[sci.crypt] Request for opinions: canadian cryptographic standard.

daveb@geac.UUCP (David Collier-Brown) (02/29/88)

  An associate, Mr. Max Southall of Micro/Access, was recently asked
to comment on the possible need for a Canadian cryptographic
standard, rather than the proposed ISO DEA-1.

  As neither he nor I have a strong opinion, we are passing the
question on the the portion of the user/researcher community active on
the net:

  For the guidance of the Data Cryptographics Technical Committee of
the Standards Council of Canada, do you feel that Canada needs a
unique data encryption standard, and if so, what relation should it
have to the ISO DEA-1 standard?

  Responses by email or net, please:  we will post more information
and the address for written responses presently... (Max is
discussing it by phone right now).

 --dave
-- 
 David Collier-Brown.                 {mnetor yunexus utgpu}!geac!daveb
 Geac Computers International Inc.,   |  Computer Science loses its
 350 Steelcase Road,Markham, Ontario, |  memory (if not its mind) 
 CANADA, L3R 1B3 (416) 475-0525 x3279 |  every 6 months.

daveb@geac.UUCP (David Collier-Brown) (03/18/88)

[This is a followup to a discussion of Canadian versus US
cryptographic devices and standards, which is probably of direct
interest to the crytographic community worldwide --dave c-b]

  Unfortunately, the new LSI-based COMSEC standard appears to have
the trap door mandated by Congress for international traffic built
in to it. While it's admirable for the U.S. to propose a standard
for its allies which will (hopefully) uniformly deny the enemy
access to our secrets, it's not in the interest of those same allies
to have their nearest and dearest independent secrets subject to
perusal by NSA.  

  The actual algorithms for the type I modules are being treated
like the crown jewels and are NOT open for scrutiny by engineers
designing product around them.  Moreover, design-in sessions
necessary to those using these black boxes in a product are being
held ONLY in the U.S. with access denied to non-U.S. citizens.  The
result is that the only "Canadian" companies able to actually
participate are the American headquarters of Canadian branch plants.
We're well aware of the catch-22 syndromes involved because of our
partial development of data encryption for commercial cellular
telephone nets. 

   We strongly believe that for sensitive Canadian secrets, a
proprietary Canadian algorithm should be embedded into LSI, and the
details shared with no one outside Canada.  Failure to do this makes
a mockery of our already limited sovereignty. If we wish as
Canadians to have our world views taken seriously by our allies, we
must make the necessary expenditures not to be dependent.

--
 Max Southall,               {mnetor yunexus utgpu}!geac!lethe!max
 Micro/Access,               voice: 488-1799, 463-9535
 1425 Bayview Ave.,
 Toronto, Ontario.
 CANADA, M4G 3A9

gamiddleton@watmath.waterloo.edu (Guy Middleton) (03/20/88)

In article <2463@geac.UUCP> daveb@geac.uucp (David Collier-Brown) writes:
>    We strongly believe that for sensitive Canadian secrets, a
> proprietary Canadian algorithm should be embedded into LSI, and the
> details shared with no one outside Canada.  Failure to do this makes
> a mockery of our already limited sovereignty. If we wish as
> Canadians to have our world views taken seriously by our allies, we
> must make the necessary expenditures not to be dependent.

Having an algorithm without trapdoors for nasty foreign intelligence
agencies is a good idea, but keeping the details of the aglorithm secret is
a bad way to make it secure.  At some time, *somebody* will find out, and
all the secrecy will be pointless.  It is better to assume that the enemy
knows everything about the encryption method except for the key.  Also,
keeping the details secret would provoke the same kind of worry about
trapdoors as the NSA does.

 -Guy Middleton, University of Waterloo Institute for Computer Research
 gamiddleton@math.waterloo.edu, watmath!gamiddleton	"nobody uses it, anyway"

gwyn@brl-smoke.ARPA (Doug Gwyn ) (03/20/88)

In article <2463@geac.UUCP> daveb@geac.uucp (David Collier-Brown) writes:
>   We strongly believe that for sensitive Canadian secrets, a
>proprietary Canadian algorithm should be embedded into LSI, and the
>details shared with no one outside Canada.

Well, of course -- why would anyone think otherwise?

You better also have an experience team of cryptanalysts
evaluate any proposed system for its security.  It's
amazing how easy it is to walk right through some
apparently complex cryptosystems.

mdr@reed.UUCP (Mike Rutenberg) (03/20/88)

In article <2463@geac.UUCP> daveb@geac.uucp (David Collier-Brown) writes:
>   We strongly believe that for sensitive Canadian secrets, a
>proprietary Canadian algorithm should be embedded into LSI, and the
>details shared with no one outside Canada.  Failure to do this makes
>a mockery of our already limited sovereignty. If we wish as
>Canadians to have our world views taken seriously by our allies, we
>must make the necessary expenditures not to be dependent.

Your suggestion sounds like "lets emulate U.S. practice" rather than
general support for strong cryptographic research and commercial
development within Canada.

If you are suggesting that a Canadian standard be developed solely for
the Government and military contractors, that might be appropriate (I
must admit some ignorance of where the encryption schemes used by the
Canadian government originate - does the Communications Security
Establishment (CSE) make them or do they come from the NSA?).

A more difficult problem would seem to be a public encryption
standard.  It is probably just my existence outside of the military
that makes me desire open cryptographic research and systems.  Black
boxes concern me, no matter who they come from (I also don't like
centralized key scheduling).  I also think there is a need for
generally available encryption, not just for national security
applications.  Banks, businesses, and even humble love letters all need
to be protected.  Maybe DES or the NSA chips are enough for these
applications, but I certainly wouldn't mind having the option of an
open, independent, "made-in-Canada" solution.

The subject of resources also comes to mind (maybe some messages on
this topic haven't made it out of Canada).  How does one make strong
cryptographic standards appear?  Where would they come from?  Thoughts
which come to mind are National Research Council (NRC) and the CSE, but
I don't know what resources they would have to tackle this seemingly
difficult project.  The open work that I know of is coming from places
like Queen's University and the University of Waterloo.  Do there
already exist proposals for a Canadian standard or is this a thought
which will later be turned into resources?

Anyways, neat stuff.  I'll buy one if it is cheap enough!

Mike
-- 
Mike Rutenberg    specializing in fast, robust software and food  (503)771-5516

karn@thumper.bellcore.com (Phil R. Karn) (03/21/88)

>   We strongly believe that for sensitive Canadian secrets, a
>proprietary Canadian algorithm should be embedded into LSI, and the
>details shared with no one outside Canada.

Why repeat the same heavy-handed tactics that you so justly criticize
the NSA for engaging in?

As a layperson interested in cryptography (but not competent to pass
judgement on the relative merits of any particular encryption system) I
am forced to trust the judgement of others.

In order for me to do this, I have to be able to trust the system under
which these other people operate.  To me this means 1) avoiding even the
appearance of a conflict of interest and 2) applying the tmme-honored
scientific principles of openness and peer review to the process.

I am far more willing to trust the collective judgement of independent
specialists in academic and commercial organizations openly working in
parallel on a publicly-specified algorithm whose design principles are
also public than I would trust a government organization, with its
inherent conflict of interest, working in secret, that says "trust us,
it's secure, but we can't tell you anything more about it".  It doesn't
matter how much more capable the government cryptologists may be, or how
much additional security might theoretically accrue from keeping the
algorithm design process secret. The two principles above have to be
paramount.  I also trust mathematics a lot more than I trust people.

Phil

daveb@geac.UUCP (David Collier-Brown) (03/21/88)

|In article <2463@geac.UUCP> max@syntron (Max Southall) writes:
||  proprietary Canadian algorithm should be embedded into LSI, and the
||  details shared with no one outside Canada.  

In article <17654@watmath.waterloo.edu> gamiddleton@watmath.waterloo.edu (Guy Middleton) writes:
| Having an algorithm without trapdoors for nasty foreign intelligence
| agencies is a good idea, but keeping the details of the algorithm secret is
| a bad way to make it secure.  At some time, *somebody* will find out, and
| all the secrecy will be pointless.  It is better to assume that the enemy
| knows everything about the encryption method except for the key.

  Perhaps we should have made the LSI-embedding proprietary, or some
other mechanism for going from algorithm to the actual processing
proprietary.
  The concern here is the easy availability of chipsets for doing
parallell brute-force attacks on the encoded data.  Not the
algorithm proper's security.

 --dave (sorry, guy!) c-b
-- 
 David Collier-Brown.                 {mnetor yunexus utgpu}!geac!daveb
 Geac Computers International Inc.,   |  Computer Science loses its
 350 Steelcase Road,Markham, Ontario, |  memory (if not its mind) 
 CANADA, L3R 1B3 (416) 475-0525 x3279 |  every 6 months.

rae@unicus.UUCP (Reid) (03/23/88)

daveb@geac.UUCP (David Collier-Brown) writes:
|  The concern here is the easy availability of chipsets for doing
|parallel brute-force attacks on the encoded data.  Not the
|algorithm proper's security.

Given that we are not going to keep the algorithm secret, could we just
tweak an existing standard [DES?] such that it renders existing hardware
solutions for that standard incompatible with our spiffy Canadian
version?  And if we do this, is the demand for Canadian secrets [how
much money does Wayne Gretzky make?] so low that no-one will bother to
design and implement hardware to crack such a 'tweaked' version?
---
Reid Ellis <rae@unicus.com>		"Howdy, howdy!"
176 Brookbanks Drive, Don Mills, Ontario
M3A 2T5, Canada  (416) 446-1644

mdr@reed.UUCP (Mike Rutenberg) (03/23/88)

In article <2475@geac.UUCP> daveb@geac.UUCP (David Collier-Brown) writes:
>  Perhaps we should have made the LSI-embedding proprietary

>  The concern here is the easy availability of chipsets for doing
>parallell brute-force attacks on the encoded data.  Not the
>algorithm proper's security.

It would seem that to make the algorithm public necessarily leaves you
open to somebody building a brute force machine.  Even if you control
the supply of the chips ("I think we should reject Mr.Rutenberg's order
for 10,000 chips") the people who have the capability to build such a
machine could also (easily) make their own chips to do it.

Mike

p.s. Speaking of which, does anyone know of any DES chips designed
outside of the US, or even outside of COCOM control.  Just curious.
-- 
Mike Rutenberg    for fast, robust food and software      (503)771-5516

karn@thumper.bellcore.com (Phil R. Karn) (03/24/88)

> >  The concern here is the easy availability of chipsets for doing
> >parallell brute-force attacks on the encoded data.  Not the
> >algorithm proper's security.

Brute force attacks get a lot of attention only because existing
algorithms like DES are marginally susceptible to them. However, if you
design a proper algorithm with a large enough key size (say 128 bits,
like the original Lucifer) then brute force attacks are clearly out of
the question no matter how fast the technology gets in our lifetime (or
many lifetimes, for that matter).

Again I'd much rather place my trust in mathematics than bet against
advancing technology.

Phil

daveb@geac.UUCP (David Collier-Brown) (03/24/88)

In article <2414@unicus.UUCP> rae@Unicus.COM (Reid Ellis) writes:
| Given that we are not going to keep the algorithm secret, could we just
| tweak an existing standard [DES?] such that it renders existing hardware
| solutions for that standard incompatible with our spiffy Canadian
| version?  And if we do this, is the demand for Canadian secrets [how
| much money does Wayne Gretzky make?] so low that no-one will bother to
| design and implement hardware to crack such a 'tweaked' version?

  An existing standard, probably.  DES? probably not, as it's
behavior is not fully known.  There is some reason to believe it is
not as secure as intended, and speculation about a trap-door
continues.


  There is also a canadian-made encryption chip in test, with
decent throughput:  further information expected next week.

--dave
-- 
 David Collier-Brown.                 {mnetor yunexus utgpu}!geac!daveb
 Geac Computers International Inc.,   |  Computer Science loses its
 350 Steelcase Road,Markham, Ontario, |  memory (if not its mind) 
 CANADA, L3R 1B3 (416) 475-0525 x3279 |  every 6 months.

karn@thumper.bellcore.com (Phil R. Karn) (03/25/88)

> Given that we are not going to keep the algorithm secret, could we just
> tweak an existing standard [DES?] such that it renders existing hardware
> solutions for that standard incompatible with our spiffy Canadian
> version?

A good start. But I think I have a better idea.

Surely there must be plenty of independent expertise out there that
hasn't sold their souls either to the NSA or IBM (or non-US counterparts
thereof).  Why can't they get together and develop an informal
"counterstandard" secret-key encryption algorithm as an alternative to
DES? It would have the following properties:

1. Complete public disclosure of all algorithmic details and design
principles.

2. A widespread consensus as to the mathematical strength of the algorithm,
given point #1 above.

3. A design tailored for efficient software implementation (no "initial
permutations" or similar gratuitous garbage meant to sabotage software
in favor of custom hardware).  Unfortunately, this seems to rule out
public-key systems; that's why I said "secret-key" above.

4. A key size sufficient to rule out all brute force attacks, even those
by custom hardware.

If such an algorithm can be devised, I for one would be willing to
implement it in portable C, tune it up, and put the code into the public
domain. Comments?

Phil

leonard@bucket.UUCP (Leonard Erickson) (03/25/88)

Assuming only a moderately paranoid point of view, the following thought
came up:

NSA is trying to push use of a "black box" encryption standard which they
almost certainly will have a "back door" to.

Now it is suggested that Canada come up with its *own* black box. (probably
with a back door :-)

So if I get both and run my data thru the in sequence, would that mean that
neither NSA nor it's Canadian equivalent code crack it without either luck
(finding the other guy's backdoor) or sharing their black boxes (which
defeats the purpose of having seperate black boxes)?

I think I like this...

-- 
Leonard Erickson		...!tektronix!reed!percival!bucket!leonard
CIS: [70465,203]
"I used to be a hacker. Now I'm a 'microcomputer specialist'.
You know... I'd rather be a hacker."

gwyn@brl-smoke.ARPA (Doug Gwyn ) (03/26/88)

In article <1009@thumper.bellcore.com> karn@thumper.bellcore.com (Phil R. Karn) writes:
>Surely there must be plenty of independent expertise out there that
>hasn't sold their souls either to the NSA or IBM (or non-US counterparts
>thereof).  Why can't they get together and develop an informal
>"counterstandard" secret-key encryption algorithm as an alternative to
>DES?

The main reason is that very few of the "public" cryptologists are
qualified cryptanalysts; training of the latter is almost exclusively
done by government agencies who intimidate their employees into Never
Saying Anything.  Knowledge that the secret agencies have is not
generally available to help the public evaluate cryptosystems.

>1. Complete public disclosure of all algorithmic details and design
>principles.

One of the problems is that the secret agencies tend to jealously guard
design principles.  For example, the Lucifer S-boxes were strengthened
using guidelines that I believe have never been publicly disclosed.

>2. A widespread consensus as to the mathematical strength of the algorithm,
>given point #1 above.

Consensus means little.  What you want is for several independent
attacks by competent cryptanalytic teams to fail to find exploitable
weaknesses.  Few systems would pass such a test.  Note that there have
been several recent public cryptosystems for which the (public)
consensus initially was that they were secure, and only later was it
shown that the consensus had been wrong.

>4. A key size sufficient to rule out all brute force attacks, even those
>by custom hardware.

Brute-force attacks are stupid.  Of course they must be made
impractical, but so must more clever techniques.  Guaranteed security
at a certain confidence level requires a key length comparable in size
to the amount of text being encrypted (just how much less depends on
details of the system).  This brings up the practical issue of key
distribution.  Most common systems implement a compromise that relies
more on system complexity than on information-theoretic security.
But you still need frequent key changes.

gwyn@brl-smoke.ARPA (Doug Gwyn ) (03/27/88)

In article <821@bucket.UUCP> leonard@bucket.UUCP (Leonard Erickson) writes:
>So if I get both and run my data thru the in sequence, would that mean that
>neither NSA nor it's Canadian equivalent code crack it without either luck
>(finding the other guy's backdoor) or sharing their black boxes (which
>defeats the purpose of having seperate black boxes)?

I don't know whether there is a "back door" to the DES, but from its
structure I rather think not.  In any event, the combination of two
complex cryptosystems is not necessarily theoretically much more secure
than using just one, but any specialized automated procedure for
cracking one of the "standard" systems that some secret agency may have
set up would not work when applied to the combination.  Whether this
would deter them depends on how important they consider reading your
traffic to be.  If it's just a "personal" application, I doubt they'd
bother to try cracking your traffic, since there would be insufficient
return for the resources invested.  Ultimately, you're protected by
economics!

dee@cca.CCA.COM (Donald Eastlake) (03/29/88)

In article <821@bucket.UUCP> leonard@bucket.UUCP (Leonard Erickson) writes:
>NSA is trying to push use of a "black box" encryption standard which they
>almost certainly will have a "back door" to.
>Now it is suggested that Canada come up with its *own* black box. (probably
>with a back door :-)

There are a number of well known cases where persons working at NSA were
in the pay of or defected to foreign powers.  The people at NSA are
probably of at least average intelligence.  Therefore they must assume
that a few of the people currently working there are in the pay of
others or will defect in the future.  Putting a trap door into an
ecryption algorithm that will be used to protect the highest level
secrets strikes me as pretty stupid.  You have to assume that other
countries are recording your transmissions and keep copies for umpteen
years so if the trap door ever leaked they could read all of your
messages not to mention the cost and effort that would be involved in
replacing all the hardware to protect current and future message.

-- 
	+1 617-492-8860		Donald E. Eastlake, III
	ARPA: dee@CCA.CCA.COM	usenet:	{cbosg,decvax,linus}!cca!dee
	P. O. Box N, MIT Branch P. O., Cambridge, MA 02139-0903 USA

daveb@geac.UUCP (David Collier-Brown) (03/29/88)

In article <1009@thumper.bellcore.com> karn@thumper.bellcore.com (Phil R. Karn) writes:
>Surely there must be plenty of independent expertise out there that
>hasn't sold their souls either to the NSA or IBM (or non-US counterparts
>thereof).  Why can't they get together and develop an informal
>"counterstandard" secret-key encryption algorithm as an alternative to
>DES? 

  Well, we may have a chip-level product already: I just spoke to
Gord Agnew of the University of Waterloo, who was kend enough to
pass on an advance spec sheet for the CalMos CA34C168 Public Key
Encryption Processor, designed in concert with Cryptech Systems and
UW.
  In brief:
	CMOS VLSI Cryptographic device, 40-pin dip
	Public key or conventional cryptosystems
	Block size 600 bits or greater
	2 stream and 2 block cypher modes
	Generates digital signatures, message authentication codes 

  This was written up in the Science column of the Toronto Star last
January (17 Jan 87) when the companies first got together.
  The principal designers were from Waterloo: Gordon Agnew, Faculty
of Engineering, Ron Mullin and Scott Vanstone, Faculty of Math, and
Ivan Onyzschuk with help from the University commercial deveopment
officer, Robert Nally.
  The implementers are CalMos Systems Inc., Canata, Ontario.
Regrettably, I don't have their address (although the above is
probably sifficent: Canata is a smallish suburb of Ottawa (:-))



-- 
 David Collier-Brown.                 {mnetor yunexus utgpu}!geac!daveb
 Geac Computers International Inc.,   |  Computer Science loses its
 350 Steelcase Road,Markham, Ontario, |  memory (if not its mind) 
 CANADA, L3R 1B3 (416) 475-0525 x3279 |  every 6 months.

greg@xios.XIOS.UUCP (Greg Franks) (04/05/88)

In article <2508@geac.UUCP> daveb@geac.UUCP (David Collier-Brown) writes:
>  Well, we may have a chip-level product already: I just spoke to
>Gord Agnew of the University of Waterloo, who was kend enough to
>pass on an advance spec sheet for the CalMos CA34C168 Public Key
>Encryption Processor, designed in concert with Cryptech Systems and
>UW.
[...]
>  The implementers are CalMos Systems Inc., Canata, Ontario.
>Regrettably, I don't have their address (although the above is
>probably sifficent: Canata is a smallish suburb of Ottawa (:-))
>-- 
> David Collier-Brown.                 {mnetor yunexus utgpu}!geac!daveb


Calmos systems:
   20 Edgewater Dr.
   Kanata, Ontario, Canada.
   (613) 836-1014

It is left as an exercise for Canadian readers to look up the postal
code.  American readers can ignore the postal code - Canada Post
usually does...

Disclaimer.  I looked this address up in the telephone book.  I also
don't know where *Canata* is :-).  Perhaps in Mexico?
-- 
Greg Franks                   XIOS Systems Corporation, 1600 Carling Avenue,
utzoo!dciem!nrcaer!xios!greg  Ottawa, Ontario, Canada, K1Z 8R8. (613) 725-5411.
       "Those who stand in the middle of the road get
               hit by trucks coming from both directions." Evelyn C. Leeper.