"Hashes aren't ITAR covered" is a fact…. from "Revised U.S. Encryption Export
Control Regulations, January 2000" at
http://epic.org/crypto/export_controls/regs_1_00.html
> 3. It was not the intent of the new Wassenaar language for ECCN 5A002 to be
> more restrictive concerning Message Authentication Codes (MAC). "Data
> authentication equipment that calculates a Message Authentication Code (MAC)
> or similar result to ensure no alteration of text has taken place, or to
> authenticate users, but does not allow for encryption of data, text or other
> media other than that needed for the authentication" continues to be excluded
> from control under 5A002. These commodities are controlled under ECCN 5A992.
further, ECCN 5A992 is separated from the "high-functioning encryption" as
follows. From
http://www.governmentcontractslawblog.com/2008/11/articles/export-controls/encryption-export-restrictions-loosened-under-new-rules-that-reduce-prereview-and-reporting-requirements/
> Under the EAR, encryption items, which includes software, technology, and
> hardware incorporating encryption technology, generally fall into two
> categories:
>
> Ø Export Commodity Classification Number ("ECCN") 5A002/5D002, for
> certain enumerated, high-functioning encryption products and software; and
>
> Ø ECCN 5A992/5D992, for all other encryption items.
>
> Generally speaking, 5A992/5D992 products can be shipped without delay
> anywhere in the world (except for Cuba, Iran, North Korea, Sudan, and Syria)
> as No License Required ("NLR").
Clear (as mud)?
On Sep 3, 2013, at 12:21 PM, [email protected] wrote:
> Ok, I dug around my email archives to see what the heck to google, and
> answered my own question regarding ITAR and NIST defined Suite B implementing
> software.
>
> Here it goes....
> From http://www.nsa.gov/ia/programs/suiteb_cryptography/
> ...Says, effectively, that products that 'are configure to USE Suite B or
> technical documentation concerning the configuration of such products' are
> not subject to ITAR. The bis.doc.gov site listing requirements under ITAR for
> US Persons is, inconveniently, down for maintenance.
>
> However, digging around in my document backup archives (insomnia provided the
> time for it...hours) and email un-earth the notification addresses required
> for ALL US based open-source Suite B implementations.
> Yes, this is silly. No, they don't NORMALLY go after anyone for breaking the
> law for a NIST defined hash/digest/crypto algorithm.
>
> But if the USG decides they don't like you (political views, activism, etc),
> that silly regulation can cost you years in prison. The legal term if art is
> 'selective prosecution'.
>
> The relevant email addresses are:
> [email protected] [email protected] and [email protected]
>
> Required format and fields are:
> Subject: TSU NOTIFICATION - Encryption
> Message body:
> SUBMISSION TYPE: TSU
> SUBMITTED BY: <author or corporate contacts full legal name>
> SUBMITTED FOR: <full legal names of all authors and corporate name if
> applicable>
> POINT OF CONTACT: <full legal name of POC for compliance purposes>
> PHONE and/or FAX: <10 digit number for either>
> PRODUCT NAME/MODEL #: <product/program name and model/version>
> ECCN: <5D002 for FIPS-180 hash functions, google cache for others, BIS site
> currently down, lovely>
> <blank line>
> NOTIFICATION: <download URL(s) for source file(s)>
>
> There ya go. "Hashes aren't ITAR covered" is unfortunately 'Net Mythology.
> Silly as hell I admit. If the above helps any other US Persons put a fig leaf
> on themselves, that'd be great.
>
> Cheers,
>
> David Mercer
>
> David Mercer
> Portland, OR
> _______________________________________________
> The cryptography mailing list
> [email protected]
> http://www.metzdowd.com/mailman/listinfo/cryptography
_______________________________________________
The cryptography mailing list
[email protected]
http://www.metzdowd.com/mailman/listinfo/cryptography