Copy Link
Add to Bookmark
Report

Chaos Digest Volume 01 Numero 19

eZine's profile picture
Published in 
Chaos Digest
 · 4 years ago

  

Chaos Digest Lundi 19 Avril 1993 Volume 1 : Numero 19

Editeur: Jean-Bernard Condat (jbcondat@attmail.com)
Archiviste: Yves-Marie Crabbe
Co-Redacteurs: Arnaud Bigare, Stephane Briere

TABLE DES MATIERES, #1.19 (19 Avril 1993)
File 1--Alertes aux fausses factures d'annuaires France Telecom
File 2--Le "Clipper Chip": rapide descriptif
File 3--Slide presente a la Maison Blanche durant le briefing
File 4--Clipper Chip et le FBI (reprints)
File 5--Piratage France Telecom par un technicien France Telecom

Chaos Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost by sending a message to:
linux-activists-request@niksula.hut.fi
with a mail header or first line containing the following informations:
X-Mn-Admin: join CHAOS_DIGEST

The editors may be contacted by voice (+33 1 47874083), fax (+33 1 47877070)
or S-mail at: Jean-Bernard Condat, Chaos Computer Club France [CCCF], B.P.
155, 93404 St-Ouen Cedex, France.

Issues of ChaosD can also be found on some French BBS. Back issues of
ChaosD can be found on the Internet as part of the Computer underground
Digest archives. They're accessible using anonymous FTP from:

* kragar.eff.org [192.88.144.4] in /pub/cud/chaos
* uglymouse.css.itd.umich.edu [141.211.182.91] in /pub/CuD/chaos
* halcyon.com [192.135.191.2] in /pub/mirror/cud/chaos
* ftp.cic.net [192.131.22.2] in /e-serials/alphabetic/c/chaos-digest
* ftp.ee.mu.oz.au [128.250.77.2] in /pub/text/CuD/chaos
* nic.funet.fi [128.214.6.100] in /pub/doc/cud/chaos
* orchid.csv.warwick.ac.uk [137.205.192.5] in /pub/cud/chaos

CHAOS DIGEST is an open forum dedicated to sharing French information among
computerists and to the presentation and debate of diverse views. ChaosD
material may be reprinted for non-profit as long as the source is cited.
Some authors do copyright their material, and they should be contacted for
reprint permission. Readers are encouraged to submit reasoned articles in
French, English or German languages relating to computer culture and
telecommunications. Articles are preferred to short responses. Please
avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
the views of the moderators. Chaos Digest contributors
assume all responsibility for ensuring that articles
submitted do not violate copyright protections.

----------------------------------------------------------------------

Date: Thu Apr 15 11:47:00 +0200 1993
From: dufour_s@galaxie.int-evry.fr (Stephane DUFOUR )
Subject: File 1--Alertes aux fausses factures d'annuaires France Telecom


Depuis plus de deux ans, des vagues de pseudo-factures imitant les
factures de France Telecom, se repandent sur le territoire national. Ces
documents constituent une double tromperie:

* Ils se presentent d'une part comme des factures, alors qu'ils ne
sont censes etre qu'une offre d'abonnement a un service d'annuaire pour la
telecopie, le telex ou le Minitel. Cette presentation visiblement destinee
a abuser les consommateurs est penalement reprehensible et confine a la
tentative d'escroquerie.

* Ils imitent d'autre part d'une facon plus ou moins manifeste les
factures emises par France Telecom, tant en ce qui concerne le nom du
service (France service Minitel, France Telecopie) que la presentation
generale, le logo ou la couleur a dominante bleue. Ceci constitue aussi
une infraction de contrefacon ou imitation illicite.

Des l'apparition de ces fraudes, France Telecom a reagi en portant
plainte chaque fois qu'une nouvelle affaire apparaissait. Il a mis en garde
tous ses abonnes individuellement contre les risques de confusion. Il est
intervenu sur ce sujet a de nombreuses reprises dans les medias et continue
de la faire. Une collaboration etroite a ete etablie avec le parquet de
Paris qui centralise les plaintes et coordonne les differentes enquetes.

France Telecom transmet en particulierles nouveaux "modeles" de factures
des qu'ils lui sont signales. A titre d'exemple, cette cooperation entre
la justice, France Telecom et la Poste a permis en un an d'intercepter sur
commission rogatoire pres de 350 000 plis avant leur distribution et de
bloquer, en liaison avec les banques de nombreux cheques.

L'instruction judiciaire a ete rendue plus difficile par le caractere
international de la fraude qui affecte une bonne partie de l'Europe et
utilise l'Autriche et le Lichtenstein comme plaques tournantes. Toutefois
plusieurs personnes devraient etre traduites devant le tribunal correction-
nel d'ici cet ete.

------------------------------

Date: Wed, 21 Apr 93 19:21:48 EDT
From: denning@cs.cosc.georgetown.edu (Dorothy Denning )
Subject: File 2--Le "Clipper Chip": rapide descriptif
Repost from: RISKS Digest


THE CLIPPER CHIP: A TECHNICAL SUMMARY
Dorothy Denning
Revised, April 21, 1993

INTRODUCTION

On April 16, the President announced a new initiative that will bring
together the Federal Government and industry in a voluntary program
to provide secure communications while meeting the legitimate needs of
law enforcement. At the heart of the plan is a new tamper-proof encryption
chip called the "Clipper Chip" together with a split-key approach to
escrowing keys. Two escrow agencies are used, and the key parts from
both are needed to reconstruct a key.


CHIP CONTENTS

The Clipper Chip contains a classified single-key 64-bit block
encryption algorithm called "Skipjack." The algorithm uses 80 bit keys
(compared with 56 for the DES) and has 32 rounds of scrambling
(compared with 16 for the DES). It supports all 4 DES modes of
operation. The algorithm takes 32 clock ticks, and in Electronic
Codebook (ECB) mode runs at 12 Mbits per second.

Each chip includes the following components:

the Skipjack encryption algorithm
F, an 80-bit family key that is common to all chips
N, a 30-bit serial number (this length is subject to change)
U, an 80-bit secret key that unlocks all messages encrypted with the chip

The chips are programmed by Mykotronx, Inc., which calls them the
"MYK-78." The silicon is supplied by VLSI Technology Inc. They are
implemented in 1 micron technology and will initially sell for about
$30 each in quantities of 10,000 or more. The price should drop as the
technology is shrunk to .8 micron.


ENCRYPTING WITH THE CHIP

To see how the chip is used, imagine that it is embedded in the AT&T
telephone security device (as it will be). Suppose I call someone and
we both have such a device. After pushing a button to start a secure
conversation, my security device will negotiate an 80-bit session key K
with the device at the other end. This key negotiation takes place
without the Clipper Chip. In general, any method of key exchange can
be used such as the Diffie-Hellman public-key distribution method.

Once the session key K is established, the Clipper Chip is used to
encrypt the conversation or message stream M (digitized voice). The
telephone security device feeds K and M into the chip to produce two
values:

E[M; K], the encrypted message stream, and
E[E[K; U] + N; F], a law enforcement field ,

which are transmitted over the telephone line. The law enforcement
field thus contains the session key K encrypted under the unit key U
concatenated with the serial number N, all encrypted under the family
key F. The law enforcement field is decrypted by law enforcement after
an authorized wiretap has been installed.

The ciphertext E[M; K] is decrypted by the receiver's device using the
session key:

D[E[M; K]; K] = M .


CHIP PROGRAMMING AND ESCROW

All Clipper Chips are programmed inside a SCIF (Secure Compartmented
Information Facility), which is essentially a vault. The SCIF contains
a laptop computer and equipment to program the chips. About 300 chips
are programmed during a single session. The SCIF is located at
Mykotronx.

At the beginning of a session, a trusted agent from each of the two key
escrow agencies enters the vault. Agent 1 enters a secret, random
80-bit value S1 into the laptop and agent 2 enters a secret, random
80-bit value S2. These random values serve as seeds to generate unit
keys for a sequence of serial numbers. Thus, the unit keys are a
function of 160 secret, random bits, where each agent knows only 80.

To generate the unit key for a serial number N, the 30-bit value N is
first padded with a fixed 34-bit block to produce a 64-bit block N1.
S1 and S2 are then used as keys to triple-encrypt N1, producing a
64-bit block R1:

R1 = E[D[E[N1; S1]; S2]; S1] .

Similarly, N is padded with two other 34-bit blocks to produce N2 and
N3, and two additional 64-bit blocks R2 and R3 are computed:

R2 = E[D[E[N2; S1]; S2]; S1]
R3 = E[D[E[N3; S1]; S2]; S1] .

R1, R2, and R3 are then concatenated together, giving 192 bits. The
first 80 bits are assigned to U1 and the second 80 bits to U2. The
rest are discarded. The unit key U is the XOR of U1 and U2. U1 and U2
are the key parts that are separately escrowed with the two escrow
agencies.

As a sequence of values for U1, U2, and U are generated, they are
written onto three separate floppy disks. The first disk contains a
file for each serial number that contains the corresponding key part
U1. The second disk is similar but contains the U2 values. The third
disk contains the unit keys U. Agent 1 takes the first disk and agent
2 takes the second disk. Thus each agent walks away knowing
an 80-bit seed and the 80-bit key parts. However, the agent does not
know the other 80 bits used to generate the keys or the other 80-bit
key parts.

The third disk is used to program the chips. After the chips are
programmed, all information is discarded from the vault and the agents
leave. The laptop may be destroyed for additional assurance that no
information is left behind.

The protocol may be changed slightly so that four people are in the
room instead of two. The first two would provide the seeds S1 and S2,
and the second two (the escrow agents) would take the disks back to
the escrow agencies.

The escrow agencies have as yet to be determined, but they will not
be the NSA, CIA, FBI, or any other law enforcement agency. One or
both may be independent from the government.


LAW ENFORCEMENT USE

When law enforcement has been authorized to tap an encrypted line, they
will first take the warrant to the service provider in order to get
access to the communications line. Let us assume that the tap is in
place and that they have determined that the line is encrypted with the
Clipper Chip. The law enforcement field is first decrypted with the
family key F, giving E[K; U] + N. Documentation certifying that a tap
has been authorized for the party associated with serial number N is
then sent (e.g., via secure FAX) to each of the key escrow agents, who
return (e.g., also via secure FAX) U1 and U2. U1 and U2 are XORed
together to produce the unit key U, and E[K; U] is decrypted to get the
session key K. Finally the message stream is decrypted. All this will
be accomplished through a special black box decoder.


CAPSTONE: THE NEXT GENERATION

A successor to the Clipper Chip, called "Capstone" by the government
and "MYK-80" by Mykotronx, has already been developed. It will include
the Skipjack algorithm, the Digital Signature Standard (DSS), the
Secure Hash Algorithm (SHA), a method of key exchange, a fast
exponentiator, and a randomizer. A prototoype will be available for
testing on April 22, and the chips are expected to be ready for
delivery in June or July.


ACKNOWLEDGMENT AND DISTRIBUTION NOTICE

This article is based on information provided by NSA, NIST, FBI, and
Mykotronx. Permission to distribute this document is granted.

------------------------------

Date: Mon, 19 Apr 93 9:21:53 EDT
From: clipper@first.org (Clipper Chip Announcement )
Subject: File 3--Slide presente a la Maison Blanche durant le briefing

Note: The following material was handed out a press briefing on the
Clipper Chip on 4/16.

Chip Operation

Microchip
User's Message +----------------------+
------------------> | | 1. Message encrypted
| Encryption Algorithm | with user's key
| |
| Serial # | 2. User's key encrypted
| |--> with chip unique key
| Chip Unique Key |
User's Encryption | | 3. Serial # encrypted
Key | Chip Family Key | with chip family key
------------------> | |
| |
+----------------------+


For Law Enforcement to Read a Suspect's Message

1. Need to obtain court authorized warrant to tap the suspect's telephone;

2. Record encrypted message;

3. Use chip family key to decrypt chip serial number;

4. Take this serial number *and* court order to custodians of disks A and B;

5. Add the A and B components for that serial number = the chip
unique key for the suspect user;

6. Use this key to decrypt the user's message key for
this recorded message;

7. Finally, use this message key to decrypt the recorded message.

------------------------------

Date: Mon Apr 19 12:58:44 -0400 1993
From: prutkov@garnet.acns.fsu.edu (Paul Rutkovsky )
Subject: File 4--Clipper Chip et le FBI (reprints)
Copyrights: Warren Publishing, Inc. & San Jose Mercury News, 1993


GOVT. WEIGHS IN ON PRIVACY-VS.-ENCRYPTION DEBATE, WITH ITS OWN TECHNOL OGY

Communications Daily April 19, 1993 p. N/A
ISSN: 0277-0679

Clinton Administration Fri. announced sweeping policy directive
designed to protect privacy of voice and data transmissions using
govt.-developed encryption technology that ensures law enforcement agencies
will have ability to eavesdrop. Encyrption is achieved through use of
"Clipper Chip " that will be built into telephones, computers, fax
machines. Although govt. will adopt new chip as its standard, use in
private sector will be on voluntary basis.

AT&T Fri. became first company to announce publicly support of
Clipper Chip . "We believe it will give our customers far greater
protection in defeating hackers or eavesdroppers in attempting to intercept
a call," said AT&T Vp Secure Communications Systems Edward Hickey. Govt.
already has purchased some evaluation units from AT&T with Clipper Chip
installed, said Raymond Kramer, acting dir. of National Institute of
Standards & Technology (NIST). Govt. expects to purchase "well over the
thousands" of such Clipper Chip units, he said, but he couldn't give
figures for how many it might buy from AT&T. AT&T spokesman said products
with Clipper Chip included will be available commercially in 2nd
quarter.

President Clinton Thurs. signed Top Secret National Security Directive
outlining details of privacy and encryption policy review. Review will
bring together industry and govt. experts under direction of National
Security Council in attempt to resolve long-running controversy on right of
businesses and citizens to protect all forms of communication and govt.
right to conduct lawful investigations. Review will take 3-4 months, NIST's
Kramer said.

Law enforcement agencies are concerned about rising popularity of
digital encryption methods. Multinational businesses, worried about
economic espionage, increasingly are incorporating encryption technology
for all communications. Law enforcement agencies have voiced growing
concern that if they don't move quickly to enact laws assuring them access
to encrypted and digital communications, they will be at decided
disadvantage in attempting to thwart criminal acts. FBI spokesman James
Kallstrom acknowledged that "not many" criminals today are using encryption
to skirt law, but putting methods in place now to assure means of
intercepting such communications "is vital" to law enforcement's mission.

Encryption program will be available to any vendor that wants to
manufacture chips, Kramer said. However, company that developed and
designed chip under sole-source contract from National Security Agency
(NSA) -- Mykotronx, Torrance, Cal. -- has solid lead on market. Kramer
acknowledged job was handed to it with NSA's full approval of
noncompetitive bid contract. He defended noncompetition aspect: "We went
out and found the only company capable of delivering this technology." He
said govt. has been using Clipper Chip technology for "a while now in
classified applications," but declined to say how long it had been in use
before White House announcement.

Each chip will have 3 unique "keys" issued to it. When manufactured, 2
of those keys will be sent to govt. and will be held by "escrow agents."
For law enforcement agency to be able descramble transmissions, it first
must get court order that allows keys held in escrow to be released. Only
when those keys are used in tandem can law enforcement agencies unscramble
codes and listen in on conversations. Attorney Gen.'s office will "make all
arrangements with appropriate entities to hold keys," White House said.
Those escrow keys could be held by private organizations, govt. agencies or
others, Kramer said. But only 2 entities will be chosen and will be
responsible for administering data base that will store keys. Attorney
Gen.'s office is expected to select escrow key holders "within a couple of
weeks," Kramer said.

Plan already is drawing fire from civil liberties groups and privacy
advocates. Electronic Frontier Foundation (EFF) said White House acted
"before any public comment or discussion has been allowed." It said
Administration will use "its leverage to get all telephone equipment
vendors to adopt" technology. EFF criticized govt.'s sole-source contract,
saying there may be other companies that have better encryption technology,
and because encryption algorithm is classified, it can't be tested. "The
public will only have confidence in the security of a standard that is open
to independent, expert scrutiny," EFF said. Privacy experts are concerned
that because Clipper Chip was developed under NSA contract, it might
have "backdoor" known only to NSA that would allow agency to crack code and
bypass court order. Kramer disagreed: "There is positively no backdoor to
this technology."

Because use of Clipper Chip is entirely voluntary, businesses and
private users -- including criminals -- are free to choose other means of
encryption, leaving govt. and law enforcement agencies with dilemma they
now face. FBI 's Kallstrom acknowledged criminals still could thwart
investigations if they used non- Clipper Chip products, "but most
criminals aren't so smart."

Ability of govt. to eavesdrop on Clipper Chip -equipped devices
still doesn't solve broader problem: Ability to wiretap conversations
moving across digital telecommunications lines. That problem is being
addressed separately by FBI 's controversial digital wiretap legislation
that has failed to find congressional sponsor and is languishing in Justice
Dept., waiting for support of Attorney Gen.

+++++

U.S. SCHEME TO EAVESDROP ELECTRONICALLY RAISES CONCERNS CIVIL LIBERTARIANS,
INDUSTRY GROUP WANT PUBLIC INPUT INTO 'KEY' PLAN
San Jose Mercury News (SJ) - Saturday, April 17, 1993
By: RORY J. O'CONNOR, Mercury News Staff Writer
Edition: Morning Final Section: Business Page: 11D

Civil libertarians and a major computer industry group raised concerns
Friday about how much protection a Clinton administration plan would afford
private electronic communications, from cellular telephone calls to
computer data.

The administration Friday said it would begin using technology developed
by the government's National Institute of Standards and Technology to
balance two competing interests: the desire of citizens to keep their
conversations private and the need for law enforcement agencies to monitor
those conversations after getting a court order.

The technology that enables this is a computer chip called the Clipper
Chip that scrambles a telephone call or computer message using a secret
algorithm, or formula.

But each chip also comes with a pair of electronic "keys" that could be
used by law enforcement agencies to decipher the secret messages generated
by the chip.

The Clinton proposal calls for one key to be held by each of two separate
"trusted" third parties, who would release them to law enforcement agencies
that obtained legal authority to intercept the communications. Both keys
would be needed to decipher a message.

The Electronic Frontier Foundation, a not-for-profit civil liberties
group, praised the administration for considering the issue. But it
criticized the lack of public input into the plan.

"They've announced a big inquiry with public input, but they've reached a
conclusion before they started," said Daniel J. Weitzner, staff counsel for
the Washington-based foundation.

Although the administration's plan calls only for equipping government
telephones with the security devices, some groups are concerned the plan
might become a standard for all manner of electronic communication before
the public has a chance to debate its merits.

"I don't want to sound too stridently opposed to this," said Ken Wasch,
executive director of the Software Publishers Association (SPA) in
Washington. "But... we feel blindsided."

The SPA was discussing data security issues with Clinton administration
officials but had not expected any White House action until August,
said Ilene Rosenthal, general counsel.

Besides the lack of initial hearings, both groups said they had two major
concerns about the Clinton plan:

(box) Because the algorithm itself is secret, the groups say it is
impossible for the public to discern if it is truly secure. Users can't be
certain government spy agencies have not hidden a "back door" in the
software that will allow them to read anything they want.

"So far there hasn't been a credible explanation about why the algorithm
has to be secret," Weitzner said.

(box) The administration hasn't decided who will be the escrow agents,
and it seems unlikely any government agency, corporate entity or other
organization would be deemed trustworthy by every user.

Even assuming all concerned can agree on who will hold them, civil
libertarians are concerned that the keys, by giving law enforcement
agencies access to individuals' private communications, might pose a threat
to constitutional protections against self-incrimination.

Washington sources who requested anonymity suggested the White House
might have drafted its plan quickly because of concern over sales of an
AT&T device that encrypts phone calls using an older standard, Data
Encryption Standard. The sources said law enforcement officials feared the
device would create an explosion in secured telephone traffic that would
severely hamper their efforts to wiretap calls.

American Telephone & Telegraph announced Friday it would adapt the $1,200
product, called the Telephone Security Device, to use the Clipper Chip
by the end of this fiscal quarter. AT&T makes a related device, which
encrypts voice and computer data transmissions, that could be converted to
the Clipper technology, said spokesman Bill Jones.

Jones said he wasn't aware of any concern by the government over the
current model of the Telephone Security Device, which has been sold to
government and business customers.

At least one company was quite pleased with the plan: San Jose chip maker
VLSI Technology, which will manufacture the Clipper chips for a
Torrance company that is selling them to the government and to AT&T.

VLSI, which invented a manufacturing method the company said makes it
difficult to "reverse engineer" the chip or discern the encryption scheme,
expects to make $50 million in the next three years selling the device,
said Jeff Hendy, director of new product marketing for the company.

------------------------------

Date: Thu Apr 15 11:47:00 +0200 1993
From: createuraltern.com (Fabien Pigere )
Subject: File 5--Piratage France Telecom par un technicien France Telecom
Copyright: Elsevier Science Publishers Ltd., 1992

ADDING TO CHAOS
Network Monitor March, 1992
ISSN: 0953-8402 WORD COUNT: 121
PUBLISHER: Elsevier Advanced Technology Publications

France Telecom was in the news again recently after a technician was found
guilty of aiding hackers to gain information about using international
network connections.

The technician worked for Intelcom France, an FT subsidiary which manages
the international transit node (NTI) for France Telecom networks.

According to the police the technician "played a determine role" in the
leak of NTI access codes notably to the Chaos Computer Club France.

Jean-Bernard Condat of the CCCF denied the accusation that his organization
which he says specializes in the security of information systems, received
the access codes from the technician.

The Chaos Computer Club began life in Germany and has played a twilight
role, half supporting hackers and half finding security loopholes ignored
or hidden by suppliers and operations.

INDUSTRY: Telecommunications (TL)

------------------------------

End of Chaos Digest #1.19
************************************

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT