Frank Hecker wrote:
Nelson B wrote:

Banks told their users "40 bits isn't good enough", and "we won't
let you do online banking with us with a browser that can only do
40 bit crypto".  The users didn't know 40-bit crypto from Limburger,
but they got the message that it their browser could only show one
tooth, it wasn't good enough for banking.


I'm actually not disagreeing with you, but there are some important points here that I want to highlight because IMO they're relevant to the present discussion. I'll warn you and others in advance that some of my arguments may seem philosophical in nature, but I do think that the philosophizing has a valid purpose.


It's definately a good thought experiment;  the days
of 40-bit v. 128-bit are well behind us now, and the
notions and arguments of those times can be considered
history.

Of course, no bank would turn around and say "oh, well,
we'll save some bits and go 40-bits coz Iang said so..."
but it is instructive to try and work out in our own
minds why it is we think this, and whether it's a valid
model for technical and economics security reasons, as
opposed to the political, liability and marketing reasons
that also swirled around in the 'good old days' of the
crypto wars.


First, we have to distinguish between differences in technical mechanisms and the meaning that people attach to those differences. (By "people" I mean typical users, but often others as well -- including us.)

To repeat: From a technical point of view the "one tooth"/"two teeth" UI difference (one for 40-bit, two for 128-bit) was simply a distinction regarding key length that arose from external factors (i.e., US encryption export regulations). No one deliberately sat down and said "We'll design SSL to have a 'good enough for banking' mode and a 'not good enough for banking' mode, and we'll choose 128-bit encryption for the one and 40-bit for the other."

Right. Although, arguably, SSL was designed to be "good enough for credit cards." What I would say however is that when the 40 bit and 128 bit stuff was put in there, it was totally driven by export considerations, and only later did the alignment along "banking strength" come up.

On the other hand, once the technical distinction existed banks then attached a particular meaning to the distinction: that secure on-line banking required 128-bit keys, and could not be done with 40-bit keys. And why should they not do so? Certainly all other things being equal, using 128-bit encryption was at least as secure as using 40-bit and possibly more so. (Or to put it in risk terms, using 128-bit certainly did not increase risk vs. using 40-bit, and might possibly decrease it.) And for US banks there was little or no cost in mandating use of 128-bit encryption, so why not do so? (The only real impact would have been for US banks with non-US customers, a fairly small group.)


Right, Pareto-secure-improvements and all that ;-)


(Note to Ian: Whether 40-bit encryption actually posed a real security risk or not is IMO irrelevant to the banks' decision making. Arguably not allowing use of 40-bit for online banking was irrational in some sense, but I believe that in real-world security decisions irrationality can't be removed from the equation, no more than it can in real-world economic decisions -- e.g., behavioral economics -- and has to be accounted for in any analysis.)


Let me add disagree mildly here:  Banks make security decisions
according to rational processes.  The problem is that those
processes are not based on security, so to the outside observer
they look irrational because they speak of security!

One of those processes
is an excessive sensitivity to criticism on security, which
relates to them as regulated players, and as listed players.
Both these forces push banks in the direction of doing
"everything they can" to secure their processes.  Which
means that given the choice between 40-bit and 128-bit, it
would be very very unlikely that banks would choose 40-bit
knowingly.

Note that "cricitism to security" is not the same thing as
security.

The thing to look for with banks' security decisions
is the bunch of other factors involved.  A simple decision
like 40-bit v. 128-bit was made clearly towards 128-bit
because there were almost no other factors (you indicated
one, being non-US customers;  non-US banks had a much harder
time of it).  A much more complex decision such as the use
of 2 factor authentication results in a much harder choice
for them.  As a matter of history, banks in Europe have
chosen two-factor authentication without difficulty, whereas
only now, under influence from phishing, are US banks moving
to 2 factor devices.  Which is a confusing story in itself,
until you remember that banks are not choosing 2 factor
authentication for security reasons ....


Once the banks attached meaning to 40-bit vs. 128-bit then clearly end users picked up on that meaning (to the extent that they associated any meaning at all to the 40-bit vs. 128-bit distinction). By the time the liberalization of US export regulations ended the need for 40-bit, the equation "(128-bit) SSL means 'secure for banking'" was firmly fixed in people's minds, as it remains today.


(Similarly in the 40-bit vs. 128-bit case the equation 'security of
128-bit' >= 'security of 40-bit' wasn't necessarily universally true
across all browsers and web servers; for example, the security of
128-bit encryption in Netscape Navigator 1.0 was less than the security
of 40-bit encryption in Netscape Navigator 2.0, due to SSL implementation flaws in NN 1.0.)


A good point.

(I've just limited this post to the "thought exercise"
of banks and 40 bits, for now.)


iang -- News and views on what matters in finance+crypto: http://financialcryptography.com/ _______________________________________________ mozilla-crypto mailing list [email protected] http://mail.mozilla.org/listinfo/mozilla-crypto

Reply via email to