Re: crypto question

2002-03-23 Thread Jim Choate


As someone who spent 5 years doing all the physical security for a major
university I can say that ALL physical systems can be broken. No
exception. The three laws of thermodynamics apply to security systems as
well. 

There is ALWAYS a hole.

On Thu, 21 Mar 2002, Arnold G. Reinhold wrote:

 It's not clear to me what having the human present accomplishes. 
 While the power was out, the node computer could have been tampered 
 with, e.g. a key logger attached.

 Who said you were allowed to lose power and stay secure? Laptops are 
 pretty cheap and come with multi-hour batteries.  There should be 
 enough physical security around the node to prevent someone from 
 tripping power.
 
 One approach might be to surround a remote node with enough sensors 
 so that it can detect an unauthorized attempt to physically approach 
 it.


 --


 There is less in this than meets the eye.

 Tellulah Bankhead
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



faraday cages coming to home depot RSN

2002-03-23 Thread t byfield

http://www.nytimes.com/2002/03/21/technology/circuits/21NEXT.html

 ...a new concrete that can conduct electricity may make it 
 possible to construct buildings in which the basic structure 
 does double duty as an electromagnetic shield.

cheers,
t

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Comments to the Senate Judiciary Committee

2002-03-23 Thread Jon O.


Submit your comments regarding the SSSCA here:
http://judiciary.senate.gov/special/input_form.cfm?comments=1

See below:



From: Peter D. Junger [EMAIL PROTECTED]
Subject: [DMCA_Discuss] Comments to the Senate Judiciary Committee
To: [EMAIL PROTECTED],
   DVD Discussion List [EMAIL PROTECTED]
cc: [EMAIL PROTECTED]
Date: Fri, 22 Mar 2002 01:36:45 -0500



As I mentioned a couple of days ago, I sent a comment about mandating
DRM technologies for general purpose computers.

I just received the following message in response.

: We are no longer accepting comments via e-mail, as we have created a new,
: web-based submission form.  I encourage you to please re-submit your 
: comments at http://judiciary.senate.gov/special/input_form.cfm?comments=1 .  

I have resent the comment using that web address and now fear
that the formatting will be all messed up.

The good news, however, is that when I resubmitted my message to
the web site I was shown all the comments that have been received
by the Committee so far---there are quite a few of them---AND
NOT A SINGLE COMMENT SUPPORTS MANDATORY DRM TECHNOLOGIES.

It may be worthwhile to encourage others to send their comments
to the Committee.  Overwhelming opposition by the public---that
is publically available---may be hard for politicians to ignore.

The comments are available at 
http://judiciary.senate.gov/special/input_form.cfm.

For those of you who have connections with the press, you might
inform them of this reaction by the public.  I should think
that it would make an interesting feature story: Public 
Repudiates the Mouse.

--
Peter D. Junger--Case Western Reserve University Law School--Cleveland, OH
 EMAIL: [EMAIL PROTECTED]URL:  http://samsara.law.cwru.edu   
 NOTE: [EMAIL PROTECTED] no longer exists

___



http://www.anti-dmca.org


DMCA_Discuss mailing list
[EMAIL PROTECTED]
http://lists.microshaft.org/mailman/listinfo/dmca_discuss

--

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: Secure peripheral cards

2002-03-23 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
Date: Fri, 22 Mar 2002 09:00:58 +
From: Nicko van Someren [EMAIL PROTECTED]
User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-US; rv:0.9.4)
Gecko/20011126 Netscape6/6.2.1
To: R. A. Hettinga [EMAIL PROTECTED]
CC: Digital Bearer Settlement List [EMAIL PROTECTED],
[EMAIL PROTECTED]
Subject: Re: Secure peripheral cards

R. A. Hettinga wrote:
...

 I'm not sure NCipher gear is the #1 for acceleration, I think they're
 probably more focussed and used for secure key management.  For
 example they quote [1] an nForce can do up to 400 new SSL connections
 per second.  So that's CRT RSA, not sure if 1024 bit or 512 bit (it
 does say up to).  openSSL on a PIII-633Mhz can do 265 512 bit CRT
 RSA per second, or 50 1024 bit CRT RSA per second.  So wether it will
 even speed up current entry-level systems depends on the correct
 interpretation of the product sheet.

...
  [1] http://www.ncipher.com/products/rscs/datasheets/nFast.pdf

While you are right that we focus these days on the key management
side I would like to say that now, as ever, the speeds we quote are
for 1024 bit RSA decryptions, not 512 bit.  Incedentally the data
sheet that you reference clearly states that the nFast800 handles
Up to 800 RSA SSL handshakes per second (1024-bit RSA decryptions).

Nicko

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



AW: CeBIT: Federal German Ministry of Economics Forces E-mail Encryption

2002-03-23 Thread Carsten Kuckuk


Just for your information: the German government manufactured
50,000 of those GnuPP CDs right from the start. Quite a number,
I think.


You can order a copy including a manual for free at their PR agency:

dmb agentur
Spitzweggasse 6
D-14482 Potsdam-Babelsberg
Germany
E-Mail: [EMAIL PROTECTED]

Carsten Kuckuk

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



fast SSL accelerators (Re: Secure peripheral cards)

2002-03-23 Thread Adam Back

On Fri, Mar 22, 2002 at 03:39:01PM +1100, Greg Rose wrote:
 But don't forget that your pentium can't do anything *else* while it's 
 doing those RSAs... whereas the machine with the nForce can be actually 
 servicing the requests.

While that is true, the issue is the economics; depending on the
figures it may be cheaper and much simpler to buy a faster pentium or
better yet an even faster and better value for money Athlon.  Even buy
a dual processor machine.

Cryptoapps seem to make a 2000 key per second clearly stated as 1024
bit (CRT) RSA for $1400 [1].  That might be harder to compete with
with Athlons as one of those PCI cards is around 13x faster than the
fastest i86 compatible processor you can buy right now.

Of course this is now straying off the original discussion of secure
hardware to and focussing on the fastest most economical way to do
lots of SSL connections per second rather than the most secure way to
store keys in hardware, so I changed the subject line.

Adam

[1] http://www.cryptoapps.com/

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Phil Karn: It's war, folks --- SSSCA formally introduced

2002-03-23 Thread R. A. Hettinga


--- begin forwarded text


Status:  U
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: It's war, folks --- SSSCA formally introduced
Reply-to: [EMAIL PROTECTED]
Date: Thu, 21 Mar 2002 17:33:36 -0800
Sender: [EMAIL PROTECTED]

The story just hit Slashdot -- Senators Hollings, Stevens, Inouye,
Breaux, Nelson, and Feinstein have introduced the so-called Consumer
Broadband and Digital Television Act of 2002, formerly known to most
of us as the SSSCA. The text of Hollings' comments are available here:

http://www.politechbot.com/docs/cbdtpa/hollings.cbdtpa.release.032102.html

The Slashdot article (with links to other coverage) is here:

http://slashdot.org/article.pl?sid=02/03/21/2344228mode=threadtid=103

I cannot overstress the awful implications of this bill if it becomes
law. The personal computer, as we know it, will be destroyed. The
Internet, as we know it, will be destroyed.

Hollings doesn't say that, of course. But all through his statement he
claims that there exist technological solutions to the piracy
problem. These apparently consist entirely of do not copy bits added
to copyrighted materials.

The fact that any do-not-copy-bit can be trivially cleared on any
personal computer that can be programmed by its user does not seem to
have registered yet with the authors of this bill. And when it does,
the logical next step will then become obvious to them: the licensing
of programmers and/or the prohibition of open source software as too
easily modified by end users. And when *that* fails, a total ban on
any personal computer that can be programmed by its user.

It's time for the IETF, its members and the IAB to react, and react
quickly and forcefully.  We need to say clearly that there is simply
no such thing as an Internet copy prevention technology that can
actually work in a world with programmable personal computers.

We need to steer policy makers in a different direction, toward
watermarking technologies that do not block copies from being made but
allows them to be traced after the fact.  Yes, effective watermarking
is technically difficult, and several have already been broken. But at
least it's *possible* to build an effective watermarking scheme
without utterly destroying both the personal computer and the Internet.

Phil

--- end forwarded text


-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: crypto question

2002-03-23 Thread Arnold G. Reinhold

There are groups with lots of money and dedicated, trained agents who 
are willing to die that would dearly like to steal a nuclear weapon. 
So far, they have not succeeded (if they do, I fear we will know 
about it quickly).  So someone has been able to do physical security 
right.

The problem is doing it in a way that is affordable and doesn't 
require an army. Designing computers that can detect an attack seems 
worth exploring. FIPS-140 envisions such an approach when it talks 
about wrapping security modules in a mesh of insulated wire whose 
penetration tells the module to zeroize.

I'm not sure what changes in your argument if you delete the word 
physical.  Perhaps we should all just give up with this security 
nonsense.


Arnold reinhold



At 11:28 PM -0600 3/21/02, Jim Choate wrote:
As someone who spent 5 years doing all the physical security for a major
university I can say that ALL physical systems can be broken. No
exception. The three laws of thermodynamics apply to security systems as
well.

There is ALWAYS a hole.

On Thu, 21 Mar 2002, Arnold G. Reinhold wrote:

 It's not clear to me what having the human present accomplishes.
 While the power was out, the node computer could have been tampered
 with, e.g. a key logger attached.

 Who said you were allowed to lose power and stay secure? Laptops are
 pretty cheap and come with multi-hour batteries.  There should be
 enough physical security around the node to prevent someone from
 tripping power.

 One approach might be to surround a remote node with enough sensors
 so that it can detect an unauthorized attempt to physically approach
 it.


 --


 There is less in this than meets the eye.

 Tellulah Bankhead
 [EMAIL PROTECTED] www.ssz.com
 [EMAIL PROTECTED]  www.open-forge.org



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: crypto question

2002-03-23 Thread Mike Brodhead


 The problem is doing it in a way that is affordable and doesn't 
 require an army. 

[snip]

 I'm not sure what changes in your argument if you delete the word
 physical.  Perhaps we should all just give up with this security
 nonsense.

:)

Agreed.  It's not about perfect security, it's about Good Enough
security.  Risk is not something we can eliminate, but it is something
we can manage.

It does not surprise me when non-security people forget that point,
but I am really surprised at how often security people seem to forget
it.

--mkb



-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: crypto question

2002-03-23 Thread D. A. Honig

At 01:04 PM 3/21/02 -0500, Nelson Minar wrote:
Question.  Is it possible to have code that contains a private encryption
key safely?

As a practical matter, yes and no. Practically no, because any way you
hide the encryption key could be reverse engineered. Practically yes,
because if you work at it you can make the key hard enough to reverse
engineer that it is sufficient for your threat model.

This problem is the same problem as copy protection, digital rights
management, or protecting mobile agents from the computers they run
on. They all boil down to the same challenge; you want to put some
data on a computer you don't control but then restrict what can be
done with that data.

The fundamental issue is: who benefits from keeping the secret secret?
If the holder of the bankcard (or whatever) is liable for abuse
due to cracking, you are in a much better position than if the 
bank loses when a cracker cracks the card in his possession.

This of course does not help when an adversary *steals* access to the
secret in the bankcard.  It only helps when the holder of the secret
has an interest in keeping the secret.

One gathers from this discussion that the content-creator is worried
about content-users cracking their system; that is in general hopeless,
modulo the cost factors.  (And remembering what Schneier wrote about
all it takes is one cracker + the internet, if a crack tool is readily
copied.)

dh





-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Re: [Announce] Announcing a GnuPG plugin for Mozilla (Enigmail)

2002-03-23 Thread Anonymous User

  From: R. Saravanan [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
  Date: Wed, 20 Mar 2002 12:50:51 -0700
 
 Enigmail, a GnuPG plugin for Mozilla which has been under development
 for some time, has now reached a state of practical usability with the
 Mozilla 0.9.9 release. It allows you to send or receive encrypted mail
 using the Mozilla mailer and GPG. Enigmail is open source and dually
 licensed under GPL/MPL. You can download and install the software from
 the website http://enigmail.mozdev.org
 
 Enigmail is cross-platform like Mozilla, although binaries are supplied
 only for the Win32 and Linux-x86 platforms on the website.At the moment
 there is no version of Enigmail available for Netscape 6.2 or earlier,
 which are based on much older versions of Mozilla.There will be a
 version available for the next Netscape release, which is expected to be
 based on Mozilla 1.0.
 
 You may post enigmail-specific comments to the Enigmail
 newsgroup/mailing list at mozdev.org
 
 
 ___
 Gnupg-announce mailing list
 [EMAIL PROTECTED]
 http://lists.gnupg.org/mailman/listinfo/gnupg-announce

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]



Foghorn Fritz, the CBDTPA, and the revenge of the Wave-oids (Re:Secure peripheral cards)

2002-03-23 Thread R. A. Hettinga

At 9:45 AM -0500 on 3/22/02, Roop Mukherjee wrote:


 Wave.com touts this security system called Embassy.

By the way Wave has been around since the flood, and their primary MO has
always been exactly what Fritz Hollings, who Rush Limbaugh likes to imitate
with a Warner Brothers 'Foghorn Leghorn' voice, is trying to pass a law to
do.

That is, end-to-end (end-to-monitor, actually) is-a-person book-entry
settlement of content transactions originally over dial-up lines and cable
boxes, and now over the internet itself.

Huber wrote a glowing article about them in Forbes as early as 1992-3, IIRC.

Wave was started by a former chairman of some large chip-firm (National
Semi?), essentially wanted to create a law-mandated chip monopoly.

He actually wanted to come speak at FC97, if we comped his fee, and then
didn't send any of his scientific people when we told him it was a
peer-reviewed conference with proceedings published in Springer-Verlag LNCS.

During the internet stock bubble, his investors, self-described
Wave-oids, would haunt the investor web-chats and shout down anyone who
talked about actual revenue as a short focused on the Next Big Thing in
Entertainment Technology. Long before the bubble popped, Wave was delisted,
then re-listed, but I don't know where it is now...

If there was any chance that Foghorn Fritz Hollings' little bit of probably
unconstitutional legislative lunacy is going to win, of course, the Wave
boys, and their respective oids, are going to make out like bandits -- if
some other digital rights management system doesn't buy its place to
the front of the line first.

It would be real interesting to see whether anyone at Wave actually
contributed to Hollings' campaigns, or whether this is dumb luck.  In honor
of Pournelle's dictum about not crediting to conspiracy that which can
easily be attributed to stupidity, I'd probably choose the later, but you
never know...

Cheers,
RAH

-- 
-
R. A. Hettinga mailto: [EMAIL PROTECTED]
The Internet Bearer Underwriting Corporation http://www.ibuc.com/
44 Farquhar Street, Boston, MA 02131 USA
... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience. -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

-
The Cryptography Mailing List
Unsubscribe by sending unsubscribe cryptography to [EMAIL PROTECTED]