smb@ulysses.UUCP (Steven Bellovin) (09/17/84)
It is true that one cannot export crypt(3), or presumably other DES implmentations, without a license. Curiously enough, during the debate over whether or not DES was designed to be crackable by NSA, it was pointed out that the key size chosen -- 56 bits, rather than the original proposal of 112 -- was between the size that Commerce would normally approve (<48 bits) and the size they'd block (>64 bits). I confess I do not know why export is restricted. The details are widely available, and the algorithm is clear enough that any halfway competent COBOL programmer could implement it in a day or two. The trick to effective use is probably to build the chips -- and the countries that can do that can also devise encryption schemes of equal strength. (For example, I pulled a random cryptology out of my bookcase ("Cipher Systems", by Beker and Piper), and found a complete description of DES, including tables. Note that this book is published in the U.S., Canada, and the U.K. -- meaning that it's already beyond the reach of the Department of Commerce.) Hmm... There are rumors that once upon a time, the British shipped obsolete cipher machines -- Enigmas! -- to their former colonies, so that they could read traffic of interest. (Kahn, in "The Codebreakers", reports allegations that the U.S. has pulled similar stunts.) Given all of the allegations about how the NSA can crack DES, maybe it's all a Tom Sayer-like stunt to entice folks to use it...
mab@cadvax (Matt Bishop) (09/17/84)
These are just my opinions (except for the reference; that's a fact!) If anyone knows anything more, I'd love to hear about it ... > I am told that the Commerce Department forbids export of implementations > of DES without license, because they don't want it to fall into enemy > hands. Is this true? I don't know, but I'd be surprised if the only reason anything was forbidden to be exported is that it implemented the DES. The algorithm is available to the public; the reference is "Data Encryption Standard", FIPS PUB 46, National Bureau of Standards, Washington, D.C. (Jan. 1977). It seems pretty silly to ban export of an implementation if the algorithm is not secret, UNLESS the reason for the banning of the implementation is not related to the algorithm (as in being related to the technology of the implementation.) > Does this include the Unix routines setkey(), > encrypt(), and crypt()? Since UNIX is commercially available in Europe, I would guess there's no problem here. (Any of you in Europe care to confirm or deny that?) Besides, this isn't a vanilla DES implementation (they perturb the E table as a function of the salt.) > The source code for these routines imply that > the algorithm has already been published. Has it? Yes; see above. > Is it the algorithm > or the implementation that is banned? As I say, if anything is banned, it's probably a specific implementation. > How do various Unix vendors > ship a working Unix system without DES? Do they? I don't know. Anybody? > - Jim Rees > decvax!wivax!apollo!rees > uw-beaver!apollo!rees > jim@uw-beaver.arpa -- Peace, Matt Bishop Don't look back -- they might be gaining!!! decvax!decwrl!sun!megatest!mab mab@megatest.UUCP@Shasta.ARPA
jcp@brl-tgr.ARPA (Joe Pistritto <jcp>) (09/19/84)
You bet! In fact, if you order a System V distribution outside the US you don't get any of the DES routines, but get replacements based on some other algorithm. Its highly illegal to ship that stuff out of the country. And yes, its because they don't want the encryption technology getting into enemy hands. (I suppose it would make life too difficult for the spooks...) Although I CANT IMAGINE that no one in Russia can write a DES algorithm... -JCP-
earlw@pesnta.UUCP (Earl Wallace) (09/21/84)
How many "Soviets" have access to the entire UNIX* source? Think it is impossible for AT&T to hire a Soviet spy to work on the UNIX* source? I don't think the spy is going to put his/her profession on the resume. Or for that matter, what about any major University out there -- just send your spy to get a degree and have access to all sorts of goodies! Forget trying to keep the DES out of Soviet hands, they already have it. The only good that would come out of not shipping the DES routines overseas is to keep the good guy honest because the bad guy will always find a way around the barrier. -- Earl Wallace UUCP: ..!{ihnp4, ucbvax!hplabs, ucbvax!twg}!pesnta!earlw PHONE: (408) 727-5540 x230 USMAIL: Perkin-Elmer Corp., Santa Clara, Calif. 95054
gwyn@brl-tgr.ARPA (Doug Gwyn <gwyn>) (09/21/84)
I think the foofaraw over exporting DES software/hardware is due primarily to bureaucratic rule enforcement, rather than realistic evaluation of the risk of this one PARTICULAR encryption scheme. If NSA can't crack a long stream of DES-encrypted text, then they are not as good as they used to be. Doubling the key size should make the length of text required go up by a factor of something like 4 to 8, which does not help much. The nonsense about arrays of thousands of DES chips is absurd; one should use cleverness in preference to brute force.
outer@utcsrgv.UUCP (Richard Outerbridge) (09/26/84)
Important Clarification: There are *no* export restrictions on DES material exported to *Canada* from the United States (this from the Office of Munitions Control in Washington). Going the other way, there are no export controls *at all* on cryptographic material (per se) exported from Canada to the United States (this from External Affairs in Ottawa). The U.S. exemption is an explicit exception, whereas very few Canadian export controls effect the United States at all. I agree the restriction on software is silly, it's obviously aimed at hardware implementations. As presented in the standard (hence as supplied with UNIX) the software is pretty useless for practical purposes anyway. One last point: the algorithm *has* been adopted as a software standard, and in that form is properly called the DEA. -- Richard Outerbridge <outer@utcsrgv.UUCP> 416 978 2742 Payload Deliveries: N 41 39'36", W 79 23'42", Elev. 106.47m.
chrisr@hcradm.UUCP (Chris Retterath) (09/27/84)
The UNITY/VMS system from HCR was recently brought up to System V release 2 standards. When ed(1) was first ported (a few months ago) we thought there was something wrong with it lacking encryption -- further digging exposed the export control problems. Of course, being a Canadian company, the U.S. Department of Commerce doesn't affect us -- our European and Far East customers will be getting the crypt stuff ported in our existing system. Less anyone cry 'foul', remember we are currently shipping crypt all over the world -- a switch to release 2 of System V is not a good reason to stop. ( Actually, some Canadians do run into trouble with U.S. export laws. All part of being a good ally, I guess. ) -- Chris Retterath {decvax,utcsrgv,utzoo}!hcr!hcradm!chrisr also available: ....!cygnus!chris
outer@utcsrgv.UUCP (Richard Outerbridge) (09/28/84)
Well Chris, I don't know, but I *thought* that the export of all cryptographic devices and technical data in any material form not already in the public domain was controlled to *all* countries except the United States. DES is obviously in the public domain - but I don't know about UNIX crypt(1) or crypt(3). Has HCR ever checked this out with External Affairs? -- Richard Outerbridge <outer@utcsrgv.UUCP> 416 978 2742 Payload Deliveries: N 41 39'36", W 79 23'42", Elev. 106.47m.