Peter,

The standard that you are joking about is in fact one of the reference tests used by 
the regulatory community here.   If, for example, it would take as much time to write 
the code as alter it, and as much experience to write it as alter it, you should not 
have a problem with the "easily converted" standard.    

With respect to the time it took to export the MISPC stuff you should take into 
account the sensitivity of export controls policy for the affected agencies.  The 
folks at NIST are extremely cautious and dot every "I" and cross every "T" and check 
them repeatedly when it comes to export control issues.  The folks that make up the 
export controls team are not unreasonable and in my experience are very interested and 
educable.   We have never failed to achieve our objectives any of times we advanced a 
rationale for a reasonable change in policy or an individual export application.

The situation here is not as bad as it sounds, and it is getting better all the time.  
Each time an area of policy is resolved or an application is made and moves forward, 
the policy and process gets easier for everyone that follows.  I expect the DNSSEC and 
similar packages to be moved rather quickly in the future with minimal need for 
expensive counsel and time delays.  In fact, I am personally very active in an 
education and negotiation process - making sure that export controls do not get in the 
way and getting government buy-in and support for efforts like these which would help 
to secure the infrastructure.   The senior policy makers involved in these decisions 
today are well informed and working very hard to resolve very difficult policy 
problems that cannot be fairly described in sound bite or bumper sticker slogan 
exchanges.  Policy makers and the affected communities will have to continue to work 
together to resolve these issues over time.  In this area of operations and policy, 
patience is not merely a virtue, it is required in large measure.

Respectfully,
...kawika daguio...


The above represent my views which may or may not coincide with the views of my 
employer or our membership


>>> Peter Gutmann <[EMAIL PROTECTED]> 04/01/99 06:42PM >>>
"David R. Conrad" <[EMAIL PROTECTED]> writes:
 
>It appears that the definition of whether authentication code is exportable or
>not now depends on whether BXA (NSA) feels the code can be "easily" converted
>to encryption uses.
 
Just as a data point, this morning I got a copy of NIST's reference PKI 
implementation (MISPC) which contains (signature-only) crypto code.  The PKI 
stuff is in source form, the signature component is supplied as a Windows DLL. 
I don't know what key sizes it'll handle (I have to get to a Windows machine 
first), but going by the MISPC guidelines it should do 1K keys.  The paperwork 
included indicates that it went through the full export approval process, 
taking more than six months from filing to approval (the shippers export 
declaration is a copy of a fax dated 3 September 1998, the shipping date is 12 
March 1999, looks like the BXA could give NZ's Ministry of Foreign Affairs and 
Trade a run for their money :-).  Actually I'm not sure whether it really took 
that long, maybe that was just the date the original form was faxed... in any 
case it looks like NIST is being forced to jump all the export hurdles, even 
for something which would be almost impossible to convert for encryption use 
(you could probably write an implementation from scratch faster than you could 
patch extra code into the binary to make it do encryption).
 
Peter.
 
 



Reply via email to