Both Microsoft and
FBI officials told me on background last year that the FBI wanted to be sure
MS included no encryption that wasn't easily broken.

Granted, neither side would go on the record. But the fact that both sources
told me they were willing to be cited as "company executives" and
"government officials" speaks volumes about the PR war the feds have been
waging.

Will Rodger  Voice +1 703
558 3375 
Technology Reporter     Fax +1 703 558
3981 
USATODAY.com   
tech.usatoday.com 
PGP: 584D FD11 3035 0EC2 B35C  AB16 D660 293F C7BE 3F62 
  

 application/ms-tnef


VirtualBanking2000

2000-05-17 Thread R. A. Hettinga


--- begin forwarded text


From: Jay Mandevia [EMAIL PROTECTED]
To: "'[EMAIL PROTECTED]'" [EMAIL PROTECTED]
Subject: VirtualBanking2000
Date: Wed, 17 May 2000 18:35:55 +0100

Dear Robert,

RMR plc in partnership with the Chartered Institute of Bankers (CIB) have
just launched the first web-based conference in the banking industry
entitled VirtualBanking2000 (at www.virtualbanking2000.com). This web based
conference and resource centre is designed to attract a mass audience to
exchange ideas and receive presentations from leaders in the virtual
banking industry. The conference goes live on 18 September 2000 for two
weeks and will address the developing world of branchless banking.

RMR plc have run several successful web based conferences including
Environment97 (www.environment97.org) part of the Engineering Council's
2020 Vision, Safety98 (www.safety98.org), Aviation99 (www.aviation99.com)
and the hugely successful Autism99 (www.autism99.org) which attracted in
excess of 30,000 people and huge amounts of positive publicity. Two new
conferences will be run in May 2000 entitled ForBusiness2000
(www.ForBusiness2000.com) and EnergyResource2000
(www.EnergyResource2000.com).

Given your interest in the Banking Industry, RMR plc are pleased to invite
you to contribute a paper to the Security and Encryption sector of the
conference.

Listed below are the conference sectors.

Security and Encryption

Software

Service and Distribution Channels

Hardware and ATM's

Smart Cards

WAP

Call Centres

Revolutionary Banking

Legislation and Policy

Risk Management

All papers are at our invitation only and will attract a substantial amount
of interest from the invited audience.

The following pieces of information would be needed as soon as possible:

1. A paper title (no later than 15 June 2000)

2. An abstract (100 words) (no later than 15 June 2000)

3. A biography (50 words) (no later than 15 June 2000)

4. A head and shoulders photograph of the author(s) (no later than 15 June
2000)

The full papers (in the region of 3-4000 words) must be technically
oriented and not contain any content of a commercial nature. We need to
receive your contribution no later than 15 July 2000 - in order to finalise
and prepare the content for the conference.

If you would like to see further details, please take a moment to view our
online conference pack - www.virtualbanking2000.com/conferencepack.

I look forward to speaking with you later in the next few days.

Kind regards

Jay Mandevia

RMR Plc.
http://www.rmrplc.com/www.rmrplc.com
WebConference Co-ordinator


Tel: +44 1865 733733
Fax: +44 1865 733777
Mail to: mailto:[EMAIL PROTECTED][EMAIL PROTECTED]







--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-17 Thread John Kelsey

-BEGIN PGP SIGNED MESSAGE-

At 02:41 AM 5/17/00 -0700, John Gilmore wrote:
...
Microsoft didn't care
about the actual security they provide their users ("Having at least
some encryption is better than nothing" is wrong and dangerous,
leading to a false sense of security when you are actually
vulnerable).  

I understand the sentiment behind this statement, and I would have
agreed a year ago, but I think this is wrong for most peoples' threat
models.  Having some not-trivially-breakable crypto is better than
nothing for preventing untargeted attacks, where someone's just
looking at the traffic that goes by, checking for anything
interesting.  That's honestly the right threat model for most people
to worry about.  

A targeted attack is different.  In that case, someone is willing to
spend real resources to read certain traffic you're sending or
receiving.  Those resources might be time on a DES cracker, or just
time on a network of desktop machines during off hours, cracking 40
bit RC4.  But the resources cost something, and that imposes a limit
on how many people can be targeted.  

Now, I totally agree, there's no good reason (other than stupid
export-control laws) to use breakable crypto when strong crypto will
work just as well.  But even relatively weak crypto, widely deployed,
would do an enormous amount to improve most peoples' privacy.  (Of
course, this is subject to all the obvious caveats about having a
false sense of security, vulnerability to eavesdropping twenty years
from now, of recorded messages, etc.)  

...
There have been allegations that NSA influenced Microsoft's
encryption support (one reason that NSA could afford to relax export
controls could be that they've already subverted the highest volume
US products).  It's pretty well acknowledged that NSA did this to
Crypto AG's hardware products decades ago, and has been reading the
traffic of those who depended on those products.  An eavesdropper
doesn't need to break the encryption if they can break the user
interface and make it lie about whether it is really encrypting.  

Maybe, but if you can dumb down the crypto someone's using, why dumb
it down to 56 bits (which is too short, but still a lot of work to
break)?  Why not dumb down the PRNG, or make the thing leak key bits
in its IV, or something?  I mean, once you are in a position to
weaken someone's crypto, why settle for 56 bits, rather than leaving
them with no security at all against your eavesdroppers, or some
trivial amount.  You could make this really subtle; maybe you always
generate 128-bit outputs from your PRNG, and use the first 64 bits as
IV and the second as a DES key (ignoring parity bits).  You could
make the second 64 bits a function of (say) 16 random bits and the
first 64 bits, and I suspect you could do this, with some PRNG
constructions, in a way that would be *very* hard to see in the code.
 (Keys still have full entropy if looked at by themselves, and key,IV
pairs have 80 bits of entropy, so you need to examine about 2^{40}
key,IV pairs to detect this in a straightforward test.)

I guess one possibility is that you might want to just make sure you
can brute-force interesting traffic.  Another possibility is that
you're counting on interaction between the dumbing-down; the PRNG has
about 1/2 bit of entropy per bit of output, plus you use single-DES,
thus you can break the thing with 2^{28} work, while attackers who
haven't analyzed the PRNG have to do 2^{56} work.  Still another is
that this is just another example of Microsoft not being particularly
interested in security, as opposed to impressive-looking feature
lists, shipping the product on time, fixing most of the visible bugs,
etc.  At some point, it's impossible to distinguish incompetence,
malevolence, or simple lack of interest in security.  

   John

- --John Kelsey, [EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 6.5.1 Int. for non-commercial use
http://www.pgpinternational.com
Comment: foo

iQCVAwUBOSLYsiZv+/Ry/LrBAQG8nwP9FucP/1HrXgxlILoFlI/sWFbgUpbfgm8n
iyW1GeQpyvVqOjj9qy+0VVOiaA3jH3NoSOIBtTv3yY9hibPn8RY62BbquCCCt63l
mOysZa/nCg28+rT7pJk/Y+FngAW4p4d79ICdryMvaLRSlXSdnCPbftfjzjGb2CCL
gVkg1kRHbRY=
=eKQc
-END PGP SIGNATURE-





Microsoft Condoms (may have pinholes) (Re: Critics blast Windows 2000's quiet use of DES instead of 3DES)

2000-05-17 Thread David Honig


A condom with an invisible hole is worse than no condom.

At 12:37 PM 5/17/00 -0500, John Kelsey wrote:
Having some not-trivially-breakable crypto is better than
nothing for preventing untargeted attacks, where someone's just
looking at the traffic that goes by, checking for anything
interesting.  That's honestly the right threat model for most people
to worry about.  

Fine, but the user must be *aware* of their flimsy door locks.  Lest they
act as if they had strong protection, and leave something valuable
around.  This is why MS is negligent (intentionally or accidentally). 
Unlike metal locks, Joe User can't tell whether he's got a cheap toy or a
serious security system.  (Oh yes--- an entry in a log.  How nice.)
Unlike the metal-lock world, with bit-theft, you'll never know you've been
ripped off.  

A targeted attack is different.  In that case, someone is willing to
spend real resources to read certain traffic you're sending or
receiving.  

But if you're using encryption, you must be doing something *interesting*,
and your message is worth reading off line.  And maybe initiate some traffic
analysis on you and your correspondents while waiting for the Bombe to finish.

This "crypto=interesting" principle is valid until most net traffic is
encrypted.   (This is a complement of the "why use crypto? what have you to
hide?" fallacy.)

Giving out free condoms with pinholes is.. criminally negligent.
So is (effectively) silently degrading to 1DES.  Microsoft is giving
condoms with pinholes to teenagers (the cryptonaif public).  S/WAN
is wisely checking for porosity first, and refusing to tango.

(One could imagine a really amusing 101 billboard using this metaphor..)

IMHO









  








House commerce committee votes to ban radio-decryption gear

2000-05-17 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,36401,00.html

House Reps Ban Wireless Decoding
by Declan McCullagh ([EMAIL PROTECTED])

3:30 p.m. May. 17, 2000 PDT
WASHINGTON -- Americans may no longer buy radio receivers that decode PCS
cellular or pager transmissions, a House panel said Wednesday.

The House Commerce Committee also voted to make it a crime to sell electronic
gadgets that can "decode encrypted radio transmissions for the purposes of
unauthorized interception."

The criminal penalties, which were attached to a tax harmonization bill, 
expand existing law, which already bans the sale of devices that can 
intercept analog cellular conversations.

[...]





Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-17 Thread Dennis Glatting



"L. Sassaman" wrote:
 
  If a Microsoft user configures 3DES protection and tries to connect it
  a Linux FreeS/WAN box, the negotiation will fail -- with at least the
  Linux side reporting that they couldn't agree.
 
 Frankly, I can't understand why the IPsec protocol still allows DES. It
 should require strong encryption. Having DES in a product these days makes
 about as much sense as mandating the usage of ROT13.
 

We are waiting for AES.




Re: Critics blast Windows 2000's quiet use of DES instead of 3DES

2000-05-17 Thread Dennis Glatting



"L. Sassaman" wrote:
 
 PGP's source code has always been available for public review. This has
 not changed. There are no "back doors" for the NSA in PGP, and PGP has
 never supported weak (under 128 bit) encryption, and never will.
 

Who's PGP? Last I looked PGP Inc. was owned by Network Associates, a
key recovery alliance member.