On Aug 30, 2013, at 8:43 PM, grarpamp <[email protected]> wrote:

> Are we sure? This seems to tell us they are doing traffic analysis and so 
> forth.
> It doesn't seem to say much about cryptanalytic capabilities. For all we know
> they could have all the crypto in the bag but need analysis to identify
> talkers due to people being exceedingly careful about the message content.

I consider delivering a zero-day to be a form of cryptanalysis. I believe that 
they do, too. I've been harping on that for some time.

> 
> "Blue hen rides over the book on the left side when the sun is low.
> Do you copy?"
> 
> Now if someone leaked all the secret crypto capabilities docs out
> in public, or someone else got in trouble solely from what they
> properly encrypted, then we'd know whether or not the crypto works.

I recognize that I have a tendency to be glib in one sentence and then rigorous 
in another and that's a character flaw. It's glib to say both "the crypto 
works" and "zero days are cryptanalysis" in many respects.

When I say, "the crypto works" I mean the basic structures. We know how to 
build block ciphers. We figured out hash functions a few years ago. We 
understand integer-based public-key cryptography well enough that it gives us 
the creeps. We kinda sorta understand ECC, but not as well as we think we do. I 
think our understanding of ECC is like our understanding of hash functions in 
2003. Meow.

The protocols mostly work, except when they don't. The software is crap. It's 
been nearly fifteen years since Drew Gross enlightened me by saying, "I love 
crypto; it tells me what part of the system not to bother attacking."

Look at it anthropicly. We know the crypto works because the adversary says 
they're looking at metadata. To phrase that differently, they're looking at 
metadata because the crypto works! Look at things like Fishbowl, even. It's 
easy to get dazzled by the fact that Fishbowl is double encryption to miss that 
it's really double *implementations*.

The crypto works. The software is crap.

Think like the adversary. Put yourself in their shoes. What's cheaper, buying a 
'sploit or cracking a cipher? Once you start buying 'sploits, why not build 
your own team to do them yourself, and cut out the middleman? Every other part 
of the tech world has seen disintermediation, what makes you think this is 
different.

On the other end of things, there's traffic analysis. We have seen -- stuff -- 
from them over the last decade. Papers on social graph analysis, pattern 
analysis. Emphasis on malware, validation, and so on. 

Here's another analogy. Imagine that you're looking at a huge, fantastically 
complex marching band. You're trying to figure out who all is doing what to 
what parts of the music and it's horribly complex. And then accidentally one 
day, you lose the audio feed and then realize that it's *easier* to tell what 
the band is doing when the sound is off.

Aphasiacs are (so I am told) good at telling truth from lies because they look 
at the face rather than listen to the voice. They analyze the metadata, because 
they can't hear the data and it works *better*.

Traffic analysis is what you do if your feed from the marching band loses its 
audio. It's what you do if you're aphasiac -- which is *exactly* what happens 
when the crypto works, by the way.

Thus with a large budget, you do both. With one hand, you crack the crypto by 
cracking the software. When it works it works. When it doesn't, it doesn't. 
Stop stressing. With the other hand, you revel in the glory of silence. In 
silence you can think. You watch the band, you watch square dance. You just 
watch who is pairing with whom, where the lines cross and the beats are. 
Sometimes you can even guess the tune by watching the dance (which is also 
cryptanalysis).

And all of that is why the problem in email isn't the crypto, it's SMTP.

        Jon


Reply via email to