Now you bring up the age-old question of eggs and chickens (or chickens and eggs).
Crypto software has export limits also. -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Gary Calder Sent: Thursday, May 25, 2006 10:18 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED]; Gideon Avida; [EMAIL PROTECTED]; Landon Noll; Serge Plotkin; SISWG Subject: Re: Next P1619/1619.1 Meeting -> Discussion Doc D0.7 [EMAIL PROTECTED] wrote: > To get export rights for the Seagate drives, the drive can not allow a way > for the encrypted data to be read. > > If one was to do a normal sector write and then do a read-long command, > they could use the drive as a cryptographic co-processor. With tape the > encrypted data is also readable, and could be considered a cryptographic > co-processor. One difference with tape is that the machines sell in lower > quantities and to large customers, for disc drives there is a much higher > quantity and it is easy for anyone to get one (go to your local store). > > An encrypting tape machine is a $10K (I don't know the real numbers) > cryptographic co-processor. A disc drive could be a $75 cryptographic > co-processor. That is why there are export controls on the disc drive. > > Don > > > Ok, (rhetorical question) how many mips does a general purpose processor have to have before it (plus AES in machine code) would be classsed as a crypto co-processor and subject to export controls? eg: AMD Athlon FX-60 (Dual Core) 27100 MIPS at 3.0 GHz ??? ;-) Regards, Gary > > > > james hughes <[EMAIL PROTECTED]> > Sent by: [EMAIL PROTECTED] > No Phone Info Available > 05/24/2006 10:57 PM > > To > Gary Calder <[EMAIL PROTECTED]>, Gideon Avida <[EMAIL PROTECTED]>, > Landon Noll <[EMAIL PROTECTED]> > cc > james hughes <[EMAIL PROTECTED]>, [EMAIL PROTECTED], SISWG > <[EMAIL PROTECTED]>, Serge Plotkin <[EMAIL PROTECTED]> > Subject > Re: Next P1619/1619.1 Meeting -> Discussion Doc D0.7 > > > > > > > I basically agree what Gary suggests. Sun Microsystems has achieved > export approval for several products and I do not remember text that > requires "access control". The definitions of "Open Cryptographic > Interface" is indeed an interesting one. I doubt that a disk drive > with encryption but without access control would be considered an > "open cryptographic interface". It is my understanding that open > cryptographic interface applies to software APIs and chips, not where > someone has to open a device to harvest the crypto chip (where access > control can make that difficult). > > The response about China is correct, but irrelevant to the access > control issue. The way I read this, they will not let it in, period, > access control or not. > > Again. I think that the other storage encryption vendors should chime > in for both disk and tape. I assume that they are selling > internationally! > > jim > > > > On May 23, 2006, at 10:21 AM, Gary Calder wrote: > > >> James (all), >> >> I have exactly the same concerns as you about the 2nd para in >> Laszlo's document, where it says that access control is required by >> authorities. Even just considering one country, the US, I don't >> think it is as simple as that, here are some references: >> >> The up to date US Export Administration Regulations (EAR) database >> can be found here: http://www.access.gpo.gov/bis/ear/ear_data.html >> >> Of the many documents listed, I think these are the most relevant: >> Part 736 - General Prohibitions http://www.access.gpo.gov/bis/ear/ >> pdf/736.pdf dated 11-09-05 >> Part 740 - License Exceptions http://www.access.gpo.gov/bis/ear/pdf/ >> 740.pdf dated 04-28-06 >> Part 742 - Control Policy -- CCL Based Controls http:// >> www.access.gpo.gov/bis/ear/pdf/742.pdf dated 5-16-06 >> (Part 774) Category 5 (Part 2) - Information Security http:// >> www.access.gpo.gov/bis/ear/pdf/ccl5-pt2.pdf dated 11-18-05 >> >> What follows is my interpretation of the above docs - I have not >> read through all of them word for word (life's too short) but I >> think I get the basic gist. >> >> Everything that is controlled is listed under an ECCN (Export >> Classification Control Number). ECCNs 5A002, 5D002, 5E002 and >> 5A992, 5D992 and 5E992 cover encryption items. Section 742.15 gives >> a broad outline of the licensing policy covering these ECCNs. For >> 5A/D/E002 an export license is required to all countries, except >> Canada. Further exceptions apply, given under 740.17. >> In particular, there is this exception: >> >> -------------------------------------------- >> (2) Encryption commodities and software >> restricted to non-"government end-users." >> This paragraph (b)(2) authorizes the export and >> reexport of items described in §740.17(b)(2)(iii) >> of the EAR that do not provide an "open >> cryptographic interface" and that are controlled >> by ECCNs 5A002.a.1, .a.2, .a.5, or .a.6, or 5D002 >> to individuals, commercial firms, and other >> entities that are not "government end-users" and >> that are not located in a country listed in >> Supplement No. 3 to this part. In addition, the >> transaction must meet the provisions of either >> §740.17(b)(2)(i) or (ii) of the EAR. >> -------------------------------------------- >> >> The relevant ECCN paras mentioned are: >> >> ---------------------------------------------- >> a.1. Designed or modified to use >> "cryptography" employing digital techniques >> performing any cryptographic function other than >> authentication or digital signature having any of >> the following: >> >> a.1.a. A "symmetric algorithm" >> employing a key length in excess of 56-bits; or >> a.1.b. An "asymmetric algorithm" where >> the security of the algorithm is based on any of the >> following: >> a.1.b.1. Factorization of integers in >> excess of 512 bits (e.g., RSA); >> a.1.b.2. Computation of discrete >> logarithms in a multiplicative group of a finite >> field of size greater than 512 bits (e.g., Diffie- >> Hellman over Z/pZ); or >> a.1.b.3. Discrete logarithms in a >> group other than mentioned in 5A002.a.1.b.2 in >> excess of 112 bits (e.g., Diffie-Hellman over an >> elliptic curve); >> a.2. Designed or modified to perform >> cryptanalytic functions; >> ... >> a.5. Designed or modified to use >> cryptographic techniques to generate the >> spreading code for "spread spectrum" systems, >> including the hopping code for "frequency >> hopping" systems; >> a.6. Designed or modified to use >> cryptographic techniques to generate channelizing >> or scrambling codes for "time-modulated ultrawideband" >> systems; >> ----------------------------------------- >> >> I think this is where the term 'required' has been misconstrued. >> Essentially this is saying if you have a product covered by these >> ECCNs, but aimed at end (non governmental) users not located in >> certain countries, where there is no 'open cryptographic >> interface', then export is authorized. >> >> But if you don't have a product that falls under the license >> exemptions, you can still apply for a license.742.15 (i)(ii) says >> that applications are treated on a case by case basis - I would >> take that to mean that even if (say) you had a product that had an >> 'open cryptographic interface' you might still get a license >> authorized, depending on the individual application. >> >> Now it may be that others on this list have some practical >> experience of actually applying for a license - I might be prepared >> to accept that in practice, any product with an 'open cryptographic >> interface' operating at the kinds of data rates that hard disks >> operate would stand a remote chance of getting a license. >> >> My only other experience is with the UK regulations. There is a >> control list which lists a combination of military items classified >> by the UK, plus a European Commission (EC) list of so-called 'dual- >> use' items. These are items which are civilian in nature but can >> have a dual military application. >> The list is available here: http://www.dti.gov.uk/files/ >> file27539.pdf current copy dated 12th April 2006 >> >> In this, category 5 covers "Telecommunications and Information >> Security".In this, you will find similar words as the US EAR regs. >> Even the use of the same numbers 5A002 and 5D002. Why is that? In >> fact, its because the US and Eu countries are all signatories of >> the Wassenaar agreement, mentioned in the 1998 survey you quoted. >> It covers the export of military and 'dual-use' items. This is >> where you can see where the common text of the US/UK/EU lists came >> about. Everything is documented here: http://www.wassenaar.org/ >> controllists/index.html (Category 5 part 2). >> >> This list does not have the corresponding License Exceptions or >> mention of 'open cryptographic interfaces' so I have no idea if a >> similar exception applies to the UK (or EU). I would expect this to >> be country by country dependent. >> >> Of course, many of the *export* regulations are perhaps moot if, as >> with my company, manufacturing and export of the actual product is >> done in the Far East (Taiwan. Korea etc). In that case *import* >> regulations are relevant. AFAIK, these are much more relaxed. For >> example, this is the UK position (http://www.dti.gov.uk/ >> europeandtrade/importing-into-uk/page9728.html): >> >> ---------------------------------------------------------------------- >> ------------------------------------------- >> The majority of goods can be imported into the United Kingdom >> without the need to apply for an import licence. >> >> Currently ILB issues import licences for certain goods mainly to >> implement: >> DTI's trade policy measures >> >> * certain textiles from Belarus, China, Montenegro, North Korea and >> Uzbekistan >> * iron & steel >> >> For safety reasons >> >> * >> firearms and ammunition >> * >> nuclear materials >> >> As a result of international obligations >> >> * >> anti-personnel mines >> * >> rough diamonds and wood products from Liberia >> >> Other Government departments may have their own import >> restrictions. For example the Rural Payments Agency (RPA) issues >> import licences for agricultural, horticultural products and >> certain items of food and drink. Traders importing these products >> will need to contact them for advice not ILB (for link to RPA >> website see related links). It is the responsibility of the >> importers to ensure that he/she is aware of any restrictions on >> goods they wish to import. >> ---------------------------------------------------------------------- >> ---------------------------------------------------- >> >> So while the US and UK/EU and other Wasenaar signatories seem to be >> reasonably aligned in the export policy vis-a-vis encryption >> products, things are still obviously very country dependent for >> granting of export licenses and also imports. >> >> I hope at least this gives the insomniacs amongst you some useful >> bedtime reading. >> >> Regards, >> Gary Calder >> Oxford Semiconductor >> www.oxsemi.com >> >> james hughes wrote: >> >>> I would like some references to the claims in the introduction. My >>> reason for asking about such is that it is important that we >>> (IEEE) standardize what is right, not what is politically in vogue >>> at a moment in history. The I in IEEE is for International. >>> Additionally, I am interested in which market? Anyway, references >>> to the claims of this paragraph should be provided. >>> >>> >>>> Access control not just can be provided, but it is required by >>>> the export control authorities, >>>> >>> Reference? >>> >>> >>>> and also by many local authorities, >>>> >>> Reference? >>> >>> >>>> where storage devices are sold. If the encrypted data is freely >>>> accessible, the encryption module can be used as a stand alone, >>>> high-speed encryption processor, which is prohibited in many >>>> markets. >>>> >>> Reference of the regulation and any example of a storage >>> encryption device where the "encryption module can be used as a >>> stand alone, high-speed encryption processor" in such a way that >>> it violates a law? >>> >>> I have looked for information on the web about this kind of >>> information. There is a summary done in 1998, but I have found >>> nothing online more recent. >>> http://www.gilc.org/crypto/crypto-survey.html >>> >>> >>> On May 19, 2006, at 6:16 PM, [EMAIL PROTECTED] wrote: >>> >>> >>>> Here is an update of the non-removable secure storage discussion >>>> document. It does not contain new information, only editorial and >>>> formatting changes, in an attempt to make it easier to understand. >>>> -Laszlo >>>> <Nonremovable Discussions-D07.pdf> >>>> >>> > > >