my padlock

2001-01-30 Thread Carl Ellison

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

http://world.std.com/~cme/html/padlock.html

It's self-explanatory.


-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2

iQA/AwUBOnSoNXPxfjyW5ytxEQLviwCfahPcp0FGP+1UB4cs0J6MlN2Em20AoMhq
CHIn1FgxwKhGz8LR9S6WzSkF
=/Izn
-END PGP SIGNATURE-


+--+
|Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme |
|PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+




Re: electronic ballots

2001-01-30 Thread David Honig

At 01:03 PM 1/25/01 -0500, William Allen Simpson wrote:
-BEGIN PGP SIGNED MESSAGE-

I've been working with Congresswoman Lynn Rivers on language for 
electronic ballots.  My intent is to specify the security sensitive 
information, and encourage widespread implementation in a competitive 
environment.  We'd like feedback. 

Fun topic.  

Some comments: 

You should list the desirable properties of a voting system and
then the threats to those properties.  Put it on the table for
everyone to see; you're gonna have to educate them in security
analysis.  A list of goals might look like: 

One man, one vote
 Need no skills (eg literacy), just claim Right, state address, sign name

No coercion 
  Anonymity in voting
  One-time Commit (can't change your mind)

(NB Absentee balloters from home will be subject to domestic coercion, 
but there's little you can do if the spouse is that controlling.)

You introduce lots of extra tracking numbers, which is a threat to
anonymity.  Perhaps it is to defend the one-man-one-vote desirable property
against double-voting attacks, but are those congresscritters aware of this
tradeoff? 

Suggestion: You should also sketch a system, and maybe a 'use case'.  Is
the goal to let absentee voters use a PC from home?  Or to use State PCs
transparently?  Or to use State PCs as an excuse to change election
procedures?   (I don't mean to be hostile here.)

In fact, what do you expect to gain?  Faster results for CNN?  That is said
to skew elections.  More accuracy?  Derived from what?  

In fact, you may lose: The user interface may be worse --displays lack
paper's contrast, and pressing lettered keys or using a mouse is beyond
some voters. It can be better ---using the 'radio button' concept to exclude
voting for more than one--- but it takes careful design and experiment.

Its not clear to me if dig certs are being used in your plans to
authenticate voters to voting machines; or to authenticate voting-machines
to state databases. Or both.   In my state, we use handsignatures, only, to 
authenticate voters.

How do you convince Joe Sixpack that the magic numbers he uses,
and which are linked to his person/residence, aren't linked to his vote? 
When you put cards in a box you achieve quasi-anonymity "that you can see".
 How do you do this with opaque computers?  

How do you avoid a 'traffic analysis'-like attack where you monitor
both the votes sent out to state DB servers and who comes out of the booth?
This would only work on slow polling places, but would let you
link people to their votes.  A solution is to batch.  Maybe not
worth worrying about, but never a problem before networked computer
voting machines.

At which points in the system would a hacked-keyboard (like the
keystroke recording things that go in-line, but one that changes
votes) be detected?  

(D) UNIFORMITY -- Display of candidates shall be substantially similar
for each race within a state.  On each display, the names of
candidates may be randomly ordered within each race.  

Randomly for each voter?  Random by county?  Random by race (so that
in Presidents you see Lib/Demo/Repub but when voting for Governor
you see Repub/Lib/Demo)?

Election
software shall prevent overvote and undervote, and shall allow the
voter to correct such conditions.  Voters unwilling to indicate a
choice may select "no vote".  Where "none of the above" or its
equivalent is a valid choice, "no vote" shall be a separately
distinguished choice.

How about voters not willing to vote for anything in that race, *including*
'no vote'?  Is "no vote" a radio-button default?

(E) VERIFIABILITY --   The record shall not include any other personally
identifiable voter information.  

Yeah, why should it, the Government has the lookup table.  No difference,
if the Government is the source of the threat to anonymity.  Isn't this
part of the threat model? 

SEC. xx20.  POLLING SECURITY REQUIREMENTS

(A) AUTHENTICATION -- Transactions registering voter choices shall be
authenticated by a digital certificate.  

A one-time certificate which comes from a machine that's about to take your
vote?  What is the point?  

Another question: where is your time base from?  GPS?  The internet
time servers?  This matters if/when the computers use their notion of
time to shut voting off.

I don't understand your absentee ballot procedure, except that
legacy paper is still supported via human data entry.  

What happens if someone forgets a PIN? 

To vote absentee in Calif all you need is a stamp and the ability to write
your signature.  Increasing the complexity will deter people.  (Where
did that separate letter with the PIN go?)

(C) DUPLICATES -- When more than one authentic vote by the same absentee
voter is detected, the last such vote shall supercede any earlier
vote.  An absentee voter appearing at the regular polling place shall
supercede any earlier vote.

Duplicate votes are not handled the way you 

Re: electronic ballots

2001-01-30 Thread (Mr) Lyn R. Kennedy

On Thu, Jan 25, 2001 at 01:03:49PM -0500, William Allen Simpson wrote:
 
 I've been working with Congresswoman Lynn Rivers on language for 
 electronic ballots.  My intent is to specify the security sensitive 
 information, and encourage widespread implementation in a competitive 
 environment.  We'd like feedback. 

First the basics:

  1. An electronic election system need only be as good as the current
 system. While perfection remains the goal, the minimum criteria
 is that it be no worse.

  2. There needs to be an absolute disconnect between the voter and the
 vote. Some kind of voting certificate should allow a vote but make
 it difficult to determine how someone voted.

  3. The concept of the polling place needs to be re-examined. If a voter
 can vote from anywhere at anytime then the problem becomes one of
 counting the last vote. A vote signed by an authorized observer
 would supercede any following ones that were not observed.


It seems that something like a smartcard would be the best scheme. The card
would have to be able to encrypt the vote and sign it. An observer would
need an additional card to sign votes. This would allow a voter to vote
from almost anywhere and coercion could be defeated by going to another
place and voting in front of an observer.

Obviously if the smartcard contained a signing key with no way to 
relate it to the external number of the card, there would be some room
for fraud with lost or stolen cards. Replacing these voter certificates
at regular intervals would minimize that.

Even a system relying on software and floppy disks might be as good as
the way we have now. Current systems count on most of the people being
honest anyway.


-- 
-
| 73,E-mail   | [EMAIL PROTECTED]   |
| Lyn Kennedywebpage  | http://webusers.anet-dfw.com/~lrkn/ |
| K5QWB  pony express = P.O. Box 5133, Ovilla, TX, USA 75154|
---Livin' on an information dirt road a few miles off the superhighway---




SDMI watermarks

2001-01-30 Thread Ulf Möller

Now that Princeton has given in to the SDMI's lawyers, two French
cryptographers are publishing independent results on removing the
watermarks. Their technical report is worth reading:

http://www.julienstern.org/sdmi/






DeCSS ruling in DVD case must be reversed, eight amicus briefs say

2001-01-30 Thread Declan McCullagh

Eight different coalitions -- from cryptographers to journalist groups -- 
are filing amicus briefs in the DVD/DeCSS case. The briefs -- an unusually 
high number -- urge that the Second Circuit Court of Appeals overturn the 
district court's ruling of last August.

Wired News article on the briefs being filed today:
http://www.wired.com/news/politics/0,1283,41441,00.html

The journalist/media brief, which focuses on the right to link:
http://www.politechbot.com/docs/linking-amicus.012601.html
The computer scientists' brief (the only one filed earlier in the week):
http://cryptome.org/mpaa-v-2600-bac.htm

Photos from trial, protests, anti-DMCA march:
http://www.mccullagh.org/theme/dvd-2600-trial.html
http://www.mccullagh.org/theme/2600.html
http://www.mccullagh.org/theme/dmca-protest.html
http://www.mccullagh.org/image/950-5/tshirt-cssscramble.html

Other briefs include one by the ACLU, one by the ACM, one by law 
professors, and one by Ernest Miller, Siva Vaidhyanathan et al. that says 
"to be governed by the District Court's version of the DMCA is to be 
stripped of the right to make the valuable fair uses of copyrighted 
materials upon which new contributions to the field are so often based."

Judge Lewis Kaplan's ruling last August:
http://www.wired.com/news/politics/0,1283,38287,00.html

EFF is funding 2600 magazine's defense and appeal. The appeal brief to the 
circuit court, filed last Friday, is here:
http://www.eff.org/IP/Video/MPAA_DVD_cases/20010119_ny_eff_appeal_pressrel.html
http://www.eff.org/IP/Video/MPAA_DVD_cases/20010119_ny_eff_appeal_brief.html

Brief of MPAA member companies is due February 19. Their amici must file a 
week later.

Some of the briefs, including ones I've perused, are still in draft form. 
EFF promises to have all of them online shortly. ACLU says their brief -- 
still in draft form -- will be up on their site by noon.

-Declan





Leo Marks

2001-01-30 Thread R. A. Hettinga


--- begin forwarded text


Reply-To: [EMAIL PROTECTED]
From: "Chris Ogden" [EMAIL PROTECTED]
To: "Robert Hettinga" [EMAIL PROTECTED]
Subject: Leo Marks
Date: Fri, 26 Jan 2001 10:26:29 -

MONDAY JANUARY 22 2001

Obituary

Leo Marks

Codebreaker who saved agents’ lives by improving the security of wartime
ciphers

AS A YOUNG man Leo Marks played a critical, if contentious, role in the
wartime Special Operations Executive. He then moved into film.
Marks was born into a devout Jewish family: his father was the bookseller
later immortalised by Leo’s friend Helen Hanff at 84 Charing Cross Road.
Leo, a bright only child, began his codebreaking experience at the age of
eight, by cracking the price codes in his father’s and his uncle’s shops.
Schooled at St Paul’s, he showed great if erratic promise, and on leaving
school helped his father sell antiquarian books.

Coding was already a hobby, and he bombarded several government departments
with suggestions for new systems. Early in 1942 he was sent to a course at
Bedford of formal instruction on cipher and decipher, with a score of
companions. They all satisfied their examiners and disappeared to Bletchley.
He, wayward as always, appeared to have failed, and found himself directed
(on a month’s trial) to SOE to take charge of its agents’ ciphers. It was
impressed on him from the start that he was in a secret service: his family
thought he was in the Ministry of Supply.

He survived his month’s trial, and settled down to reconstruct a cipher
system that he could see was fundamentally flawed. Agents’ ciphers each
hinged on a separate poem or brief passage of memorable prose (such as a
phrase from the Lord’s Prayer). No one else seemed to have noticed that the
enemy might know the poem, or the prose passage, and so be able to break the
cipher with ease.

As a start, he took to composing agents’ poems himself. He lived with his
parents in a block of flats on the Edgware Road, where the current executive
head of SOE, Sir Charles Hambro, also had a flat. Marks cherished a hopeless
passion for a daughter of Hambro, and when she was killed in an air crash in
Canada wrote a brief dirge. This he later gave to a woman agent he was
briefing, Violette Szabo. It went public when it was included in a
best-selling life of her, and has since become a very popular poem. It
begins: The life that I have Is all that I have And the life that I have Is
yours.

After 18 months’ effort, he managed to convince his seniors that they had
made a catastrophic mistake in using poem codes at all. He reinvented
one-time pad, not knowing that the Foreign Office had been using it all
through the war. This gave agents a much safer cipher base. He also vastly
improved their inefficient systems of security checks.

All this he set out, long after the event, in Between Silk and Cyanide
(1998), a six-hundred-pager on life inside SOE’s headquarters which is
startlingly at variance with the more robust accounts of such writers as
Bickham SweetEscott or John Beevor. It presents a view from below, by a
Jewish civilian junior staff officer who believed himself despised because
he was Jewish, and knew himself to be cleverer than most — or perhaps all —
of those with whom he had to deal.

He certainly saved a great many lives by improving wireless operators’
security. He had grave doubts about operations into Holland, which he feared
had been compromised. All the messages reaching SOE by wireless from Holland
arrived without being mutilated in transit — a stark contrast with the
traffic from everywhere else in north-west Europe. In 1989 he recounted, at
a conference attended by Prince Bernhard, how he had established that his
suspicions were well founded. He arranged for a British operator to send
 “HH” at the end of a routine message; this provoked an instant “HH” in
reply from Holland. This was standard Nazi operators’ drill: HH stood for
Heil Hitler. But it took months to convince the operational staff of the
danger.

He also had incessant troubles with the Free French, who persevered in using
a code he reckoned an intelligent schoolboy could break in an afternoon.
With the help of Yeo-Thomas, GC, he persuaded even them to change.

At the end of the war Marks was moved, for a transient and embarrassed few
months, into the signals branch of the secret intelligence service, but was
then released. He abandoned the book trade to become a film impresario, and
spent more than fifty years in the tumultuous world of the cinema. Many
harrowing experiences of his SOE years continued to haunt him. He condensed
them into the script of a 1960s film, which Michael Powell directed, called
Peeping Tom. The critics all denounced it as criminal porn, and Powell’s
career suffered. It was recently revived, for a more tolerant age, on
television.

At the turn of the century, Marks’s life began to crumble. A childless
marriage of more than forty years with Elena Gaussen Marks, the painter,
suddenly dissolved in acrimony. A 

Re: electronic ballots

2001-01-30 Thread Arnold G. Reinhold

At 1:03 PM -0500 1/25/2001, William Allen Simpson wrote:
-BEGIN PGP SIGNED MESSAGE-

I've been working with Congresswoman Lynn Rivers on language for
electronic ballots.  My intent is to specify the security sensitive
information, and encourage widespread implementation in a competitive
environment.  We'd like feedback.

While it is good that you are taking the time to work with Congress 
on this, I have a number of problems with what you have proposed. 
I've indicated a few specifics below but here are some general 
objections.

First, and most important, it is far from a given that public key 
cryptography can be used to build a better voting system than the 
best paper systems that are presently in use (even assuming as true 
the unproven mathematical foundations of the technology).  There is 
much more room for undetectable shenanigans in an electronic system 
than in a paper system. Political leaders should understand that it 
is not just a question of issuing the right RFP.  In particular,  it 
is premature to start drafting a law.

Second, I find it unsatisfactory to review a proposed cryptosystem 
design presented in legal language. At the very least, a careful 
system design document, preferably with pseudo code, and a detailed 
threat model should be presented. A working model would be better.

You should separate the performance criteria a voting system must 
meet from the technical design.

It is not enough that a voting system be secure, or that it be 
reviewed by experts. It's security must be evident to the average 
voter. Otherwise it is possible to intimidate voters even if the 
system isn't breakable. ("The boss has computer experts working for 
him so you better vote for his candidate if you want to keep your 
job.")

Finally, there are those unproven mathematical foundations. Assuming 
them true may be acceptable for message privacy or financial 
transactions of modest size, but basing our entire political system 
is another matter.



Unlike last year's so-called "electronic signatures act", this one
specifies real digital signatures, with definitions culled from the
usual Menezes et alia Handbook.

I would much rather you specify specific technologies, such as FIPS 
standards (SHA1, SHA2, AES,  (it will be out soon  enough), DSA, and 
P.1363. You can always add "or demonstrated equivalent"  (though I 
wouldn't). The Handbook definitions are far too loose in legal hands. 
System security analysis is very dependent on the exact algorithms 
used, bit lengths, protocol etc., so I wouldn't want every vendor 
making these choices.  That would complicate security review 
enormously. Plus, in my experience even demonstrated weakness are 
pooh-poohed by vendors.


Here's what it looks like so far (draft #1.2).

Summary:

Minimal requirements for conducting electronic elections.  Technology and
vendor neutral.  Promotes interoperability, robustness, uniformity, and
verifiability.  Easily integrated into existing equipment and practices.

Handle duplicate votes and/or denial of service through submission of
bogus votes.  Permit multiple persons to use the same machinery.  Inhibit
persons with access to the machine from fraud.  Provides penalties for
circumvention.

Education  telecommunications; all computing equipment purchased for
schools or libraries with federal money under "eRate" or other
assistance program [cite] shall be capable of use for federal elections.
States receiving such funds shall participate in electronic federal
elections.



Title __ -- Electronic Election Requirements

SEC. xx01. SHORT TITLE.

This title may be cited as the ``Electronic Election Requirements Act''.


SEC. xx02. DEFINITIONS. -- In this title:

(A) BASE64 ENCODING -- A standard method for compact display of
arbitrary numeric data, described in Multipurpose Internet Mail
Extensions (MIME), Internet RFC-2045 et seq.

(B) DIGITAL CERTIFICATE -- A verifiable means to bind the identification
and other attributes of a public key to an entity that controls the
corresponding private key using a digital signature.  In this
application, the certificate shall be self-signed, and signed by the
appropriate authorizing state server.

(C) DIGITAL SIGNATURE -- A verifiable means to bind information to an
entity, in a manner that is computationally infeasible for any
adversary to find any second message and signature combination that
appears to originate from the entity.  Any method used for an
election shall ensure integrity and non-repudiation for at least ten
years.

(D) ELECTION SOFTWARE -- Applications or browser applets that display an
electronic ballot and record the voter choices.

(E) ELECTRONIC ELECTION SYSTEMS -- A collection of electronic
components, including election software, hardware, and platform
operating system, on both local clients and remote servers, used in
the election.

(F) 

Dutch defense minister warns other countries have Echelon-type spy networks

2001-01-30 Thread John Gilmore

[I haven't seen the original documents, so consider this only a rumor
 at this point.  Anyone have more info?  -- John]

Translation of report by Dutch newspaper NRC Handelsblad on 20 January

The Hague, 20 January: Systems used to "bug" telephones, faxes and
e-mail, like the American-British Echelon, are not limited to a few
Western countries. Investigative, security and intelligence services
"in countries of various political complexions" use such
systems. Companies and criminal organizations are also capable of
tapping information channels on a large scale.  So wrote Defense
Minister De Grave in a memorandum issued on Friday [19 January],
entitled "Large-scale bugging of modern telecommunications systems",
which has been approved by the cabinet.  This is the first time the
existence of the Echelon espionage network has been officially
recognized. Rumors to the effect that the United States, Canada, the
United Kingdom and New Zealand have established such a system has
never been formally confirmed by the countries in question.

Investigations by the French and Belgian parliaments, however,
indicate that Echelon does actually exist. The European parliament has
also confirmed, on the basis of scientific reparatory studies, that
there is such a spy network, which allows large-scale reception and
filtering of information conveyed by modern telecommunications systems
for subsequent listening or reading. The network was initially
intended to be used to fight crime and terrorism, but there are fears
that the network also serves the purposes of industrial espionage.

In yesterday's memorandum, De Grave indicated that modern
telecommunications systems are technically vulnerable to bugging
activities. Systems that use the airwaves partially or exclusively are
relatively simple to tap into. The current level of protection is not
always adequate for government purposes, according to Minister De
Grave.  However, encryption of information offers a higher level of
safety.  Separate protective measures are needed to safeguard special
government information (state secrets, for example) from spying by
third parties.  Echelon will be on the agenda of a special session in
the Lower House next Monday [22 January].

Source: NRC Handelsblad, Rotterdam, in Dutch 20 Jan 01 p 2





Re: electronic ballots

2001-01-30 Thread William Allen Simpson

-BEGIN PGP SIGNED MESSAGE-

Thanks everyone for the helpful comments.  I've combined them as well 
as I could.  Some folks sent privately, as indicated.

David Honig wrote:
 
 At 01:03 PM 1/25/01 -0500, William Allen Simpson wrote:
 I've been working with Congresswoman Lynn Rivers on language for
 electronic ballots.  My intent is to specify the security sensitive
 information, and encourage widespread implementation in a competitive
 environment.  We'd like feedback.
 
 You should list the desirable properties of a voting system and
 then the threats to those properties.  

Actually, there's a lot of this already, going back many years.  There 
were many such threats described on this list last year, and there have 
been a couple of conferences.  In the process of passing legislation, 
somebody might make a presentation to a committee, or write a report on 
a specific protocol.  But, that kind of information isn't specified in 
an "authorization" statute.  


"Arnold G. Reinhold" wrote:
 I find it unsatisfactory to review a proposed cryptosystem
 design presented in legal language. At the very least, a careful
 system design document, preferably with pseudo code, and a detailed
 threat model should be presented. A working model would be better.
 
This isn't a proposed cryptosystem design.  It's a compilation of 
minimal requirements for security.  It is expected that there will be 
many designs that meet the requirements.  It's based on known designs, 
and existing analysis. 

Just as in standards development, requirements don't specify the 
result. 

As I tried to indicate, this is to specify the security sensitive 
information, so that when folks come to testify or work on conference 
papers, they are all speaking the same language.  I needed your help to 
ensure that we didn't miss anything important, and we don't go down the 
sad course that electronic signatures suffered last year.


David Honig wrote:
 you're gonna have to educate them in security
 analysis. 

This is exactly the purpose.  The select committee will be designated 
next week.  Most legislators won't bother to be educated until there is 
actual legislation to consider.

Congresscritter Rivers convened a roundtable on Internet Privacy about 
5 years ago, long before most folks in Congress were considering such 
issues.  She went to the trouble to find local talent, such as Honeyman 
and myself.

She has long displayed interest in other security issues.  She's on 
Science and Technology, and has a couple of major universities in her 
district.  Her background is biology and anthropology, so she is 
capable of following scientific rationale.

I actually consider her pretty Internet savvy; however, I'm biased.

On the other hand, she finds PGP too hard to use.  She wants these 
requirements to be simple, low cost, easy to use, and as close to 
existing election practices as possible, so that non-technical people 
can comfortably use the system. 

Those of you that have known me for a long time might remember that I'm 
the fellow that wrote the Michigan appropriations language to provide 
matching funds for NSFnet, the precursor to the commercial Internet.  
I've been involved in electoral politics for going on 25 years.  If you 
know of others with the requisite experience in politics, legislation 
and security, I'd like to meet them.


"(Mr) Lyn R. Kennedy" wrote:
   1. An electronic election system need only be as good as the current
  system. While perfection remains the goal, the minimum criteria
  is that it be no worse.
 
   2. There needs to be an absolute disconnect between the voter and the
  vote. Some kind of voting certificate should allow a vote but make
  it difficult to determine how someone voted.
 
I agree.  Very important points.

   3. The concept of the polling place needs to be re-examined. ...

Someday, remote absentee voting might be practical.  Right now, the 
goal is to gain experience in existing polling places, and remove the 
restriction that military bases and foreign offices cannot be used as 
polling places.  There was a pilot on that last year.

 It seems that something like a smartcard would be the best scheme. 

Not likely.  Voting is very different from banking transactions.  And 
issuing smartcards with special software for voting is likely to be 
prohibitively expensive.


Somebody wrote:
 It strikes me that the greatest cause of confusion in vote counting
 stems from the variation with which voters express their intent.

Yes, that's why most of the language concentrates on uniformity of 
interface and presentation.  The only known way to eliminate that 
variation is to use an entirely digital method.  Every other system 
involving paper (or transcription between analog media) will have an 
error rate.


Somebody wrote:
 Of course the digital signature alone cannot ensure non-repudiation.
 Maybe this should either leave out non-repudiation since it's a
 broader issue or be 

Cryptographers Amici Briefs

2001-01-30 Thread John Young

For appeal of the MPAA v. 2600 decision:

Brief Amici Curiae of Steven  Bellovin, Matt Blaze, Dan  Boneh, 
Dave Del Torto, Ian Goldberg, Bruce Schneier, Frank Andrew 
Stevenson, David Wagner:

   http://www.2600.com/dvd/docs/2001/0126-crypto-amicus.txt

Brief Amicus Curiae of Arnold Reinhold:

  http://cryptome.org/mpaa-v-2600-agr.htm




Re: Dutch defense minister warns other countries have Echelon-type spy networks

2001-01-30 Thread Ulf Möller

 [I haven't seen the original documents, so consider this only a rumor
 at this point.  Anyone have more info?  -- John]

http://parlando.sdu.nl/cgi/showdoc/doc/anonymous:62665/4/0/KST50892.pdf/0/KST50892.pdf

(I don't know if that is a permanent URL. If not, search for document number
27591, nr. 1 at http://www.parlement.nl/doc/parlando/hfdframe/par001.htm .)

It's in Dutch, obviously.




Re: Dutch defense minister warns other countries have Echelon-type spy networks

2001-01-30 Thread Enzo Michelangeli

- Original Message -
From: "John Gilmore" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Sunday, January 28, 2001 7:52 AM
Subject: Dutch defense minister warns other countries have Echelon-type spy
networks


 [I haven't seen the original documents, so consider this only a rumor
  at this point.  Anyone have more info?  -- John]

This German site has two articles (in English) on this matter:

http://www.heise.de/tp/english/inhalt/te/4729/1.html
http://www.heise.de/tp/english/inhalt/te/4747/1.html

Enzo






Re: Leo Marks

2001-01-30 Thread Steven M. Bellovin

The obituary has, at long last, prompted me to write a brief review of 
Marks' book "Between Silk and Cyanide".  The capsule summary:  read it, 
and try to understand what he's really teaching about cryptography, 
amidst all the amusing anecdotes and over-the-top writing.

The main lesson is about threat models.  If asked, I dare say that most 
readers of this mailing list would say "of course keying material 
should be memorized if possible, and never written down".  That seems 
obvious, especially for agents in enemy territory.  After all, written 
keys are very incriminating.  It's obvious, and was obvious to the SOE 
before Marks.  It was also dead-wrong -- accent on the "dead".

The cipher that agents were taught was a complex transposition, keyed 
by a memorized phrase.  The scheme had several fatal flaws.  The first 
is the most obvious:  a guess at the phrase was easily tested, and if a 
part of the key was recovered, it wasn't hard to guess at the rest, if 
the phrase was from well-known source (and it generally was).  

More subtly, doing the encryption was an error-prone process, 
especially if done under field conditions without the aid of graph 
paper.  Per protocol, if London couldn't decrypt the message, the agent 
was told to re-encrypt and re-transmit.  But that meant more air time 
-- a serious matter, since the Gestapo used direction-finding vans to 
track down the transmitters.  Doing some simple "cryptanalysis" -- too 
strong a word -- on garbles permitted London to read virtually all of 
them -- but that was time-consuming, and really pointed to the 
underlying problem, of a too-complex cipher.

The duress code was another weak spot.  If an agent was being compelled 
to send some message, he or she was supposed to add some signal to the 
message.  But if the Gestapo ever arrested someone, they would torture 
*everything* out of that person -- the cipher key, the duress code, 
etc.  And they had a stack of old messages to check against -- they 
made sure that the duress code stated by the agent wasn't present in 
the messages.  The failure was not just the lack of perfect forward 
secrecy; it was the lack of perfect forward non-verifiability of the 
safe/duress indicators.

Marks' solution was counter-intuitive:  give the agent a sheet of 
"worked-out keys", printed on silk.  These were not one-time pad keys; 
rather, they were the numeric indicators for the transposition.  This 
avoided the guessable phrases; more importantly, it eliminated the most 
trouble-prone part of the encipherment, the conversion of the key 
phrase to a numeric version.  The authentication codes were a function 
of part of the key.  Agents were instructed to destroy each "WOK" after 
use; this provided not just forward secrecy, but also stop the 
Gestapo from verifying any statements about the duress code.  

Why silk?  Because it was easily concealed in coat linings and the 
like, and wouldn't be detected in a casual street-frisk.  Sure, if the 
Gestapo was really suspicious, they'd find it.  So what?  This is the 
*Gestapo*; if they were really suspicious, it didn't matter much if you 
weren't guilty, because you'd be in no shape to appreciate their failure 
to find anything.  We joke about rubber hose cryptanalysis; the SOE 
agents had to contend with the real thing.  And real agents had enough 
other incriminating stuff lying around that unused keys didn't matter.

There's more, but the basic lesson is clear:  understand the *real* 
threat model you face before you design any sort of security system.  
The SOE didn't, and that cost the life of many agents.

--Steve Bellovin, http://www.research.att.com/~smb






Re: electronic ballots

2001-01-30 Thread Carl Ellison

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

At 05:28 PM 1/25/01 -0600, (Mr) Lyn R. Kennedy wrote:
First the basics:

  1. An electronic election system need only be as good as the current
 system. While perfection remains the goal, the minimum criteria
 is that it be no worse.

After Florida, I think we can shoot for something a lot better.

  3. The concept of the polling place needs to be re-examined. If a voter
 can vote from anywhere at anytime then the problem becomes one of
 counting the last vote. A vote signed by an authorized observer
 would supercede any following ones that were not observed.

I don't see the problem or the reason for an observer.  Here in Oregon, we do
all votes by mail.  The last vote to count is the last one to arrive at the
county's collection point before 8pm, election day.

OTOH, my next door neighbor was bemoaning the loss of polling places -- as a
place to meet the neighbors.  So maybe the real answer is still to vote by
mail (or electronically) but have a place (actually, an espresso shop with
easy chairs, small tables and a fireplace) where you can go to hang out, hand
in your ballot and visit with the neighbors.

 - Carl

-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2

iQA/AwUBOneKmHPxfjyW5ytxEQKzsQCgim1lGgnLNWRvlxF5c/RoecbYNjcAnjnJ
e+Jjdp5J11zoOFKFsQ4v8hog
=MjCP
-END PGP SIGNATURE-


+--+
|Carl M. Ellison [EMAIL PROTECTED] http://world.std.com/~cme |
|PGP: 08FF BA05 599B 49D2  23C6 6FFD 36BA D342 |
+--Officer, officer, arrest that man. He's whistling a dirty song.-+