Interesting People mailing list archives

more on on crypto systems from CTO PGP


From: David Farber <dave () farber net>
Date: Mon, 10 Jul 2006 12:39:17 -0400



Begin forwarded message:

From: Brian Randell <Brian.Randell () ncl ac uk>
Date: July 10, 2006 7:31:12 AM EDT
To: Jon Callas <jon () pgp com>
Cc: dave () farber net
Subject: Re: [IP] on crypto systems from CTO PGP

Hi Jon:

I'm pleased  you responded to my humour so informatively - many thanks.

I have no expertise in cryptology - which probably aided my getting partial permission from the UK Government to investigate and (in a very limited way) document the Colossus project back in the 1970s. However, my comment was I'm sure prompted by the fact that I've just finished reading the two recently published books that at last provide what seems likely to be almost the whole story of the Colossus. Amongst many other things these reveal in detail how Bletchley Park's initial breaking of the Lorenz teleprinter (Fish) cipher was due to just one mistake by one German cipher clerk!

(Incidentally, I recall how years ago when the late Donald Davies gave a lecture here on the DES chip I brought the ensuing discussion over its likely strength to a screeching halt by saying: "I hope some time in the future to obtain a DES chip to sit alongside my Enigma, since I fear that both by then will have become famous because of the importance of the messages that they failed to protect!" :-)

But none of the above is intended as in any way to challenge your comments, for which again my thanks.

Cheers

Brian


Begin forwarded message:

From:
Date: July 9, 2006 5:56:15 PM EDT
To: dave () farber net
Cc: Jon Callas <jon () pgp com>
Subject: Re: [IP] more on FBI plans new Net-tapping push

Brian Randell said:


Just because the government *claims* it can't break a given code ... :-)


I realize that there was a smiley face at the end of this, and I might be showing humorlessness about this, but this concerns my profession in general, and my software in particular. Consequently, I have no choice but to comment on this remark.

Modern cryptographic systems are essentially unbreakable, particularly if an adversary is restricted to intercepts. We have argued for, designed, and built systems with 128 bits of security precisely because they are essentially unbreakable. It is very easy to underestimate the power of exponentials. 2^128 is a very big number. Burt Kaliski first came up with this characterization, and if he had a nickel for every time I tell it, he could buy a latte or three.

Imagine a computer that is the size of a grain of sand that can test keys against some encrypted data. Also imagine that it can test a key in the amount of time it takes light to cross it. Then consider a cluster of these computers, so many that if you covered the earth with them, they would cover the whole planet to the height of 1 meter. The cluster of computers would crack a 128-bit key on average in 1,000 years.

If you want to brute-force a key, it literally takes a planet-ful of computers. And of course, there are always 256-bit keys, if you worry about the possibility that government has a spare planet that they want to devote to key-cracking.

Now of course, there are other ways to break the system.

They could know something we don't. They could know some fundamental truth about mathematics (like how to factor really fast), some effective form of symmetric cryptanalysis, or something else. They could know about quantum computers, DNA computers, systems based upon non-Einsteinian physics, and so on. Yes, it's possible. But this quickly gets into true paranoid thought. There isn't a lot of difference between the *presumption* that they have such things and the presumption that they have aliens in a vault in Nevada. It isn't falsifiable. It gets irrational quickly. The evidence that we have about this suggests quite the opposite, but more on that later.

They could have something we don't. For example, they could know about software flaws in my or other people's computer systems. Yes, that's possible, too. At PGP Corporation, we guard against this by making our software available to people for their examination. Approximately 2,000 people per month do that. If you want to be one of them, go to <http://www.pgp.com/downloads/> and look at it yourself. While you're at it, take a look at our quality assurance letter at <http://www.pgp.com/company/pgpassurance.html>.

They could be hacking people's systems. This is a much more reasonable worry. If I were going to be doing this, it's what I would do. The state of computer operational security is such that it makes much more sense to invest time, money, and effort into rootkits than into cryptanalysis.

However, there are things that we know that they *are* doing. One of them is relevant to this particular case. That is work on cracking the passphrases that people use to protect their keys. The cryptography we're using is itself uncrackable, but about 2/3 of the people in the world use a password (not even a passphrase) that directly relates to a pet or loved one. The order of frequency seems to be pets (living or dead), then children, then ex-loves. We know that at least one government has a password cracker that is based upon building a psychometric model of person who owns the key and constructing passphrases on that model. If you're a Hollywood private eye and they seize your computer and find on it that you're a basketball fan from your browser cache, then "Lak3rz 4 Teh w1n!" is actually a very bad passphrase. Don't blame me when they find it in about two minutes.

It isn't just government that does this, either. Companies such as Access Data and Elcomsoft have distributed password crackers. These things aren't hacking the crypto, they're hacking the mind using the crypto. My old friend and colleague, Drew Gross, who is a forensics expert, has said, "I love crypto; it tells me what part of the system not to bother attacking."

The last bit of evidence we have that suggests that they can't break the crypto is that they are apparently devoting a lot of effort to traffic analysis. Look at what we've learned in the last few months. Listening for keywords is so twentieth century. They're looking at call patterns, message flow, and so on. I could go on about this for a long time, but it's a tangent from this. If you're interested in more, I am going to be leading a panel at Defcon this August on traffic analysis. Come liven up the discussion.

        Jon

--
Jon Callas
CTO, CSO
PGP Corporation         Tel: +1 (650) 319-9016
3460 West Bayshore      Fax: +1 (650) 319-9001
Palo Alto, CA 94303     PGP: ed15 5bdf cd41 adfc 00f3
USA                          28b6 52bf 5a46 bc98 e63d


--
School of Computing Science, Newcastle University, Newcastle upon Tyne,
NE1 7RU, UK
EMAIL = Brian.Randell () ncl ac uk   PHONE = +44 191 222 7923
FAX = +44 191 222 8232  URL = http://www.cs.ncl.ac.uk/~brian.randell/


-------------------------------------
You are subscribed as lists-ip () insecure org
To manage your subscription, go to
 http://v2.listbox.com/member/?listname=ip

Archives at: http://www.interesting-people.org/archives/interesting-people/


Current thread: