[comp.org.eff.talk] Encrypting your data to keep it private

gnu@hoptoad.uucp (John Gilmore) (01/02/91)

hnewstro@x102c.harris-atd.com (Harvey Newstrom) wrote:
> What about keeping data encrypted with a secret password?  It seems like
> one could ``take the fifth'' and refuse to divulge the password on the
> grounds that it might incriminate.

This is OK as long as you really know your rights.  One person who is currently
under indictment had some data encrypted on his (searched and seized) machine.
Under interrogation, they threatened to charge him with espionage unless he
revealed the key.  He broke down and revealed it.

The charge of espionage would be pure fabrication, of course, but so are
two thirds of the charges in all the indictments I have ever seen.  They are
thrown in as a legal maneuver, to scare you into admitting guilt (whether or
not you are guilty) so they don't have to spend a lot of time actually proving
that you broke some small law.

So, if you encrypt information to hide it this way, stiffen your
backbone NOW and resolve to tell them to go to hell no matter what they
threaten.  It's still 100% legal to use encryption in this "free"
country.  I encourage you to use it often to protect your privacy.
(PS: don't use the Unix "crypt" command though - even I can break it.
Use DES, or Khufu, or RSA, or one of the other cryptosystems that are
not publicly known to be breakable.)
-- 
John Gilmore      {sun,pacbell,uunet,pyramid}!hoptoad!gnu        gnu@toad.com
Just say no to thugs.  The ones who lock up innocent drug users come to mind.

duerr@motcid.UUCP (Michael L. Duerr) (01/05/91)

From article <14474@hoptoad.uucp>, by gnu@hoptoad.uucp (John Gilmore):
> It's still 100% legal to use encryption in this "free"
> country.  I encourage you to use it often to protect your privacy.
> (PS: don't use the Unix "crypt" command though - even I can break it.
> Use DES, or Khufu, or RSA, or one of the other cryptosystems that are
> not publicly known to be breakable.)

Is DES Safe?  I vaguely recall a comment that a ( very expensive ) machine
exists that can crack it in about 10 minutes ...  I also seem to recall
that the length of the key was cut in half, at the urging 
of the NSA.  Can anyone verify this? 

res@cbnews.att.com (Robert E. Stampfli) (01/05/91)

In article <4579@apricot30.UUCP>, duerr@motcid.UUCP (Michael L. Duerr) writes:
> 
> Is DES Safe?  I vaguely recall a comment that a ( very expensive ) machine
> exists that can crack it in about 10 minutes ...  I also seem to recall
> that the length of the key was cut in half, at the urging 
> of the NSA.  Can anyone verify this? 

Even if you don't believe in the security of DES, ask yourself:  Would the
NSA choose to reveal -- even to another government agency -- that it
could break DES, just to aid that agency or the courts in the prosecution of
what it would most likely consider a minor criminal?   I suspect your
data would be quite safe in any event.

PS: Let's not turn this thread into a discussion of the strength of DES.
It has been discussed in great detail in sci.crypt.
-- 
Rob Stampfli		614-860-4268 (work)	614-864-9377 (home)
kd8wk@n8jyv.oh (ham)	stampfli@att.com	osu-cis!kd8wk!res

jim@baroque.Stanford.EDU (James Helman) (01/05/91)

If in fact the right against self-incrimination does protect an
individual from being forced to reveal encryption keys for searches of
data, how about physical searches of locked goods?  For example, if X
has a safe to which only he knows the combination, and without the
combination, the safe cannot be opened without destroying the
contents.  A court issues a search warrant for the contents of the
safe.  If X refuses to provide the combination citing his right
against self-incrimination, does this protect him from being held in
contempt of court?

Jim Helman
Department of Applied Physics			Durand 012
Stanford University				FAX: (415) 725-3377
(jim@KAOS.stanford.edu) 			Work: (415) 723-9127

shiva@pro-smof.cts.com (System Smof) (01/06/91)

In-Reply-To: message from gnu@hoptoad.uucp

I had heard that DES was breakable and it was designed to be that way; all you
need is enough supercomputer horsepower.

----
The SMOF-BBS 512-467-7317 The World's First Online Science Fiction Convention 
ProLine:  shiva@pro-smof            UUCP: crash!pro-smof!shiva 
Internet: shiva@pro-smof.cts.com    ARPA: crash!pro-smof!shiva@nosc.mil

cosell@bbn.com (Bernie Cosell) (01/06/91)

shiva@pro-smof.cts.com (System Smof) writes:

}I had heard that DES was breakable and it was designed to be that way; all you
}need is enough supercomputer horsepower.

Can you substantiate this?  From what I know about what's been
happening in the ongoing efforts to study DES, this is almost certainly
incorrect in the sense that you intend it.  The best known techniques
still require searches on the order of 2^52 or so [which is a hair
faster than a brute force 2^56 key search, but not much...].  There has
been no evidence of any 'trap doors' in the S boxes [in fact, quite the
contrary:  recent inforrmation seems to indicated that the algorithm IS
sensitive to the choice of S boxes, and the ones actuall used are
apparently as strong as any that have been found [in the wake of a host
of them that are quite weak].  And, in fact, it appears that DES has
had virtually all of its operational parameters tuned to be about as
strong as the basic underlying algorithm will allow, with no evidence
of anything fishy [and certainly nothing that looks like a trap door.]
All of this has been discussed in detail on sci.crypt.

  /Bernie\

lear@turbo.bio.net (Eliot) (01/07/91)

In comp.org.eff.talk there has been some question as to whether DES
has been tampered with.  I would appreciate someone from sci.crypt
explaining in laymen's terms the various issues involved.

I might also add that there is a fascinating book on the NSA written
by James Bamford who has something to say on the matter.

See _The Puzzle Palace_; James Bamford; Penguin Books, (c) 1982,1983;
    ppg 436-440.

The book is an extremely well written history of the National Security 
Agency, its predecessors, and its staff starting just before the end
of WW1, going up to 1980.  When considering such literature, one must
evaluate how much is to be believed, because the government will
generally deny much of it.  Bamford supports his case extremely well
with 80 pages of footnotes to his 650 page tome.

Although the people in sci.crypt probably have a better handle on it
than he did, Bamford claims that the NSA convinced IBM to shorten the
key from 128 bits to 56.  Apparently in exchanged the NSA helped IBM
strengthen the S-box structures before DES was released as a standard.
Also, this was brought up in Senate Intelligence Committee hearings in
1977.
-- 
Eliot Lear
[lear@turbo.bio.net]

jmc@DEC-Lite.Stanford.EDU (John McCarthy) (01/07/91)

The Bamford book struck me as somewhat biased by the fact that
because it didn't consider the job NSA has to do as important,
he concentrated on matters of form and procedure.

If indeed NSA has been keeping secret for 15 years a way of cracking
DES, they are not likely to give away the fact for the trivial purpose
of helping the Secret Service prosecute a Sysop.

setzer@matagh.ncsu.edu (William Setzer) (01/07/91)

lear@turbo.bio.net (Eliot) writes:
:In comp.org.eff.talk there has been some question as to whether DES
:has been tampered with.  I would appreciate someone from sci.crypt
:explaining in laymen's terms the various issues involved.

I will assume that everyone knows how DES works, ie. you have some
text and a key, and you encrypt the text with the key via DES.  Ok,
you send it to a "friendly", and he wants to know if you actually sent
it.  Well, the easiest way is for the friendly to decode the message
with the key.  If he gets gibberish (which he is almost certain to get
if the key is wrong), then the message is bogus.  But what if he gets
an understandable message?  Someone _might_ have discovered the key,
and sent a bogus message.  Or even worse, the "friendly" may have
decided to fake a message from you, and since he knows the key, it's
trivial.  How do we protect you _and_ the friendly from forgery or
denial?  What needs to be done is "authentification".  There are many
ways to do this.  Here is one described in Konheim, _Cryptography, A
Primer_ (not really a primer, BTW):

In some secure way, person A and person B exchange a long list of
"signatures".  Think of them as functions, so A gets a big list of
functions f(b_i, C), and B gets a big list of functions g(a_j, C),
where C is some message that both A and B know.  Given the a_j's and
b_i's, both A and B know how to calculate f and g, but only A knows
the a_j's and only B knows the b_i's.  (And, in practice, it's hard to
find the a_j's and b_i's, even if you know C, f, and g.)  In front of
some trusted third party, they sign that the lists each receives is
identical (ie. A acknowledges that the g(a_i, C)'s are correct in
front of B and a witness, and vice versa.)  Let's call this the
contract.  Now, suppose A wants to send message M to B.  When A sends
M to B, A calculates 21 signatures, say g(a_k1, M), ..., g(a_k21, M)
and appends them to the message.  B then asks A for 10 of the a_j's,
in the range of a_k1, ..., a_k21, *B's choice,* say a_m0,...,a_m9.  B
calculates g(a_m0, C), ...,g(a_m9, C) and checks to see that they are
in the contract.  He also calculates g(a_m0, M),...,g(a_m9, M) and
checks them against A's signature in the message.  If everything
matches, then B says "OK, I believe you".

Now let's see what happens if either A or B cheat.

Suppose A tries to deny sending the message.  Then B gives the message
M, his list of g(a_j, C)'s, and the 10 revealed keys a_m0, ..., a_m9
to that trusted third party.  The third party requires A to give him
the 21 keys, a_k1, ..., a_k21.  Then the third party calculates
g(a_k1, C), ..., g(a_k21, C) and checks them against the contract.  If
they don't match, then A has obviously cheated by not coughing up the
right keys.  Well, suppose they did match.  Then the third party uses
a_k1,...,a_k21 to calculate g(a_k1, M), ...,g(a_k21, M).  If they
match, A has to fess up, since A was the only one who knew the 21
keys, so is the ony one who could have calculated the 21 signatures at
the end of M.  (Since B has a_m0,...,a_m9, and they match g(a_m0, C),
...,g(a_m9, C), and only A knows the a_j's, only A could have given
B the a_m0,...,a_m9.  Thus A can't deny that a message was sent.)

Now suppose B forged a message, and tried to forge the 21 signatures.
A just gives his 21 keys a_k1,...,a_k21 to the trusted third party.
The third party gets B's a_m0,...,a_m9 and calculates g(a_m0, C),
...,g(a_m9, C) to see if they match.  If not, then B gets caught since
he doesn't have 10 of A's keys.  Suppose they match.  Then the third
party will verify that A's keys are correct by calculating g(a_k1,C),
...,g(a_k21, C).  He then calculates g(a_k1, M),..., g(a_21, M) and
compares them to the signatures on M.  Since B didn't know but 10 of
the 21 keys, there is a very high probability (over 999999 in 10^6 for
the curious) that 11 of the signatures won't match.  B gets caught.

Whew!  Maybe I said way too much.  Anyway, this is a typical method
of authenticating DES transmissions.  Of course, the hard part is
exchanging the f's and g's, because you can't reuse them safely.
(And the game is over if an "unfriendly" obtained either the list
of a_j's or b_i's).  But, it protects both A and B from tampering,
since there is a way to verify the participation of both A and B.

In a fairly unrelated statement, Eliot mentions:
:Although the people in sci.crypt probably have a better handle on it
:than he did, Bamford claims that the NSA convinced IBM to shorten the
:key from 128 bits to 56.

A cryptosystem is at most as strong as its keys.  You can break DES in
2^56 tries, by trying all the keys.  Recently, two people (Shamir and
Binam?)  developed a method of cryptanalyzing "standard" DES that took
at most 2^56 tries.  So it turns out that a larger key does you no
good, since there is a better method available than trying all the
keys.  These two people also discovered that any tampering with the
S-boxes actually helps the method break DES faster.  (This indicates
to some people, including myself, that the NSA knew about this method,
and adjusted DES accordingly.  They strengthened the S-boxes against
it, and shortened the key to 56 bits, since they knew more did no
good.  Of course, all this in parentheses is all IMHO.)

I'm afraid I don't read comp.org.eff.talk, so I won't be around to
answer any followups.  However, I would be glad to answer any questions
you may have via e-mail.

William Setzer
setzer@matagh.ncsu.edu

lear@turbo.bio.net (Eliot) (01/08/91)

jmc@DEC-Lite.Stanford.EDU (John McCarthy) writes:

>The Bamford book struck me as somewhat biased by the fact that
>because it didn't consider the job NSA has to do as important,
>he concentrated on matters of form and procedure.

Which questions do you leave to the reader to decide?

Bamford did consider the NSA important or he would not have gone to
great efforts to write the book, and to demonstrate the lesson we
learned when ``gentlemen do not read other people's mail.''  (I've
heard previous discussion about how the NSA attempted to keep the book
from being published.)

Also, in order to understand the significance of the NSA, one must
understand what that agency does, who it reports to, and what type of
politics have driven it in the past.  Bamford presented just that
information and let the reader draw conclusions based on that
information.

-- 
Eliot Lear
[lear@turbo.bio.net]

jmc@DEC-Lite.Stanford.EDU (John McCarthy) (01/08/91)

Bamford considered NSA important, but he didn't consider the job
it has to do as important, i.e. acquiring Soviet secrets and
protecting our own.

shiva@pro-smof.cts.com (System Smof) (01/09/91)

In-Reply-To: message from lear@turbo.bio.net

>Although the people in sci.crypt probably have a better handle on it
>than he did, Bamford claims that the NSA convinced IBM to shorten the
>key from 128 bits to 56.  Apparently in exchanged the NSA helped IBM
>strengthen the S-box structures before DES was released as a standard.
>Also, this was brought up in Senate Intelligence Committee hearings in
>1977.

That the crux of what I had heard (about the unreliability of the DES).

----
The SMOF-BBS 512-467-7317 The World's First Online Science Fiction Convention 
ProLine:  shiva@pro-smof            UUCP: crash!pro-smof!shiva 
Internet: shiva@pro-smof.cts.com    ARPA: crash!pro-smof!shiva@nosc.mil

cosell@bbn.com (Bernie Cosell) (01/09/91)

lear@turbo.bio.net (Eliot) writes:

}Although the people in sci.crypt probably have a better handle on it
}than he did, Bamford claims that the NSA convinced IBM to shorten the
}key from 128 bits to 56.  Apparently in exchanged the NSA helped IBM
}strengthen the S-box structures before DES was released as a standard.
}Also, this was brought up in Senate Intelligence Committee hearings in
}1977.

Well, what happened 'back then' is still classified, far as I know, and
so you'll only be able to really get speculation, even from the
sci.crypt folk.

On the other hand, there was a recently discovered technique for
cracking DES that requires work on the order of 2^52, and does *NOT*
attack the key.  Thus, this technique is _independent_ of the key
length.  Thus, the 128 bit key was *always* an illusion; you could have
made the key 500 bits long and still not strengthened the system.

What to make of this?  Well, I happen to be willing to give NSA the
benefit of the doubt: I think that they *knew* this technique for
attacking DES and so *knew* that the key-length was an illusion.  And
so without [publicly] justifying it, they reduced the key length to be
the _correct_ length [that is, instead of making it unnecessarily long,
they made it be of a length so that attacking the key was basically the
same amount of work as attacking other weaknesses in the system] ---
and then strengthed the S boxes so that, overall, the entire system was
a well tuned, balanced, order-of-2^50-strong system.

  /Bernie\

spm2d@newton.acc.Virginia.EDU (Steven P. Miale) (01/15/91)

In article <14474@hoptoad.uucp> gnu@hoptoad.uucp (John Gilmore) writes:
>hnewstro@x102c.harris-atd.com (Harvey Newstrom) wrote:
>> What about keeping data encrypted with a secret password?  It seems like
>> one could ``take the fifth'' and refuse to divulge the password on the
>> grounds that it might incriminate.
>
>So, if you encrypt information to hide it this way, stiffen your
>backbone NOW and resolve to tell them to go to hell no matter what they
>threaten.  It's still 100% legal to use encryption in this "free"
>country.  I encourage you to use it often to protect your privacy.
>(PS: don't use the Unix "crypt" command though - even I can break it.
>Use DES, or Khufu, or RSA, or one of the other cryptosystems that are
>not publicly known to be breakable.)


Well, DES is not known "publicly" to be breakable, but I believe that
the various government law enforcement organizations have figured it out.
I wrote my own proprietary system, hidden somewhere in my system, so they
will never be able to decrypt without my cooperation. This I highly
suggest if you put any information that may be, er, harmful to you.