Peter,
The standard that you are joking about is in fact one of the reference tests used by
the regulatory community here. If, for example, it would take as much time to write
the code as alter it, and as much experience to write it as alter it, you should not
have a problem with the "easily converted" standard.
With respect to the time it took to export the MISPC stuff you should take into
account the sensitivity of export controls policy for the affected agencies. The
folks at NIST are extremely cautious and dot every "I" and cross every "T" and check
them repeatedly when it comes to export control issues. The folks that make up the
export controls team are not unreasonable and in my experience are very interested and
educable. We have never failed to achieve our objectives any of times we advanced a
rationale for a reasonable change in policy or an individual export application.
The situation here is not as bad as it sounds, and it is getting better all the time.
Each time an area of policy is resolved or an application is made and moves forward,
the policy and process gets easier for everyone that follows. I expect the DNSSEC and
similar packages to be moved rather quickly in the future with minimal need for
expensive counsel and time delays. In fact, I am personally very active in an
education and negotiation process - making sure that export controls do not get in the
way and getting government buy-in and support for efforts like these which would help
to secure the infrastructure. The senior policy makers involved in these decisions
today are well informed and working very hard to resolve very difficult policy
problems that cannot be fairly described in sound bite or bumper sticker slogan
exchanges. Policy makers and the affected communities will have to continue to work
together to resolve these issues over time. In this area of operations and policy,
patience is not merely a virtue, it is required in large measure.
Respectfully,
...kawika daguio...
The above represent my views which may or may not coincide with the views of my
employer or our membership
>>> Peter Gutmann <[EMAIL PROTECTED]> 04/01/99 06:42PM >>>
"David R. Conrad" <[EMAIL PROTECTED]> writes:
>It appears that the definition of whether authentication code is exportable or
>not now depends on whether BXA (NSA) feels the code can be "easily" converted
>to encryption uses.
Just as a data point, this morning I got a copy of NIST's reference PKI
implementation (MISPC) which contains (signature-only) crypto code. The PKI
stuff is in source form, the signature component is supplied as a Windows DLL.
I don't know what key sizes it'll handle (I have to get to a Windows machine
first), but going by the MISPC guidelines it should do 1K keys. The paperwork
included indicates that it went through the full export approval process,
taking more than six months from filing to approval (the shippers export
declaration is a copy of a fax dated 3 September 1998, the shipping date is 12
March 1999, looks like the BXA could give NZ's Ministry of Foreign Affairs and
Trade a run for their money :-). Actually I'm not sure whether it really took
that long, maybe that was just the date the original form was faxed... in any
case it looks like NIST is being forced to jump all the export hurdles, even
for something which would be almost impossible to convert for encryption use
(you could probably write an implementation from scratch faster than you could
patch extra code into the binary to make it do encryption).
Peter.