Re: How to ban crypto?

2001-09-17 Thread Eric Rescorla
Matt Blaze <[EMAIL PROTECTED]> writes: > If anything, the key escrow problem has become much harder. Today, > far more than three years ago, encryption is central to protecting > many aspects of what we call "critical infrastructure", and, although I've > not systematically studied this recently,

Re: How to ban crypto?

2001-09-17 Thread James S. Tyre
Slashdot put up a decent, relevant article this afternoon. (Yes, a real original article, not just a quickie squib.) http://slashdot.org/article.pl?sid=01/09/16/1647231 James S. Tyre mailto:[EMAIL

Re: Did the US defeat wiretapping success?

2001-09-17 Thread John Denker
At 11:21 PM 9/16/01 -0400, P.J. Ponder wrote: >Senator Hatch was interviewed by national media on Tuesday and stated that >the US government had voice intercepts of calls talking about success with >two targets. He was later criticized for talking about the intercepts. Hm, criticized? Why n

Charles Platt: The Enduring Power of Stupidity

2001-09-17 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Sun, 16 Sep 2001 20:36:04 -0400 (EDT) From: Charles Platt <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Subject: The Enduring Power of Stupidity The Enduring Power of Stupidity During the past five days I have read many essays. To me, all of them have

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread Hadmut Danisch
On Fri, Sep 14, 2001 at 01:57:37PM -0400, Jim Windle wrote: > > Yes and by the logic of your argument jet airliners, telephones, > hotel romms and rental cars also allow terrorists to commit there acts. > Depends on which kind of logic you apply. Technical logic: Yes, you're right. Policital

Re: How to ban crypto?

2001-09-17 Thread Niels Provos
[Some mailer problems. Perry, if possible, can you inject this mail with the headers below?] --- Forwarded Message Subject: Re: How to ban crypto? To: "Angelos D. Keromytis" <[EMAIL PROTECTED]> Cc: Carl Ellison <[EMAIL PROTECTED]>, [EMAIL PROTECTED], [EMAIL PROTECTED] From: Niels Provo

Re: NYC events and cell phones

2001-09-17 Thread Paul Crowley
Peter Fairbrother <[EMAIL PROTECTED]> writes: > Incidently, even the A5/1 algorithm is supposedly not very secure against eg > LEAs, Corporations, or perhaps even a very dedicated amateur, though I have > no exact details to hand. A normal PC with several hundred gigabytes of disk space and two w

Re: How to ban crypto?

2001-09-17 Thread Jei
On Sun, 16 Sep 2001, Peter Fairbrother wrote: > Banning cryptography to deter terrorism, or controlling it to give > GAK, is much in the news these days. I wonder if it could be done? The noble goal of this "ban all crypto"-move, seems to be that all messages should be understandable and readabe

Re: Which internet services were used?

2001-09-17 Thread Matt Crawford
> A german TV news magazine (ZDF spezial) just mentioned that > the terrorists prepared and coordinated > also by using the internet, but no details were told. > > [Moderator: I've listened to virtually all the news conferences made > so far. The FBI has yet to make any such statement. The only

RE: Rijndael in Assembler for x86?

2001-09-17 Thread Trei, Peter
> From: > [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]] > > In article <[EMAIL PROTECTED]>, > Perry E. Metzger <[EMAIL PROTECTED]> wrote: > > > >Helger Lipmaa <[EMAIL PROTECTED]> writes: > > >> Why just not to use a C code? > > > >Because it is typically slower by many times than hand tuned assembl

Re: Which internet services were used?

2001-09-17 Thread Hadmut Danisch
On Mon, Sep 17, 2001 at 09:10:48AM -0500, Matt Crawford wrote: > > The only details I've heard are that the terrorists have "elaborate > web sites" to "recruit and solicit donations." Far short of > operational use of the internet. > They had two websites in Germany, one for recruiting people

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread David Honig
At 11:50 AM 9/17/01 +0200, Hadmut Danisch wrote: >Which politician would dare to ban hotels? Which politician would fail to support mandatory registration of motel occupants with local 'authorities'? >[Moderator's note: Everyone who's got a copy of Netscape or IE has >cryptographic software in

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread Jim Windle
On Mon, 17 Sep 2001 11:50:13 Hadmut Danisch wrote: > >Depends on which kind of logic you apply. > >Technical logic: Yes, you're right. > >Policital logic: No, you're wrong. > >The reason is, that air planes, phones, hotels, cars, etc. >are used by common people - those who elect politicians - >

Re: How to ban crypto?

2001-09-17 Thread Angelos D. Keromytis
In message <[EMAIL PROTECTED]>, David Honig writ es: >At 06:02 PM 9/16/01 -0400, Angelos D. Keromytis wrote: >>Niels Provos (U. of Michigan) has a very interesting paper on detecting >>steganography on the network (he talked about it during the USENIX Sec. WIP >>session). Basically, he didn't fin

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread Hadmut Danisch
> [Moderator's note: Everyone who's got a copy of Netscape or IE has > cryptographic software in their hands, and most of them have used it. --Perry] That's a technical view. I was talking about a political view. In a political discussion there's no point in technical arguments, if less than 3%

Re: chip-level randomness?

2001-09-17 Thread Pawel Krawczyk
On Sat, Sep 15, 2001 at 10:16:27AM -0700, Carl Ellison wrote: > I'm told that the LINUX 2.4 kernel comes with the RNG driver > built-in, but I haven't tried that. It works almost out of box, kernel detects the chip and if you have the necessary device file created (character 10,183 AFAIK) you ca

RE: Which internet services were used?

2001-09-17 Thread Rob Lemos
Title: RE: Which internet services were used? Several of these reports are based on an article that I did. (CNN reported from the article as well, but made too many assumptions and lapse into error.) Essentially, AOL and Earthlink have admitted to working with the FBI to provide whatever data

Re: Did the US defeat wiretapping success?

2001-09-17 Thread Matt Crawford
> >Senator Hatch was interviewed by national media on Tuesday and stated that > >the US government had voice intercepts of calls talking about success with > >two targets. He was later criticized for talking about the intercepts. > > Hm, criticized? Why not indicted? > >(a) Whoever kno

How Dangerous is Crypto?

2001-09-17 Thread Jim Windle
In this debate about restrictions on crypto after Tuesday's events I think it important to address the issues on logical and empirical rather than emotional or ideological grounds. I have made a number of posts but would like to try to summarise. These are my thoughts, your mileage may vary. Wh

Re: Did the US defeat wiretapping success?

2001-09-17 Thread John Denker
At 01:25 PM 9/17/01 -0500, Matt Crawford wrote: >Somehow I doubt that it was not a speech or debate in the senate. And what is the basis for this doubt? All evidence, including that which I quoted in my original message, indicates that he first said it in a media interview. Here is some more

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread Mikael Johansson
> Therefore cryptography is treated differently by political > logic. > > [Moderator's note: Everyone who's got a copy of Netscape or IE has > cryptographic software in their hands, and most of them have used it. --Perry] > > And, beyond that, we have to keep in mind a certain detail: > > Air plan

Rijndael in Assembler for x86?

2001-09-17 Thread Mikael Johansson
Peter Trei wrote: > > From: > > [EMAIL PROTECTED][SMTP:[EMAIL PROTECTED]] > > > > In article <[EMAIL PROTECTED]>, > > Perry E. Metzger <[EMAIL PROTECTED]> wrote: > > > > > >Helger Lipmaa <[EMAIL PROTECTED]> writes: > > > > >> Why just not to use a C code? > > > > > >Because it is typically slower

Re: How to ban crypto?

2001-09-17 Thread Bill Stewart
At 07:21 PM 09/16/2001 -0700, David Honig wrote: >At 06:02 PM 9/16/01 -0400, Angelos D. Keromytis wrote: > >Niels Provos (U. of Michigan) has a very interesting paper on detecting > >steganography on the network (he talked about it during the USENIX Sec. WIP > >session). Basically, he didn't find

No Subject

2001-09-17 Thread David Honig
At 02:14 PM 9/17/01 -0400, Jim Windle wrote: >Second, if we assume for a minute that the terrorist use public key >systems Given their 1. quality opsec including 2. wise avoidance of wireless phones, etc, and their 3. dependence on long-time personal contacts, isn't it more likely that private k

Re: [FYI] Did Encryption Empower These Terrorists?

2001-09-17 Thread lynn . wheeler
we were somewhat involved in the implementation of support of commerce server and hiding account numbers using SSL encryption (probably one of the most wide-spread use of the technology in the world today). random refs: http://www.garlic.com/~lynn/aadsm5.htm#asrn2 http://www.garlic.com/~lynn/aad

ip: US cyberwarriors plan assault on Mideast states

2001-09-17 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Mon, 17 Sep 2001 22:32:32 -0500 To: [EMAIL PROTECTED] From: [EMAIL PROTECTED] (by way of [EMAIL PROTECTED]) Subject: ip: US cyberwarriors plan assault on Mideast states Cc: [EMAIL PROTECTED] http://www.knoxstudio.com/shns/story.cfm?pk=SIEGE-HACKERS-09-

FC: Majority of Americans want anti-encryption laws, poll says

2001-09-17 Thread R. A. Hettinga
--- begin forwarded text Status: U Date: Mon, 17 Sep 2001 23:26:24 -0400 To: [EMAIL PROTECTED] From: Declan McCullagh <[EMAIL PROTECTED]> Subject: FC: Majority of Americans want anti-encryption laws, poll says Sender: [EMAIL PROTECTED] Reply-To: [EMAIL PROTECTED] The following excerpts come f