Re: CeBIT: Federal German Ministry of Economics Forces E-mail Encryption

2002-03-21 Thread Stefan Kelm

 http://www.cebit.de/top-21508.html?druckeboot=1news_article_id=350archiv=1
 CeBIT: Federal German Ministry of Economics Forces E-mail Encryption
 
 At the CeBIT the Federal German Ministry of Economics distributes for free
 the mail encryption program GnuPP 1.1 complete with manual. The mail
 roboter Adele shall provide a lead-in to the issue by practising the krypto
 mail communication together with the user.

Just for your information: the German government manufactured
50,000 of those GnuPP CDs right from the start. Quite a number,
I think.

Cheers,

Stefan.

---
Dipl.-Inform. Stefan Kelm
Security Consultant

Secorvo Security Consulting GmbH
Albert-Nestler-Strasse 9, D-76131 Karlsruhe

Tel. +49 721 6105-461, Fax +49 721 6105-455
E-Mail [EMAIL PROTECTED], http://www.secorvo.de
---
PGP Fingerprint 87AE E858 CCBC C3A2 E633 D139 B0D9 212B

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



[Announce] Announcing a GnuPG plugin for Mozilla (Enigmail)

2002-03-21 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
To: [EMAIL PROTECTED]
From: Werner Koch [EMAIL PROTECTED]
Organisation: g10 Code GmbH
Lines: 21
User-Agent: Gnus/5.090006 (Oort Gnus v0.06) Emacs/20.7
 (i386-debian-linux-gnu)
Subject: [Announce] Announcing a GnuPG plugin for Mozilla (Enigmail)
Sender: [EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]?subject=help
List-Post: mailto:[EMAIL PROTECTED]
List-Subscribe: http://lists.gnupg.org/mailman/listinfo/gnupg-devel,
mailto:[EMAIL PROTECTED]?subject=subscribe
List-Id: GnuPG development gnupg-devel.gnupg.org
List-Archive: http://lists.gnupg.org/pipermail/gnupg-devel/
Date: Thu, 21 Mar 2002 11:24:01 +0100


 From: R. Saravanan [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Date: Wed, 20 Mar 2002 12:50:51 -0700

Enigmail, a GnuPG plugin for Mozilla which has been under development
for some time, has now reached a state of practical usability with the
Mozilla 0.9.9 release. It allows you to send or receive encrypted mail
using the Mozilla mailer and GPG. Enigmail is open source and dually
licensed under GPL/MPL. You can download and install the software from
the website http://enigmail.mozdev.org

Enigmail is cross-platform like Mozilla, although binaries are supplied
only for the Win32 and Linux-x86 platforms on the website.At the moment
there is no version of Enigmail available for Netscape 6.2 or earlier,
which are based on much older versions of Mozilla.There will be a
version available for the next Netscape release, which is expected to be
based on Mozilla 1.0.

You may post enigmail-specific comments to the Enigmail
newsgroup/mailing list at mozdev.org


___
Gnupg-announce mailing list
[EMAIL PROTECTED]
http://lists.gnupg.org/mailman/listinfo/gnupg-announce


___
Gnupg-devel mailing list
[EMAIL PROTECTED]
http://lists.gnupg.org/mailman/listinfo/gnupg-devel

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Secure peripheral cards

2002-03-21 Thread R. A. Hettinga

At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:


 I am searching for some citable references about secure peripheral cards.
 Contrary to what I had imagined when I had started searching, I found very
 little. I am looking to see what are the peripherals that have
 cryptographic capabilities and what are thier capabilities?

 The Embassy (www.wave.com) thing seems like a single secure system in
 itself, which can run programs and do everything from secure boot to
 secure IO. So I imagine that all of this stuff will not be put in the
 peripherals. Also in the same vein US patent 6,314,409 talk of a secure
 system but in more abstract terms.

 Intel's audio players and sigmatels auddio _decoders_ (can be a
 comeplte device or a peripheral according to the brochure) seems to calim
 Microsoft's DRM compatibility.

 I would appreciate some better references.

I think you should talk to NCipher about this stuff.

As far as I can tell, Nicko's hardware development people have the best
handle on secure boxes to store keys in, cryptographic accelerator
peripherals, and so on.

They're very smart, very creative, and have a giant-killer attitude, which
is handy in a market dominated by very big companies who mostly do other
things besides crypto for a living.

No financial interest in NCipher, I've always been impressed with Nicko van
Someren, Ian Harvey, and their associates.


http://www.ncipher.com/

Cheers,
RAH



-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



[SIMSOFT] Identity Card Delusions

2002-03-21 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
From: Simson Garfinkel [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: [SIMSOFT] Identity Card Delusions
Sender: [EMAIL PROTECTED]
List-Help: mailto:[EMAIL PROTECTED]?subject=help
List-Post: mailto:[EMAIL PROTECTED]
List-Subscribe: http://www.simson.net/mailman/listinfo/simsoft,
mailto:[EMAIL PROTECTED]?subject=subscribe
List-Id: Stories and Articles by Simson Garfinkel simsoft.nitroba.com
List-Archive: http://www.simson.net/pipermail/simsoft/
Date: Thu, 21 Mar 2002 10:01:55 -0500

http://www.technologyreview.com/articles/garfinkel0402.asphttp://www.technologyreview.com/articles/garfinkel0402.asp

Identity Card Delusions
  Related Links
http://www.technologyreview.com/articles/garfinkel0402.aspIdentity Card
Delusions
 http://www.technologyreview.com/articles/prototype50102.aspFit to Print
 http://www.technologyreview.com/articles/prototype21201.aspDNA ID
 http://www.technologyreview.com/articles/stikeman1201.aspRecognizing the
Enemy
 http://www.technologyreview.com/articles/visualize1101.aspFace Recognition
 http://www.technologyreview.com/articles/amato0901.aspBig Brother Logs On
 http://www.technologyreview.com/articles/prototype40701.aspVoice ID
 http://www.technologyreview.com/articles/prototype81101.aspMagic Fingers
 http://www.aamva.org/American Association of Motor Vehicle Administrators

The Net Effect  By Simson Garfinkel   April 2002

 Illustration by Tavis Coburn

Mandatory national ID cards might cut down on underage drinking, but they
wouldn't have stopped Richard Reid.


http://techreview.adbureau.net/adclick/CID=fffcfffcfffc/acc_random=95718/SITE=TRV.COM/AREA=TEL/PAGEID=95718/AAMSZ=300X250
More than 200 million Americans carry driver’s licenses with them every
day. The small plastic cards denote the holders’ right to operate a motor
vehicle. But that rather understates things. Today, all manner of business
establishments, from banks to airlines to bars, will deny you service if
you do not show them your driver’s license. In other words, driver’s
licenses have become the de facto identity cards of the United States.

Now the American Association of Motor Vehicle Administrators, a kind of
trade organization for the state motor vehicle registries, wants to make
things official. This past January the association asked Congress for $100
million to link all of the state motor vehicle databases into a single
national system, overhaul licensing procedures and phase in a new
generation of high-tech cards. If this proposal goes through, driver’s
licenses issued in two years will almost certainly be high-tech,
biometric-endowed cards for the absolute identification of the cardholder.

And this is just the beginning.

Less than two weeks after the motor vehicle announcement, the U.S.
Department of Transportation announced that it was moving full speed ahead
with plans to create a nationwide “trusted-traveler” card—another
biometrics-based national identification card. But instead of granting
permission to drive, the proposed trusted-traveler card will allow the
holder to breeze through security checkpoints at airports without being
detained by lengthy interviews and intrusive searches.

It has long since been a cliché to say that September 11 changed
everything, but one thing that has certainly changed since that fateful day
is America’s receptivity to the idea of a national identity card. Eight
months ago, such cards would have been unthinkable, the first step toward
an Orwellian surveillance society. But priorities have shifted. Many of
those who once steadfastly opposed the ID card now see it as an unfortunate
but necessary measure to protect “homeland security.”

America is being sold an empty promise. The proposals for new
biometrics-based identity cards will certainly let the states buy shiny new
computer systems and deploy ominous Big Brother-style networks, and the
cards will speed the passage of frequent travelers through the airports,
but they won’t significantly improve the security of Americans. Indeed, had
these systems been in place on September 11, they would not have prevented
al-Qaeda’s deadly hijackings.

The push to turn the driver’s license into a national identity card is
coming not from the federal government but from the states. Motor vehicle
administrators and police alike want to stamp out the scourge of fake
out-of-state driver’s licenses—what many college students call their
“drinking cards.” But replacing today’s patchwork of different-looking
driver’s licenses with a single nationwide standard that’s all but
impossible to forge will also confer many advantages for law enforcement
agencies, because bogus out-of-state driver’s licenses are used by crooks
engaged in identity fraud, people who keep driving despite their suspended
in-state driver’s licenses and other assorted hoodlums.

The states are also eagerly looking at biometrics as a powerful tool for
verifying identity, preventing fraud and enlisting the 

Re: crypto question

2002-03-21 Thread Nelson Minar

Question.  Is it possible to have code that contains a private encryption
key safely?

As a practical matter, yes and no. Practically no, because any way you
hide the encryption key could be reverse engineered. Practically yes,
because if you work at it you can make the key hard enough to reverse
engineer that it is sufficient for your threat model.

This problem is the same problem as copy protection, digital rights
management, or protecting mobile agents from the computers they run
on. They all boil down to the same challenge; you want to put some
data on a computer you don't control but then restrict what can be
done with that data.

The digital rights management folks try to restrict the program that
uses the data; region-locked DVD players, digital music software that
obeys copyright restrictions (SDMI, etc), or the latest idea, having
an encrypted channel all the way to your speakers and monitor which
are secure tamper-proof devices. All of these schemes are defeatable,
but can be made quite difficult.

The mobile agent community has come up with some clever ideas on the
problem, but nothing that's a practical solution yet. The version here
is you want to run a program on a remote untrusted computer and you
want to prevent your computation from being subverted or stolen. It's
very hard, and my intuition was it'd be impossible, but in fact there
are some interesting thoeretical results that show it is possible, at
least in some limited domains.

I haven't followed this research recently, but here are some good
papers from a few years ago:

Towards Mobile Cryptography (1998)
Tomas Sander, Christian F. Tschudin
http://citeseer.nj.nec.com/167218.html
We present techniques how to achieve non--interactive computing
with encrypted programs in certain cases and give a complete
solution for this problem in important instances.

Protecting Mobile Agents Against Malicious Hosts
Tomas Sander, Christian F. Tschudin
http://citeseer.nj.nec.com/329367.html

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Secure peripheral cards

2002-03-21 Thread Adam Back

On Thu, Mar 21, 2002 at 10:02:20AM -0500, R. A. Hettinga wrote:
 At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:
  I am searching for some citable references about secure peripheral cards.
  Contrary to what I had imagined when I had started searching, I found very
  little. I am looking to see what are the peripherals that have
  cryptographic capabilities and what are thier capabilities?
 
  The Embassy (www.wave.com) thing seems like a single secure system in
  itself, which can run programs and do everything from secure boot to
  secure IO. So I imagine that all of this stuff will not be put in the
  peripherals. Also in the same vein US patent 6,314,409 talk of a secure
  system but in more abstract terms.
 
  Intel's audio players and sigmatels auddio _decoders_ (can be a
  comeplte device or a peripheral according to the brochure) seems to calim
  Microsoft's DRM compatibility.
 
  I would appreciate some better references.
 
 I think you should talk to NCipher about this stuff.
 
 As far as I can tell, Nicko's hardware development people have the best
 handle on secure boxes to store keys in, cryptographic accelerator
 peripherals, and so on.

I'm not sure NCipher gear is the #1 for acceleration, I think they're
probably more focussed and used for secure key management.  For
example they quote [1] an nForce can do up to 400 new SSL connections
per second.  So that's CRT RSA, not sure if 1024 bit or 512 bit (it
does say up to).  openSSL on a PIII-633Mhz can do 265 512 bit CRT
RSA per second, or 50 1024 bit CRT RSA per second.  So wether it will
even speed up current entry-level systems depends on the correct
interpretation of the product sheet.  

And the economics of course depends on how expensive they are relative
to general purpose CPUs, plus the added complexity of using embedded
hardware and drivers and getting to play with your web server.
General purpose CPUs are _really_ fast and cheap right now.

But for the application at hand -- secure key-management, perhaps an
NCipher card is ok -- I haven't compared feature sets so can't really
comment.

Adam

[1] http://www.ncipher.com/products/rscs/datasheets/nFast.pdf

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: crypto question

2002-03-21 Thread Arnold G. Reinhold

At 8:52 PM -0800 3/20/02, Mike Brodhead wrote:
  The usual good solution is to make a human type in a secret.

Of course, the downside is that the appropriate human must be present
for the system to come up properly.

It's not clear to me what having the human present accomplishes. 
While the power was out, the node computer could have been tampered 
with, e.g. a key logger attached.


In some situations, the system must be able to boot into a working
state.  That way, even if somebody accidentally trips the power-- I've
had this happen on production boxen --the system outage lasts only as
long as the boot time.  If a particular human (or one of a small
number of secret holders) must be involved, then the outage could be
measured in hours rather than minutes.

Who said you were allowed to lose power and stay secure? Laptops are 
pretty cheap and come with multi-hour batteries.  There should be 
enough physical security around the node to prevent someone from 
tripping power.

One approach might be to surround a remote node with enough sensors 
so that it can detect an unauthorized attempt to physically approach 
it. Web cams are pretty cheap. Several cameras and/or mirrors would 
be required to get 4Pi coverage.  Software could detect frame to 
frame changes that indicated an intrusion. The machine would be kept 
in a secure closet or cabinet. The the machine would be set up in 
what ever location by a trusted person or team and would remain 
conscious from then on. Entry would be authorized via an 
authenticated link. Any unauthorized entry would result in the node 
destroying it's secrets. It would then have to be replaced.


Don't forget that Availability is also an important aspect of
security.  It all depends on your threat model.


The approach I outlined offers very high availability.


Arnold Reinhold

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: crypto question

2002-03-21 Thread Pat Farrell

At 08:52 PM 3/20/2002 -0800, Mike Brodhead wrote:
 The usual good solution is to make a human type in a secret.
Of course, the downside is that the appropriate human must be present
for the system to come up properly.  

Yes, of course, that is why I wrote:
The usual bad solution is to store it in a secret place, or encrypted with 
a key kept elsewhere (source, secret file, LDAP, etc.)

as most operations don't want to wait for a human to type something.
As long as folks understand that they can't really have security,
then it is just an engineering tradeoff.

Several folks also wrote about using a SBO approach:
1) You are trying to distribute an obfuscated binary which
encrypts/decrypts using a secret key, with the goal that the key resist
reverse engineering. The usual application for this is DRM, but you can
also use this to do public-key encryption from any symmetric algorithm
(obfuscate the encryption function!).

To me, Security By Obscurity is known to be too weak to use,
and Security By Obfuscation is isomorphic to SBObscurity.
Consider the obfuscation with a strong cipher. Then all you have to
do is manage the keys.

One guiding principal of strong cryptography is that the algorithm,
and source code is well known. The key is what is unknown.
Other approaches tend to approach snake oil

The problem with the DRM model is not that the crypto won't work,
it will if the keys are managed. But I've not seen anyone willing
to work hard enough to manage the key distribution and local key
management to make it real.

None of this addresses the problem that you want to do trusted operations
on a user's PC that is inherently untrustable. For some applications,
eyewash such as smartcards provide the needed level of appearence
of security. If that fits your case, fine. And Carl Ellison has
a great patent for a software-only smartcard, it was transfered to CyberCash,
and I assume transfered to Verisign. It proves that anything 
you want to do with a smartcard you can do with software in a client/server
model. Pretty cool.

Pat


Pat Farrell [EMAIL PROTECTED]
http://www.pfarrell.com


-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Finding Pay Dirt in Scannable Driver's Licenses

2002-03-21 Thread R. A. Hettinga

http://www.nytimes.com/2002/03/21/technology/circuits/21DRIV.html?todaysheadlines=pagewanted=printposition=top




March 21, 2002

Finding Pay Dirt in Scannable Driver's Licenses

By JENNIFER 8. LEE

OSTON -- ABOUT 10,000 people a week go to The Rack, a bar in Boston favored
by sports stars, including members of the New England Patriots. One by one,
they hand over their driver's licenses to a doorman, who swipes them
through a sleek black machine. If a license is valid and its holder is over
21, a red light blinks and the patron is waved through.

But most of the customers are not aware that it also pulls up the name,
address, birth date and other personal details from a data strip on the
back of the license. Even height, eye color and sometimes Social Security
number are registered.

You swipe the license, and all of a sudden someone's whole life as we know
it pops up in front of you, said Paul Barclay, the bar's owner. It's
almost voyeuristic.

Mr. Barclay bought the machine to keep out underage drinkers who use fake
ID's. But he soon found that he could build a database of personal
information, providing an intimate perspective on his clientele that can be
useful in marketing. It's not just an ID check, he said. It's a tool.

Now, for any given night or hour, he can break down his clientele by sex,
age, ZIP code or other characteristics. If he wanted to, he could find out
how many blond women named Karen over 5 feet 2 inches came in over a
weekend, or how many of his customers have the middle initial M. More
practically, he can build mailing lists based on all that data - and keep
track of who comes back.

Bar codes and other tracking mechanisms have become one of the most
powerful forces in automating and analyzing product inventory and sales
over the last three decades. Now, in a trend that alarms privacy advocates,
the approach is being applied to people through the simple driver's
license, carried by more than 90 percent of American adults.

Already, about 40 states issue driver's licenses with bar codes or magnetic
stripes that carry standardized data, and most of the others plan to issue
them within the next few years.

Scanners that can read the licenses are slowly proliferating across the
country. So far the machines have been most popular with bars and
convenience stores, which use them to thwart underage purchasers of alcohol
and cigarettes.

In response to the terrorist attacks last year, scanners are now also being
installed as security devices in airports, hospitals and government
buildings. Many other businesses - drugstores and other stores, car- rental
agencies and casinos among them - are expressing interest in the technology.

The devices have already proved useful for law enforcement. Police
departments have called bars to see if certain names and Social Security
numbers show up on their customer lists.

The electronic trails created by scanning driver's licenses are raising
concerns among privacy advocates. Standards and scanning, they say, are a
dangerous combination that essentially creates a de facto national identity
card or internal passport that can be registered in many databases.

Function creep is a primary rule of databases and identifiers, said Barry
Steinhardt, associate director of the American Civil Liberties Union,
citing how the Social Security number, originally meant for old-age
benefits, has become a universal identifier for financial and other
transactions. History teaches us that even if protections are incorporated
in the first place, they don't stay in place for long.

But companies that market the scanning technology argue that it poses no
threat to privacy.

It's the same information as the front of the license, said Frank
Mandelbaum, chairman and chief executive of Intelli- Check, a manufacturer
of license-scanning equipment based in Woodbury, N.Y. If I were to go into
a bar and they had a photocopier, they could photocopy the license or they
could write it down. They are not giving us any information that violates
privacy.

Machine-readable driver's licenses have been introduced over the last
decade under standards set by the American Association of Motor Vehicle
Administrators, an umbrella group of state officials.

Under current standards, the magnetic stripe and bar codes essentially
contain the same information that is on the front of the driver's licenses.
In addition to name, address and birth date, the machine-readable data
includes physical attributes like sex, height, weight, hair color, eye
color and whether corrective lenses are required. Some states that put the
driver's Social Security number on the license also store it on the data
strip.

The scanning systems present a challenge to efforts by state and federal
governments to limit the amount of information that can be released by
departments of motor vehicles. In 1994, Congress passed the Driver's
Privacy Protection Act, largely in response to the murder of Rebecca
Schaeffer, an actress who 

Text of Sen. Hollings' revised SSSCA, now called the CBDTPA

2002-03-21 Thread Declan McCullagh

Wired News article on the CBDTPA:
http://www.wired.com/news/politics/0,1283,51245,00.html
   The bill, called the Consumer Broadband and Digital Television
   Promotion Act (CBDTPA), prohibits the sale or distribution of nearly
   any kind of electronic device -- unless that device includes
   copy-protection standards to be set by the federal government.

The text of the Consumer Broadband and Digital Television Promotion
Act (CBDTPA) is available here:
http://www.politechbot.com/docs/cbdtpa/

Here's Sen. Fritz Hollings' (D-SC) statement and press release:
http://www.politechbot.com/docs/cbdtpa/hollings.cbdtpa.release.032102.html

Statements from supporters and opponents:
http://www.politechbot.com/docs/cbdtpa/mpaa.cbdtpa.release.032102.html
http://www.politechbot.com/docs/cbdtpa/riaa.cbdtpa.release.032102.html
http://www.politechbot.com/docs/cbdtpa/bsa.cspp.iti.release.032102.html

Archive on SSSCA (now, of course, called the CBDTPA):
http://www.politechbot.com/cgi-bin/politech.cgi?name=sssca

-Declan

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



RE: crypto question

2002-03-21 Thread McMeikan, Andrew

Many thanks on all the pointers and interest.

Although I was planning on sneaking around making more progress before
letting the cat out the bag, I guess it is time to expose it for some open
criticism.

This is just a plan so far, no code yet.  Although until the ability to
safely split encryption code across nodes, it will have to have a central
(or group of trusted) servers, rather than fully distributed.

You will probably all point out many obvious pit-falls, if you do please
also offer suggestions ;)

I have thought of several ways of getting the job done, but I am sure there
are better.

Apologies to those I emailed a blank file to, I managed to wipe a
significant amount of work, and have replaced it with something really
tacked together.

If I am stepping to hard on any patents, or too close to any other 'business
model' etc... A polite nudge is much better than a law suit.  Thanks.

http://pktp.sourceforge.net has a description of how I imagine it working.

I hope that explains exactly why I was making my enquiry.

Again many thanks for the many pointers.

cya,Andrew...

This e-mail and any attachment is for authorised use by the intended recipient(s) 
only.  It may contain proprietary material, confidential information and/or be subject 
to legal privilege.  It should not be copied, disclosed to, retained or used by, any 
other party.  If you are not an intended recipient then please promptly delete this 
e-mail and any attachment and all copies and inform the sender.  Thank you.

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]