Copy Link
Add to Bookmark
Report
SURFPUNK Technical Journal 097
Date: Sun, 10 Oct 93 22:28:34 PDT
Reply-To: <surfpunk@versant.com>
Return-Path: <cocot@versant.com>
Message-ID: <surfpunk-0097@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@versant.com (onpx ba gur nve)
To: surfpunk@versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0097] PRZ: trouble brewing
# In Starfleet, all communications are encrypted
# automatically. Although there is no honor in
# knowledge gained through stolen transmissions, some of
# our enemies have no honor. A true Klingon does not
# "sneak"-he shouts into the face of his enemy. But I have
# seen many types of dishonor, and so I am prepared for it.
#
# --Lieutenant Worf, chief of security, U.S.S.Enterprise
# "20th century computers and how they worked"
# by Jennifer Flynn
# From: Brian D Williams <talon57@well.sf.ca.us>
#
This issue has three articles by Philip R Zimmerman (the author of PGP):
-- testimony to U S House subcommittee [12oct93]
-- DES Key Search Paper
-- Statement from Zimmermann on PGP investigation [19sep93]
The first piece will be given in testimony this Tuesday.
The second article is true. We've seen the details of this design at
the Mountain View Cypherpunks meeting, and DES is dead. The
alternative to PGP is to use PEM, in which your plaintext is encrypted
with a session key using simple DES. If DES is dead, then PEM, as it
is defined today, is also dead.
Most of you already know about the grand jury supoenas to companies
that had something to do with PGP; these were about three weeks ago.
If so you're probably seen the last piece.
Perhaps most of you have not donated to Phil's legal defense.
Here is his request, from the last article below. As cypherpunks
say, Cryptography is Economics, and for PGP users, this case
should be a worthy investment. -- strick
Those wishing to contribute financially or
otherwise should contact either me or Philip L.
Dubois, Esq., at dubois@csn.org or by phone at
303-444-3885 or by mail at 2305 Broadway,
Boulder, CO, 80304.
Donated funds will be kept in a trust account,
and all contributions will be accounted for.
-- Phil Zimmerman
________________________________________________________________________
________________________________________________________________________
Subject: Zimmermann testimony to House subcommittee
To: cypherpunks@toad.com (Cypherpunks)
Date: Sat, 9 Oct 93 11:57:54 MDT
From: Philip Zimmermann <prz@acm.org>
Reply-To: Philip Zimmermann <prz@acm.org>
Testimony of Philip Zimmermann to
Subcommittee for Economic Policy, Trade, and the Environment
US House of Representatives
12 Oct 1993
Mr. Chairman and members of the committee, my name is Philip
Zimmermann, and I am a software engineer who specializes in
cryptography and data security. I'm here to talk to you today about
the need to change US export control policy for cryptographic
software. I want to thank you for the opportunity to be here and
commend you for your attention to this important issue.
I am the author of PGP (Pretty Good Privacy), a public-key encryption
software package for the protection of electronic mail. Since PGP
was published domestically as freeware in June of 1991, it has spread
organically all over the world and has since become the de facto
worldwide standard for encryption of E-mail. The US Customs Service
is investigating how PGP spread outside the US. Because I am a
target of this ongoing criminal investigation, my lawyer has advised
me not to answer any questions related to the investigation.
I. The information age is here.
Computers were developed in secret back in World War II mainly to
break codes. Ordinary people did not have access to computers,
because they were few in number and too expensive. Some people
postulated that there would never be a need for more than half a
dozen computers in the country. Governments formed their attitudes
toward cryptographic technology during this period. And these
attitudes persist today. Why would ordinary people need to have
access to good cryptography?
Another problem with cryptography in those days was that
cryptographic keys had to be distributed over secure channels so that
both parties could send encrypted traffic over insecure channels.
Governments solved that problem by dispatching key couriers with
satchels handcuffed to their wrists. Governments could afford to
send guys like these to their embassies overseas. But the great
masses of ordinary people would never have access to practical
cryptography if keys had to be distributed this way. No matter how
cheap and powerful personal computers might someday become, you just
can't send the keys electronically without the risk of interception.
This widened the feasibility gap between Government and personal
access to cryptography.
Today, we live in a new world that has had two major breakthroughs
that have an impact on this state of affairs. The first is the
coming of the personal computer and the information age. The second
breakthrough is public-key cryptography.
With the first breakthrough comes cheap ubiquitous personal
computers, modems, FAX machines, the Internet, E-mail, digital
cellular phones, personal digital assistants (PDAs), wireless digital
networks, ISDN, cable TV, and the data superhighway. This
information revolution is catalyzing the emergence of a global
economy.
But this renaissance in electronic digital communication brings with
it a disturbing erosion of our privacy. In the past, if the
Government wanted to violate the privacy of ordinary citizens, it had
to expend a certain amount of effort to intercept and steam open and
read paper mail, and listen to and possibly transcribe spoken
telephone conversation. This is analogous to catching fish with a
hook and a line, one fish at a time. Fortunately for freedom and
democracy, this kind of labor-intensive monitoring is not practical
on a large scale.
Today, electronic mail is gradually replacing conventional paper
mail, and is soon to be the norm for everyone, not the novelty is is
today. Unlike paper mail, E-mail messages are just too easy to
intercept and scan for interesting keywords. This can be done
easily, routinely, automatically, and undetectably on a grand scale.
This is analogous to driftnet fishing-- making a quantitative and
qualitative Orwellian difference to the health of democracy.
The second breakthrough came in the late 1970s, with the mathematics
of public key cryptography. This allows people to communicate
securely and conveniently with people they've never met, with no
prior exchange of keys over secure channels. No more special key
couriers with black bags. This, coupled with the trappings of the
information age, means the great masses of people can at last use
cryptography. This new technology also provides digital signatures
to authenticate transactions and messages, and allows for digital
money, with all the implications that has for an electronic digital
economy. (See appendix)
This convergence of technology-- cheap ubiquitous PCs, modems, FAX,
digital phones, information superhighways, et cetera-- is all part of
the information revolution. Encryption is just simple arithmetic to
all this digital hardware. All these devices will be using
encryption. The rest of the world uses it, and they laugh at the US
because we are railing against nature, trying to stop it. Trying to
stop this is like trying to legislate the tides and the weather. It's
like the buggy whip manufacturers trying to stop the cars-- even with
the NSA on their side, it's still impossible. The information
revolution is good for democracy-- good for a free market and trade.
It contributed to the fall of the Soviet empire. They couldn't stop
it either.
Soon, every off-the-shelf multimedia PC will become a secure voice
telephone, through the use of freely available software. What does
this mean for the Government's Clipper chip and key escrow systems?
Like every new technology, this comes at some cost. Cars pollute the
air. Cryptography can help criminals hide their activities. People
in the law enforcement and intelligence communities are going to look
at this only in their own terms. But even with these costs, we still
can't stop this from happening in a free market global economy. Most
people I talk to outside of Government feel that the net result of
providing privacy will be positive.
President Clinton is fond of saying that we should "make change our
friend". These sweeping technological changes have big implications,
but are unstoppable. Are we going to make change our friend? Or are
we going to criminalize cryptography? Are we going to incarcerate
our honest, well-intentioned software engineers?
Law enforcement and intelligence interests in the Government have
attempted many times to suppress the availability of strong domestic
encryption technology. The most recent examples are Senate Bill 266
which mandated back doors in crypto systems, the FBI Digital
Telephony bill, and the Clipper chip key escrow initiative. All of
these have met with strong opposition from industry and civil liberties
groups. It is impossible to obtain real privacy in the information
age without good cryptography.
The Clinton Administration has made it a major policy priority to
help build the National Information Infrastructure (NII). Yet, some
elements of the Government seems intent on deploying and entrenching
a communications infrastructure that would deny the citizenry the
ability to protect its privacy. This is unsettling because in a
democracy, it is possible for bad people to occasionally get
elected-- sometimes very bad people. Normally, a well-functioning
democracy has ways to remove these people from power. But the wrong
technology infrastructure could allow such a future government to
watch every move anyone makes to oppose it. It could very well be
the last government we ever elect.
When making public policy decisions about new technologies for the
Government, I think one should ask oneself which technologies would
best strengthen the hand of a police state. Then, do not allow the
Government to deploy those technologies. This is simply a matter of
good civic hygiene.
II. Export controls are outdated and are a threat to privacy and
economic competitivness.
The current export control regime makes no sense anymore, given
advances in technology.
There has been considerable debate about allowing the export of
implementations of the full 56-bit Data Encryption Standard (DES).
At a recent academic cryptography conference, Michael Wiener of Bell
Northern Research in Ottawa presented a paper on how to crack the DES
with a special machine. He has fully designed and tested a chip that
guesses DES keys at high speed until it finds the right one.
Although he has refrained from building the real chips so far, he can
get these chips manufactured for $10.50 each, and can build 57000 of
them into a special machine for $1 million that can try every DES key
in 7 hours, averaging a solution in 3.5 hours. $1 million can be
hidden in the budget of many companies. For $10 million, it takes 21
minutes to crack, and for $100 million, just two minutes. That's
full 56-bit DES, cracked in just two minutes. I'm sure the NSA can
do it in seconds, with their budget. This means that DES is now
effectively dead for purposes of serious data security applications.
If Congress acts now to enable the export of full DES products, it
will be a day late and a dollar short.
If a Boeing executive who carries his notebook computer to the Paris
airshow wants to use PGP to send email to his home office in Seattle,
are we helping American competitivness by arguing that he has even
potentially committed a federal crime?
Knowledge of cryptography is becoming so widespread, that export
controls are no longer effective at controlling the spread of this
technology. People everywhere can and do write good cryptographic
software, and we import it here but cannot export it, to the detriment
of our indigenous software industry.
I wrote PGP from information in the open literature, putting it into
a convenient package that everyone can use in a desktop or palmtop
computer. Then I gave it away for free, for the good of our
democracy. This could have popped up anywhere, and spread. Other
people could have and would have done it. And are doing it. Again
and again. All over the planet. This technology belongs to
everybody.
III. People want their privacy very badly.
PGP has spread like a prairie fire, fanned by countless people who
fervently want their privacy restored in the information age.
Today, human rights organizations are using PGP to protect their
people overseas. Amnesty International uses it. The human rights
group in the American Association for the Advancement of Science uses
it.
Some Americans don't understand why I should be this concerned about
the power of Government. But talking to people in Eastern Europe, you
don't have to explain it to them. They already get it-- and they
don't understand why we don't.
I want to read you a quote from some E-mail I got last week from
someone in Latvia, on the day that Boris Yeltsin was going to war
with his Parliament:
"Phil I wish you to know: let it never be, but if dictatorship
takes over Russia your PGP is widespread from Baltic to Far East
now and will help democratic people if necessary. Thanks."
Appendix -- How Public-Key Cryptography Works
---------------------------------------------
In conventional cryptosystems, such as the US Federal Data Encryption
Standard (DES), a single key is used for both encryption and
decryption. This means that a key must be initially transmitted via
secure channels so that both parties have it before encrypted
messages can be sent over insecure channels. This may be
inconvenient. If you have a secure channel for exchanging keys, then
why do you need cryptography in the first place?
In public key cryptosystems, everyone has two related complementary
keys, a publicly revealed key and a secret key. Each key unlocks the
code that the other key makes. Knowing the public key does not help
you deduce the corresponding secret key. The public key can be
published and widely disseminated across a communications network.
This protocol provides privacy without the need for the same kind of
secure channels that a conventional cryptosystem requires.
Anyone can use a recipient's public key to encrypt a message to that
person, and that recipient uses her own corresponding secret key to
decrypt that message. No one but the recipient can decrypt it,
because no one else has access to that secret key. Not even the
person who encrypted the message can decrypt it.
Message authentication is also provided. The sender's own secret key
can be used to encrypt a message, thereby "signing" it. This creates
a digital signature of a message, which the recipient (or anyone
else) can check by using the sender's public key to decrypt it. This
proves that the sender was the true originator of the message, and
that the message has not been subsequently altered by anyone else,
because the sender alone possesses the secret key that made that
signature. Forgery of a signed message is infeasible, and the sender
cannot later disavow his signature.
These two processes can be combined to provide both privacy and
authentication by first signing a message with your own secret key,
then encrypting the signed message with the recipient's public key.
The recipient reverses these steps by first decrypting the message
with her own secret key, then checking the enclosed signature with
your public key. These steps are done automatically by the
recipient's software.
--
Philip Zimmermann
3021 11th Street
Boulder, Colorado 80304
303 541-0140
E-mail: prz@acm.org
________________________________________________________________________
Source: privacy mailing list (?)
From: Philip Zimmermann <prz@columbine.cgd.ucar.EDU>
Subject: DES Key Search Paper
Michael Weiner presented a paper at Crypto93 that describes a fast
DES key search engine that uses a special inside-out DES chip that
he designed. This chip takes a single plaintext/ciphertext pair
and quickly tries DES keys until it finds one that produces the
given ciphertext from the given plaintext. Weiner can get these
chips made for $10.50 each in quantity, and can build a special
machine with 57000 of these chips for $1 million. This machine can
exhaust the DES key space in 7 hours, finding a key in 3.5 hours on
the average. He works for Bell Northern Research in Ottawa, and
says they have not actually built this machine, but he has the chip
fully designed and ready for fabrication.
This is a stunning breakthrough in the realization of practical DES
cracking. BTW-- note that PEM uses straight 56-bit DES.
________________________________________________________________________
Subject: Statement from Zimmermann on PGP investigation
To: cypherpunks@toad.com (Cypherpunks)
Date: Sun, 19 Sep 93 12:32:28 MDT
From: Philip Zimmermann <prz@columbine.cgd.ucar.EDU>
Cc: dubois@csn.org (Philip L. Dubois)
Some of you may have received my Internet message of a couple of days
ago about the ongoing U.S. Customs investigation of the exportation
of PGP, which has now progressed to the level of Federal Grand Jury
subpoenas. This earlier message was intended by me for distribution
to a very small group of friends who previously communicated their
concern about me and the investigation and asked to be kept
informed. I did not send the message to anyone outside this group.
Unfortunately, I did not adequately assert my desire that the message
not be further disseminated. It appears that the message has gone
completely public. This was not my intention.
My lawyer, Phil Dubois, has been in touch with the Assistant U.S.
Attorney (William Keane) assigned to the investigation. We have no
reason to believe that Mr. Keane is anything other than a professional
and reasonable person. He made it clear that no decision has been
made regarding any prosecution of anyone for any offense in this
matter. Such decisions will not be made for some time, perhaps
several months. Mr. Keane also made clear his willingness to listen
to us (me and my lawyer) before making any decision. It appears that
both Mr. Keane's mind and the lines of communication are open.
My fear is that public dissemination of my message will close the
lines of communication and put Mr. Keane into an irretrievably
adversarial position. Such a result would not serve any of our
interests. My lawyer tells me that nothing irritates a prosecutor
more than being the subject of what he perceives to be an
orchestrated publicity campaign. He also tells me that his
nightmares involve FOAs (Friends Of the Accused), invariably people
with good intentions, doing things on their own. I understand that
the issues involved in this investigation are of the greatest
importance and transcend my personal interests. Even so, I would
rather not turn an investigation into a full-scale federal
prosecution. I ask that everyone keep in mind that the government's
resources are limitless and that mine are not.
Speaking of resources, many of you have offered help, and I am
grateful. Those wishing to contribute financially or otherwise
should contact either me or Philip L. Dubois, Esq., at dubois@csn.org
or by phone at 303-444-3885 or by mail at 2305 Broadway, Boulder, CO,
80304. Mr. Dubois has just got on the Internet and is still learning
how to use it. Donated funds will be kept in a trust account, and all
contributions will be accounted for. If this whole thing somehow goes
away with money left in the account, the balance will be refunded to
contributors in proportion to the amounts of their contributions.
This message can be widely circulated on public forums.
Philip Zimmermann
prz@acm.org
303 541-0140
________________________________________________________________________
________________________________________________________________________
The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix. Quantum Californians appear in one of two states,
spin surf or spin punk. Undetected, we are both, or might be neither.
________________________________________________________________________
Send postings to <surfpunk@versant.com>,
subscription requests to <surfpunk-request@versant.com>.
WWW Archive at ``http://www.acns.nwu.edu/surfpunk/''.
________________________________________________________________________
________________________________________________________________________
Interesting bit of Lego exploring produced this
cultural artifact.
Got the Lego 1993 4 kit Value Set (#1967). Smallest
model was a surfer dude with stubble and life
preserver.
Took 1993 Ice Planet 2000 Lego set figure (from #6879,
Blizzard Baron), removed neon orange visor helmet, and
switched it with the surfer's hair.
Helmet looks vaugely VRish, therefore producing the
Lego Surfpunk.
-- Benjamin L. Combee
(wut zeecret plan!)
<combee@prism.gatech.edu>