Re: NSA abandons some cool stuff

2001-01-09 Thread Arnold G. Reinhold

At 01:27 PM 1/7/01 -0500, Arnold G. Reinhold wrote:
"Every inch of floor in more than four buildings was covered with
two-by-two-foot squares of bleak brown carpet. When the astronomers
tried to replace it, they discovered it was welded with tiny metal
fibers to the floor. The result, they eventually realized, is that
the rugs prevent the buildings from conducting static electricity.

Even the regular lighting looks different, covered by sleek metal
grids that prevent the light bulbs from giving off static
interference. "

Sounds more like TEMPEST shielding.


It resembles TEMPEST, but shielding works both ways.  The spooks chose
the site because it was RF quiet, but had to run their computers in the
same area as sensitive dishes.  It makes sense that the shielding
was to quiet their own emissions to help their receiving.  After
all, fluorescent bulbs don't leak much intelligence :-) but they
sure cause electrical noise.

You may be right about their concern being to prevent interference 
with their listening equipment, but I don't agree with your last 
point.  As I understand it, all electrical wiring coming out of a 
TEMPEST enclosure has to be carefully (and expensively) filtered. 
The power wiring to lighting fixtures can pick up and re-radiate 
compromising signals. By shielding the fixtures, they effectively 
place the lights outside of the enclosure.  I'll bet the wiring to 
those fixtures is within carefully grounded conduit.

It would be fun to take a tour!

Arnold Reinhold





Digital Money Forum Programme

2001-01-09 Thread R. A. Hettinga


--- begin forwarded text


User-Agent: Microsoft-Entourage/9.0.2509
Date: Mon, 08 Jan 2001 22:26:31 +
Subject: Digital Money Forum Programme
From: "David G.W. Birch" [EMAIL PROTECTED]
To: Bob Hettinga [EMAIL PROTECTED]

Bob,

Can you post this in all of the relevant places: thanks...





. the fourth annual Consult Hyperion forum .
.. D I G I T A L ... M O N E Y . ...


Kensington Park Hotel
London
 April 25th/26th, 2000

  sponsored by
GlobeID

  in association with
E-Finance Forum

Day One.

Benjamin Sahel  Tim Jones
European Central Bank   Purseus

Dominique Hautain   Jon Prideaux
ProtonWorld International   Visa International

Herve Kergoat   Hugh Kingdon
Europay Barclaycard

Mike Hendry Dan Isamann
Payment Systems Consultant  Smart Prepay

Day Two.

Bob HettingaJack Selby
Internet Bearer Underwriting Corp.  PayPal

Viktor Rostov   Charles Cohen
Paycash Beenz

Amir Herzberg   Phil Curtis
NewGenPay   Oberthur

Paavi Helanto   David Birch
Sonera Mobile Pay   Consult Hyperion

.Administration.

  The detailed programme is on line at
http://www.consult.hyperion.co.uk/forum/digmon4.htm

Thanks to the generosity of our sponsors, this year the
seminar costs only 495 pounds Sterling per person excluding
VAT.

The fee includes the seminar, documentation, meals, cocktails
and drinks around the champagne tables..

For further information or to reserve a place please contact

Gloria Benson  [EMAIL PROTECTED]
Telephone +44 1483 301793Fax +44 1483 561657


--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




Re: Perfect compression and true randomness

2001-01-09 Thread David Wagner

Paul Crowley  wrote:
This supports your main point: perfect compression is a *much* less
realistic idea than true randomness!

Yeah.

Now that you mention it, it's not entirely clear what perfect compression
means, but it seems that it would at a minimum require ability to break
every cryptosystem in existence.  In other words, perfect compression is
apparently utterly unrealistic, unless cryptography is impossible.

Consider a very long file which contains
  AES_k(0), AES_k(1), AES_k(2), AES_k(3), ...
for some random key k that is not mentioned in the file.  Of course, the
optimal compression of this file is just 128 bits for the key k, plus a
brief description of the algorithm (AES in counter mode).  However, finding
k is infeasible unless AES is insecure.

In other words, perfect compression of this file requires breaking the AES!
A similar example shows that if there is any secure cryptosystem at all,
then perfect compression is infeasible.

Hence, perfect compression seems to be entirely unrealistic, unless
cryptography is impossible.




Re: Historical PKI resources

2001-01-09 Thread Rich Salz

 Here's the BibTeX entry for the paper that apparently "started it all"..

The D-H paper is the public start of public-key crypto.  The scientific
American article by Gardner explained, pre-patent-issuance, RSA to the
world. The start of PKI is an MIT Master's Thesis that created
certificates.

Sorry, no references to any of the above.  Should not be hard to find.

The adoption by X.509 for use as authentication in X.500 got us common
technology, and is probably the only reason anyone will ever have to
learn
ASN.1 and DER. :)

The old IETF PEM project gave us "---BEGIN" lines :) and showed
empirically
that global X.500 deployment is a non-starter.  RSA's version, which
became
the IETF's S/MIME showed how to do it practically.

I'll stop now before I get too cynical. :)
/r$




Re: NSA abandons some cool stuff

2001-01-09 Thread David Honig

At 07:51 PM 1/8/01 -0500, Arnold G. Reinhold wrote:
After
all, fluorescent bulbs don't leak much intelligence :-) but they
sure cause electrical noise.

You may be right about their concern being to prevent interference 
with their listening equipment, but I don't agree with your last 
point.  As I understand it, all electrical wiring coming out of a 
TEMPEST enclosure has to be carefully (and expensively) filtered. 
The power wiring to lighting fixtures can pick up and re-radiate 
compromising signals.

Yes.

 By shielding the fixtures, they effectively 
place the lights outside of the enclosure.  

Yes.  But 1. you'd still want a filter the power mains
inside your physically secured zone 2. The site had a 
generator... and presumably a guarded perimeter (think 
1/R^2) so emissions were probably less important than
listening sensitivity...

I'll bet the wiring to 
those fixtures is within carefully grounded conduit.

Building codes often require this, anyway, though probably
not grounded to the extent of someone concerned with emissions.
Again, it makes much more sense (cost, number of items to check
periodically) to put isolation centrally.  

It would be fun to take a tour!

It looks like those RF astronomers would be willing, if you
shut your cell phone off while visiting :-), though likely
miffed that you're more interested in the facility than in the
astronomy...

-

Another possibility is that they were so freaked by the static sensitivity
of early MOS devices that they grounded the carpets...








 






  








Update on NIST crypto standards (fwd)

2001-01-09 Thread Steve Bellovin

Forwarded with permission.  There is also going to be an announcement 
on modes of operation; http://csrc.nist.gov/encryption/tkmodes.html 
should have the information within the next month or thereabouts.


--- Forwarded Message


X-Sender: [EMAIL PROTECTED]
X-Mailer: QUALCOMM Windows Eudora Version 4.3.1
Date: Mon, 08 Jan 2001 13:20:18 -0500
To: [EMAIL PROTECTED]
From: Jim Foti [EMAIL PROTECTED]
Subject: Update on NIST crypto standards
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-UIDL: 70f288237482be01d5331b60aec89937

Hello-

Here is a brief update on NIST's crypto standards efforts:

1.  On January 5, 2001, we announced a Draft FIPS for HMAC (Keyed-Hash 
Message Authentication Code) that is a generalization of HMAC as specified 
in Internet RFC 2104 and ANSI X9.71.  A 90-day public comment period ends 
April 5, 2001.  Details are available at http://www.nist.gov/hmac.

2.  On January 2, 2001, we posted a white paper that discusses our plans 
for developing standards and recommendations for public key-based key 
management.  This will be a two-part process, involving the development of 
1) a scheme definition document, and 2) a key management guideline.  This 
paper is available at http://www.nist.gov/kms.

3.  The Draft FIPS for the AES is anticipated for release for public review 
in the very near future.  Final approvals for the release of this document 
are pending.  When an announcement is made, information on the draft and 
for providing public comments will be available at http://www.nist.gov/aes.

Best regards and Happy New Year,

Jim

[This note is being sent to those people who have attended any of NIST's 
AES conferences, the Key Management Standard (KMS) workshop in February 
2000, the Modes of Operation workshop in October 2000, or who have 
expressed other interest in our efforts.  If you would not like to receive 
similar notices in the future (which should be infrequent), please let me 
know, and we will remove you from our email distribution list.]

***
Jim Foti

Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology (NIST)
100 Bureau Drive, Mail Stop 8930
Gaithersburg, MD  20899-8930
USA

TEL: (301) 975-5237
FAX: (301) 948-1233
[EMAIL PROTECTED]
***



--- End of Forwarded Message



--Steve Bellovin






Review of History Channel's NSA documentary

2001-01-09 Thread Declan McCullagh

[The documentary aired again twice this morning on the History Channel, and 
it's a fair bet it'll show again later this week. --Declan


http://www.wired.com/news/politics/0,1283,41063,00.html

History Looks at the NSA
by Declan McCullagh ([EMAIL PROTECTED])

2:00 a.m. Jan. 9, 2001 PST
WASHINGTON -- As anyone who watched Enemy of the State knows, the
National Security Agency is a rapacious beast with an appetite for
data surpassed only by its disregard for Americans' privacy.

Or is the opposite true, and the ex-No Such Agency staffed by ardent
civil libertarians?

To the NSA, of course, its devilish reputation is merely an
unfortunate Hollywood fiction. Its director, Lt. Gen. Michael Hayden,
has taken every opportunity to say so, most recently on a History
Channel documentary that aired for the first time Monday evening.

"It's absolutely critical that (Americans) don't fear the power that
we have," Hayden said on the show.

He dismissed concerns about eavesdropping over-eagerness and all but
said the NSA, far from being one of the most feared agencies, has
become one of the most handicapped.

One reason, long cited by agency officials: Encryption. The show's
producers obligingly included stock footage of Saddam Hussein, saying
that the dictator-for-life has been spotted chatting on a 900-channel
encrypted cell phone.

That's no surprise. The NSA, as Steven Levy documents in his new
Crypto book (which the documentary overlooks), has spent the last 30
years trying to suppress data-scrambling technology through export
regulations, court battles, and even personal threats.

Instead of exploring that controversial and timely subject that's tied
to the ongoing debate over privacy online, "America's Most Secret
Agency" instead spends the bulk of an hour on a history of
cryptography starting in World War II. Most of the documentary could
have aired two decades ago, and no critics are interviewed.

One of the few surprises in the otherwise bland show is the NSA's new
raison d'etre -- infowar.

[...] 





Review of Steven Levy's Crypto

2001-01-09 Thread Declan McCullagh



http://www.wired.com/news/politics/0,1283,41071,00.html

Crypto: Three Decades in Review
by Declan McCullagh ([EMAIL PROTECTED])

8:20 a.m. Jan. 9, 2001 PST
WASHINGTON --It took only a year or two for a pair of computer and
math geeks to discover modern encryption technology in the 1970s. But
it's taken three decades for the full story to be told.

Transforming what is an unavoidably nerdy tale into the stuff of
passion and politics is not a trivial business, but Steven Levy, the
author of Crypto, proves himself more than up to the task.

Crypto (Viking Penguin, $25.95), is Levy's compelling history of the
personalities behind the development of data encryption, privacy and
authentication: The mathematicians who thought up the idea, the
businessmen who tried to sell it to an unsure public and the
bureaucrats who tried to control it.

Levy, a Newsweek writer and author of well-received technology
histories such as Hackers and Insanely Great, begins his book in 1969
with a profile of Whit Diffie, the tortured, quirky co-discoverer of
public key cryptography. Other characters soon populate the stage: The
MIT mathematicians eager to sign documents digitally; Jim Bidzos, the
Greek-born dealmaker who led RSA Data Security from ruin to success;
and Phil Zimmermann, the peace-activist-turned-programmer who gave the
world Pretty Good Privacy.

Until their contributions, the United States and other countries
suffered from a virtual crypto-embargo, under which the technology to
perform secure communications was carefully regulated as a munition
and used primarily by soldiers and spies.

But what about privacy and security? "On one side of the battle were
relative nobodies: computer hackers, academics and wonky civil
libertarians. On the other were some of the most powerful people in
the world: spies, generals and even presidents. Guess who won," Levy
writes.

(Full disclosure: A few years ago, Levy asked this writer to help him
research portions of the book. For whatever reason -- perhaps he found
what he needed elsewhere -- discussions ceased.)

Throughout Crypto's 356 pages, Levy takes the perspective of the
outsiders -- and, in some cases, rebels -- who popularized the
technology. Although he provides ample space for the U.S. government's
views, he casts the struggle between crypto-buffs and their federal
adversaries in terms familiar to foes of government control.

[...]





Re: Historical PKI resources

2001-01-09 Thread Lynn . Wheeler




as an aside  ... note X9.59 which can be implemented with public/private key
digital signature ... but doesn't dictate certificates (it is possible to
implement with or without certificates; x.509 or not). W/o certificates, do
public key management using existing business processes in place for passwords
and PINs ... i.e. in conjunction with the database/file that is also referenced
for authorization (either logging-on or financial transactions).

random refs:

http://www.garlic.com/~lynn/

 from x9a10 mailing list

The X9.59 DSTU period starts Feb. 1, 2001 and runs through Jan. 31, 2003

The X9.59 DSTU standards document should appear in the next standards
publication catalogue:

DSTU X9.59-2001, Electronic Commerce For the Financial Services Industry:
Account-Based Secure Payment Objects

X9.59 defines a secure payment object for use in authenticated financial
transactions. It relies on existing X9F security standards for payment object
authentication. It supports secure payments involving virtual (e.g. Internet) or
face-to-face transactions. It applies to card-based (e.g. smart card) financial
transactions as well as other forms of electronic financial transactions (e.g.
e-check).







Rich Salz [EMAIL PROTECTED] on 01/08/2001 05:39:22 PM

To:   [EMAIL PROTECTED]
cc:(bcc: Lynn Wheeler/CA/FDMS/FDC)
Subject:  Re: Historical PKI resources



 Here's the BibTeX entry for the paper that apparently "started it all"..

The D-H paper is the public start of public-key crypto.  The scientific
American article by Gardner explained, pre-patent-issuance, RSA to the
world. The start of PKI is an MIT Master's Thesis that created
certificates.

Sorry, no references to any of the above.  Should not be hard to find.

The adoption by X.509 for use as authentication in X.500 got us common
technology, and is probably the only reason anyone will ever have to
learn
ASN.1 and DER. :)

The old IETF PEM project gave us "---BEGIN" lines :) and showed
empirically
that global X.500 deployment is a non-starter.  RSA's version, which
became
the IETF's S/MIME showed how to do it practically.

I'll stop now before I get too cynical. :)
 /r$








Re: Digital Money Forum Programme

2001-01-09 Thread R. A. Hettinga

At 5:35 PM -0500 on 1/8/01, R. A. Hettinga wrote:


  April 25th/26th, 2000

...I think David meant 2001, here...
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'




DCSB: Ted Byfield; ICANN, Intellectual Property, and Digital Commerce

2001-01-09 Thread R. A. Hettinga


--- begin forwarded text


Date: Tue, 9 Jan 2001 14:58:50 -0500
To: [EMAIL PROTECTED], [EMAIL PROTECTED]
From: "R. A. Hettinga" [EMAIL PROTECTED]
Subject: DCSB: Ted Byfield; ICANN, Intellectual Property, and Digital
 Commerce
Cc: Ted Byfield [EMAIL PROTECTED], Scott Moskowitz [EMAIL PROTECTED]
Sender: [EMAIL PROTECTED]
Reply-To: "R. A. Hettinga" [EMAIL PROTECTED]

-BEGIN PGP SIGNED MESSAGE-

[Note that the Harvard Club is now "business casual". No more jackets
and ties... --RAH]


  The Digital Commerce Society of Boston

 Presents


Ted Byfield,
 Moderator, Nettime
   (among other things...)

   ICANN, Intellectual Property,
and Digital Commerce

 Tuesday, February 6th, 2000
 12 - 2 PM
  The Downtown Harvard Club of Boston
One Federal Street, Boston, MA




Through an erratic process intended to "lessen the burdens of
government," the Clinton administration transferred governance of the
Internet's essential functions to the Internet Corporation for
Assigned Names and Numbers. In trying to cement its status, ICANN has
sought to transform the net's cooperative structures into a
hierarchical contractual regime geared toward expanding and enforcing
intellectual property claims. The result of ICANN's deviation from
its technical coordination mandate into a captured policy-making
proxy for an absent-minded US government is a centralized namespace
that privileges the demands of late-adopters over innovative
expansions of DNS. This talk will provide a survey of ICANN's
activities to date and how they may advance alternative models and
extensions of DNS as a decentralized, cooperative system that is more
secure and less subject to political whim.


After working for over a decade as decade as an editor focusing on
intellectual and cultural history, Ted Byfield joined the faculty of
Parsons School of Design in New York City, where he teaches about the
social and political aspects of design. In addition to writing and
lecturing about areas where the technical and cultural collide, he is
a member of the rump Boston Working Group, co-moderates the Nettime
mailing list, and serves as an boardmember and advisor for various
New York-area cultural organizations.



This meeting of the Digital Commerce Society of Boston will be held
on Tuesday, February 6th, 2000, from 12pm - 2pm at the Downtown
Branch of the Harvard Club of Boston, on One Federal Street. The
price for lunch is $35.00. This price includes lunch, room rental,
A/V hardware if necessary, and the speakers' lunch. The Harvard Club
has relaxed its dress code, which is now "business casual", meaning
no sneakers or jeans. Fair warning: since we purchase these luncheons
in advance, we will be unable to refund the price of your meal if the
Club finds you in violation of what's left of its dress code.


We need to receive a company check, or money order, (or, if we
*really* know you, a personal check) payable to "The Harvard Club of
Boston", by Saturday, January 3rd, or you won't be on the list for
lunch. Checks payable to anyone else but The Harvard Club of Boston
will have to be sent back.

Checks should be sent to Robert Hettinga, 44 Farquhar Street, Boston,
Massachusetts, 02131. Again, they *must* be made payable to "The
Harvard Club of Boston", in the amount of $35.00. Please include your
e-mail address so that we can send you a confirmation

If anyone has questions, or has a problem with these arrangements
(we've had to work with glacial A/P departments more than once, for
instance), please let us know via e-mail, and we'll see if we can
work something out.


Upcoming speakers for DCSB are:

March 6 TBA
April 3 Scott Moskowitz  Watermarking and Bluespike


As you can see, :-), we are actively searching for future speakers.
If you are in Boston on the first Tuesday of the month, are a
principal in digital commerce, and would like to make a presentation
to the Society, please send e-mail to the DCSB Program Committee,
care of Robert Hettinga, mailto: [EMAIL PROTECTED].

-BEGIN PGP SIGNATURE-
Version: PGP 7.0

iQEVAwUBOlttV8UCGwxmWcHhAQHyQgf9EFME11YN9QQUHfMidGJW/Jl4JYS4kz+c
O+aS217xG7jrHhSzcobImq4Be16XkSz90hNEGfPEikOhOjbv0MHDQue5nOnJy9dN
5TCydlsSbD3Sz2f29FdpU+yV0MM2/puGDFGzZ3mdLFJJENGmAUdmy4FJGZbyLuSI
PWeOikiuRYfuJlsQrzGNT+v6AzvB0DbzufCgGN2nNFRVXdHJny/p3HYj2ZH+53ZR
e4pR1fhRzsK0xA3aQrMBErdGZcOR7iWrDj5va0DMjhw8ZdXQhQDNcQWigdCOnNx6
heY6pvuvSJDLMWb0sV+1QB6NKagKdiYP8U1S6iU1/49/lXToJH2LLw==
=zbvY
-END PGP SIGNATURE-
-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 

Re: Historical PKI resources

2001-01-09 Thread Lynn . Wheeler



the x9.59 standard is authentication as well as certificate neurtral.

aads is pki no certificate ... i.e. it has a public key infrastructure with
respect to public key management ... it just that its public key management
attempts to take advantage of extensive existing "binding" business processes
rather than inventing new ones. Now it may not be PKI, for  PKI==X.509, but it
is not "no infrastructure" (although they have been some claims that no "new"
infrastructure is equated to "no infrastructure", aka existing password, PIN,
mother-maiden-name, SSN, etc infrastructures don't actually exist).





Rich Salz [EMAIL PROTECTED] on 01/09/2001 04:20:44 PM

To:   Lynn Wheeler/CA/FDMS/FDC@FDC
cc:   [EMAIL PROTECTED]
Subject:  Re: Historical PKI resources



Well gee, thanks I guess, but since your baby is explicitly PK no I,
it's
pretty irrelevant, no?

(Anyone else reminded of the old turk/armenian 'bot on Usenet? :)
 /r$








Re: Historical PKI resources

2001-01-09 Thread Rich Salz

R sent me a nice note pointing out that it was actually a bachelor's
thesis, supervised by A.  Apparently unpublished.
/r$ (not S, and certainly not *that* S :)

 @unpublished{Kohnfelder78,
 author =   {Kohnfelder, Loren M.},
 title ={Towards a Practical Public-Key Cryptosystem},
 year = 1978,
 month =May,
 note = {B.S. Thesis, supervised by L. Adleman}
 }