1b93b4cfb6
Chapter 05 unformatted
1594 lines
86 KiB
Markdown
1594 lines
86 KiB
Markdown
5. Cryptology
|
||
|
||
5.1. copyright
|
||
THE CYPHERNOMICON: Cypherpunks FAQ and More, Version 0.666,
|
||
1994-09-10, Copyright Timothy C. May. All rights reserved.
|
||
See the detailed disclaimer. Use short sections under "fair
|
||
use" provisions, with appropriate credit, but don't put your
|
||
name on my words.
|
||
|
||
5.2. SUMMARY: Cryptology
|
||
5.2.1. Main Points
|
||
- gaps still exist here...I treated this as fairly low
|
||
priority, given the wealth of material on cryptography
|
||
5.2.2. Connections to Other Sections
|
||
- detailed crypto knowledge is not needed to understand many
|
||
of the implications, but it helps to know the basics (it
|
||
heads off many of the most wrong-headed interpretations)
|
||
- in particular, everyone should learn enough to at least
|
||
vaguely understand how "blinding" works
|
||
5.2.3. Where to Find Additional Information
|
||
+ a dozen or so major books
|
||
- Schneier, "Applied Cryptography"--is practically
|
||
"required reading"
|
||
- Denning
|
||
- Brassard
|
||
- Simmons
|
||
- Welsh, Dominic
|
||
- Salomaa
|
||
- "CRYPTO" Proceedings
|
||
- Other books I can take or leave
|
||
- many ftp sites, detailed in various places in this doc
|
||
- sci.crypt, alt.privacy.pgp, etc.
|
||
- sci.crypt.research is a new group, and is moderated, so it
|
||
should have some high-quality, technical posts
|
||
- FAQs on sci.crypt, from RSA, etc.
|
||
- Dave Banisar of EPIC (Electronic Privacy Information
|
||
Center) reports: "...we have several hundred files on
|
||
encryption available via ftp/wais/gopher/WWW from cpsr.org
|
||
/cpsr/privacy/crypto." [D.B., sci.crypt, 1994-06-30]
|
||
5.2.4. Miscellaneous Comments
|
||
- details of algorithms would fill several books...and do
|
||
- hence, will not cover crypto in depth here (the main focus
|
||
of this doc is the implications of crypto, the
|
||
Cypherpunkian aspects, the things not covered in crypto
|
||
textbooks)
|
||
- beware of getting lost in the minutiae, in the details of
|
||
specific algorithms...try to keep in the mind the
|
||
_important_ aspects of any system
|
||
|
||
5.3. What this FAQ Section Will Not Cover
|
||
5.3.1. Why a section on crypto when so many other sources exist?
|
||
- A good question. I'll be keeping this section brief, as
|
||
many textbooks can afford to do a much better job here than
|
||
I can.
|
||
- not just for those who read number theory books with one
|
||
hand
|
||
5.3.2. NOTE: This section may remain disorganized, at least as
|
||
compared to some of the later sections. Many excellent
|
||
sources on crypto exist, including readily available FAQs
|
||
(sci.crypt, RSADSI FAQ) and books. Schneier's books is
|
||
especially recommended, and should be on _every_ Cypherpunk's
|
||
bookshelf.
|
||
|
||
5.4. Crypto Basics
|
||
5.4.1. "What is cryptology?"
|
||
- we see crypto all around us...the keys in our pockets, the
|
||
signatures on our driver's licenses and other cards, the
|
||
photo IDs, the credit cards
|
||
+ cryptography or cryptology, the science of secret
|
||
writing...but it's a lot more...consider I.D. cards, locks
|
||
on doors, combinations to safes, private
|
||
information...secrecy is all around us
|
||
- some say this is bad--the tension between "what have you
|
||
got to hide?" and "none of your business"
|
||
- some exotic stuff: digital money, voting systems, advanced
|
||
software protocols
|
||
- of importance to protecting privacy in a world of
|
||
localizers (a la Bob and Cherie), credit cards, tags on
|
||
cars, etc....the dossier society
|
||
+ general comments on cryptography
|
||
- chain is only as strong as its weakest link
|
||
- assume opponnent knows everything except the secret key
|
||
-
|
||
- Crypto is about economics
|
||
+ Codes and Ciphers
|
||
+ Simple Codes
|
||
- Code Books
|
||
+ Simple Ciphers
|
||
+ Substitution Ciphers (A=C, B=D, etc.)
|
||
- Caesar Shift (blocks)
|
||
+ Keyword Ciphers
|
||
+ Vigenre (with Caesar)
|
||
+ Rotor Machines
|
||
- Hagelin
|
||
- Enigma
|
||
- Early Computers (Turing, Colossus)
|
||
+ Modern Ciphers
|
||
+ 20th Century
|
||
+ Private Key
|
||
+ One-Time Pads (long strings of random numbers,
|
||
shared by both parties)
|
||
+ not breakable even in principle, e.g., a one-time
|
||
pad with random characters selected by a truly
|
||
random process (die tosses, radioactive decay,
|
||
certain types of noise, etc.)
|
||
- and ignoring the "breakable by break-ins"
|
||
approach of stealing the one-time pad, etc.
|
||
("Black bag cryptography")
|
||
- Computer Media (Floppies)
|
||
+ CD-ROMs and DATs
|
||
- "CD ROM is a terrible medium for the OTP key
|
||
stream. First, you want exactly two copies of
|
||
the random stream. CD ROM has an economic
|
||
advantage only for large runs. Second, you want
|
||
to destroy the part of the stream already used.
|
||
CD ROM has no erase facilities, outside of
|
||
physical destruction of the entire disk."
|
||
[Bryan G. Olson, sci.crypt, 1994-08-31]
|
||
+ DES--Data Encryption Standard
|
||
- Developed from IBM's Lucifer, supported by NSA
|
||
- a standard since 1970s
|
||
+ But is it "Weak"?
|
||
+ DES-busting hardware and software studied
|
||
+ By 1990, still cracked
|
||
- But NSA/NIST has ordered a change
|
||
+ Key Distribution Problem
|
||
+ Communicating with 100 other people means
|
||
distributing and securing 100 keys
|
||
- and each of those 100 must keep their 100 keys
|
||
secure
|
||
- no possibility of widespread use
|
||
+ Public Key
|
||
+ 1970s: Diffie, Hellman, Merkle
|
||
+ Two Keys: Private Key and Public Key
|
||
+ Anybody can encrypt a message to Receiver with
|
||
Receiver's PUBLIC key, but only the Receiver's
|
||
PRIVATE key can decrypt the message
|
||
+ Directories of public keys can be published
|
||
(solves the key distribution problem)
|
||
+ Approaches
|
||
+ One-Way Functions
|
||
- Knapsack (Merkle, Hellman)
|
||
+ RSA (Rivest, Shamir, Adleman)
|
||
- relies on difficulty of factoring
|
||
large numbers (200 decimal digits)
|
||
- believed to be "NP-hard"
|
||
+ patented and licensed to "carefully
|
||
selected" customers
|
||
- RSA, Fiat-Shamir, and other
|
||
algorithms are not freely usable
|
||
- search for alternatives continues
|
||
5.4.2. "Why does anybody need crypto?"
|
||
+ Why the Need
|
||
- electronic communications...cellular phones, fax
|
||
machines, ordinary phone calls are all easily
|
||
intercepted...by foreign governments, by the NSA, by
|
||
rival drug dealers, by casual amateurs
|
||
+ transactions being traced....credit card receipts,
|
||
personal checks, I.D. cards presented at time of
|
||
purchase...allows cross-referencing, direct mail data
|
||
bases, even government raids on people who buy greenhouse
|
||
supplies!
|
||
- in a sense, encryption and digital money allows a
|
||
return to cash
|
||
- Why do honest people need encryption? Because not
|
||
everyone is honest, and this applies to governments as
|
||
well. Besides, some things are no one else's business.
|
||
- Why does anybody need locks on doors? Why aren't all
|
||
diaries available for public reading?
|
||
+ Whit Diffie, one of the inventors of public key
|
||
cryptography (and a Cypherpunk) points out that human
|
||
interaction has largely been predicated on two important
|
||
aspects:
|
||
- that you are who you say you are
|
||
- expectation of privacy in private communications
|
||
- Privacy exists in various forms in various cultures. But
|
||
even in police states, certain concepts of privacy are
|
||
important.
|
||
- Trust is not enough...one may have opponents who will
|
||
violate trust if it seems justified
|
||
+ The current importance of crypto is even more striking
|
||
+ needed to protect privacy in cyberspace, networks, etc.
|
||
- many more paths, links, interconnects
|
||
- read Vinge's "True Names" for a vision
|
||
+ digital money...in a world of agents, knowbots, high
|
||
connectivity
|
||
- (can't be giving out your VISA number for all these
|
||
things)
|
||
+ developing battle between:
|
||
- privacy advocates...those who want privacy
|
||
- government agencies...FBI, DOJ, DEA, FINCEN, NSA
|
||
+ being fought with:
|
||
- attempts to restrict encryption (S.266, never passed)
|
||
- Digital Telephony Bill, $10K a day fine
|
||
- trial balloons to require key registration
|
||
- future actions
|
||
+ honest people need crypto because there are dishonest
|
||
people
|
||
- and there may be other needs for privacy
|
||
- Phil Zimmerman's point about sending all mail, all letters,
|
||
on postcards--"What have you got to hide?" indeed!
|
||
- the expectation of privacy in out homes and in phone
|
||
conversations
|
||
+ Whit Diffie's main points:
|
||
+ proving who you say you are...signatures, authentications
|
||
- like "seals" of the past
|
||
- protecting privacy
|
||
- locks and keys on property and whatnot
|
||
+ the three elements that are central to our modern view of
|
||
liberty and privacy (a la Diffie)
|
||
- protecting things against theft
|
||
- proving who we say we are
|
||
- expecting privacy in our conversations and writings
|
||
5.4.3. What's the history of cryptology?
|
||
5.4.4. Major Classes of Crypto
|
||
- (these sections will introduce the terms in context, though
|
||
complete definitions will not be given)
|
||
+ Encryption
|
||
- privacy of messages
|
||
- using ciphers and codes to protect the secrecy of
|
||
messages
|
||
- DES is the most common symmetric cipher (same key for
|
||
encryption and decryption)
|
||
- RSA is the most common asymmetric cipher (different keys
|
||
for encryption and decryption)
|
||
+ Signatures and Authentication
|
||
- proving who you are
|
||
- proving you signed a document (and not someone else)
|
||
+ Authentication
|
||
+ Seals
|
||
+ Signatures (written)
|
||
+ Digital Signatures (computer)
|
||
- Example: Numerical codes on lottery tickets
|
||
+ Using Public Key Methods (see below)
|
||
- Digital Credentials (Super Smartcards)
|
||
- Tamper-responding Systems
|
||
+ Credentials
|
||
- ID Cards, Passports, etc.
|
||
+ Biometric Security
|
||
- Fingerprints, Retinal Scans, DNA, etc.
|
||
+ Untraceable Mail
|
||
- untraceable sending and receiving of mail and messages
|
||
- focus: defeating eavesdroppers and traffic analysis
|
||
- DC protocol (dining cryptographers)
|
||
+ Cryptographic Voting
|
||
- focus: ballot box anonymity
|
||
- credentials for voting
|
||
- issues of double voting, security, robustness, efficiency
|
||
+ Digital Cash
|
||
- focus: privacy in transactions, purchases
|
||
- unlinkable credentials
|
||
- blinded notes
|
||
- "digital coins" may not be possible
|
||
+ Crypto Anarchy
|
||
- using the above to evade gov't., to bypass tax
|
||
collection, etc.
|
||
- a technological solution to the problem of too much
|
||
government
|
||
+ Security
|
||
+ Locks
|
||
- Key Locks
|
||
+ Combination Locks
|
||
- Cardkey Locks
|
||
+ Tamper-responding Systems (Seals)
|
||
+ Also known as "tamper-proof" (misleading)
|
||
- Food and Medicine Containers
|
||
- Vaults, Safes (Alarms)
|
||
+ Weapons, Permissive Action Links
|
||
- Nuclear Weapons
|
||
- Arms Control
|
||
- Smartcards
|
||
- Currency, Checks
|
||
+ Cryptographic Checksums on Software
|
||
- But where is it stored? (Can spoof the system by
|
||
replacing the whole package)
|
||
+ Copy Protection
|
||
- Passwords
|
||
- Hardware Keys ("dongles")
|
||
- Call-in at run-time
|
||
+ Access Control
|
||
- Passwords, Passphrases
|
||
- Biometric Security, Handwritten Signatures
|
||
- For: Computer Accounts, ATMs, Smartcards
|
||
5.4.5. Hardware vs. Software
|
||
- NSA says only hardware implementations can really be
|
||
considered secure, and yet most Cypherpunks and ordinary
|
||
crypto users favor the sofware approach
|
||
- Hardware is less easily spoofable (replacement of modules)
|
||
- Software can be changed more rapidly, to make use of newer
|
||
features, faster modules, etc.
|
||
- Different cultures, with ordinary users (many millions)
|
||
knowing they are less likely to have their systems black-
|
||
bag spoofed (midnight engineering) than are the relatively
|
||
fewer and much more sensitive military sites.
|
||
5.4.6. "What are 'tamper-resistant modules' and why are they
|
||
important?"
|
||
- These are the "tamper-proof boxes" of yore: display cases,
|
||
vaults, museum cases
|
||
- that give evidence of having been opened, tampered with,
|
||
etc.
|
||
+ modern versions:
|
||
- display cases
|
||
- smart cards
|
||
+ chips
|
||
- layers of epoxy, abrasive materials, fusible links,
|
||
etc.
|
||
- (goal is to make reverse engineering much more
|
||
expensive)
|
||
- nuclear weapon "permissive action links" (PALs)
|
||
5.4.7. "What are "one way functions"?"
|
||
- functions with no inverses
|
||
- crypto needs functions that are seemingly one-way, but
|
||
which actually have an inverse (though very hard to find,
|
||
for example)
|
||
- one-way function, like "bobbles" (Vinge's "Marooned in
|
||
Realtime")
|
||
5.4.8. When did modern cryptology start?
|
||
+ "What are some of the modern applications of cryptology?"
|
||
+ "Zero Knowledge Interactive Proof Systems" (ZKIPS)
|
||
- since around 1985
|
||
- "minimum disclosure proofs"
|
||
+ proving that you know something without actually
|
||
revealing that something
|
||
+ practical example: password
|
||
+ can prove you have the password without actually
|
||
typing it in to computer
|
||
- hence, eavesdroppers can't learn your password
|
||
- like "20 questions" but more sophisticated
|
||
- abstract example: Hamiltonian circuit of a graph
|
||
+ Digital Money
|
||
+ David Chaum: "RSA numbers ARE money"
|
||
- checks, cashiers checks, etc.
|
||
- can even know if attempt is made to cash same check
|
||
twice
|
||
+ so far, no direct equivalent of paper currency or
|
||
coins
|
||
- but when combined with "reputation-based systems,"
|
||
there may be
|
||
+ Credentials
|
||
+ Proofs of some property that do not reveal more than
|
||
just that property
|
||
- age, license to drive, voting rights, etc.
|
||
- "digital envelopes"
|
||
+ Fiat-Shamir
|
||
- passports
|
||
+ Anonymous Voting
|
||
- protection of privacy with electronic voting
|
||
- politics, corporations, clubs, etc.
|
||
- peer review of electronic journals
|
||
- consumer opinions, polls
|
||
+ Digital Pseudonyms and Untraceable E-Mail
|
||
+ ability to adopt a digital pseudonym that is:
|
||
- unforgeable
|
||
- authenticatable
|
||
- untraceable
|
||
- Vinge's "True Names" and Card's "Ender's Game"
|
||
+ Bulletin Boards, Samizdats, and Free Speech
|
||
+ banned speech, technologies
|
||
- e.g., formula for RU-486 pill
|
||
- bootleg software, legally protected material
|
||
+ floating opinions without fears for professional
|
||
position
|
||
- can even later "prove" the opinions were yours
|
||
+ "The Labyrinth"
|
||
- store-and-forward switching nodes
|
||
+ each with tamper-responding modules that decrypt
|
||
incoming messages
|
||
+ accumulate some number (latency)
|
||
+ retransmit to next address
|
||
- and so on....
|
||
+ relies on hardware and/or reputations
|
||
+ Chaum claims it can be done solely in software
|
||
- "Dining Cryptographers"
|
||
5.4.9. What is public key cryptography?
|
||
5.4.10. Why is public key cryptography so important?
|
||
+ The chief advantage of public keys cryptosystems over
|
||
conventional symmetric key (one key does both encryption
|
||
and decryption) is one _connectivity_ to recipients: one
|
||
can communicate securely with people without exchanging key
|
||
material.
|
||
- by looking up their public key in a directory
|
||
- by setting up a channel using Diffie-Hellman key exchange
|
||
(for example)
|
||
5.4.11. "Does possession of a key mean possession of *identity*?"
|
||
- If I get your key, am I you?
|
||
- Certainly not outside the context of the cryptographic
|
||
transaction. But within the context of a transaction, yes.
|
||
Additional safeguards/speedbumps can be inserted (such as
|
||
biometric credentials, additional passphrases, etc.), but
|
||
these are essentially part of the "key," so the basic
|
||
answer remains "yes." (There are periodically concerns
|
||
raised about this, citing the dangers of having all
|
||
identity tied to a single credential, or number, or key.
|
||
Well, there are ways to handle this, such as by adopting
|
||
protocols that limit one's exposure, that limits the amount
|
||
of money that can be withdrawn, etc. Or people can adopt
|
||
protocols that require additional security, time delays,
|
||
countersigning, etc.)
|
||
+ This may be tested in court soon enough, but the answer for
|
||
many contracts and crypto transactions will be that
|
||
possession of key = possession of identity. Even a court
|
||
test may mean little, for the types of transactions I
|
||
expect to see.
|
||
- That is, in anonymous systems, "who ya gonna sue?"
|
||
- So, guard your key.
|
||
5.4.12. What are digital signatures?
|
||
+ Uses of Digital Signatures
|
||
- Electronic Contracts
|
||
- Voting
|
||
- Checks and other financial instruments (similar to
|
||
contracts)
|
||
- Date-stamped Transactions (augmenting Notary Publics)
|
||
5.4.13. Identity, Passports, Fiat-Shamir
|
||
- Murdoch, is-a-person, national ID cards, surveillance
|
||
society
|
||
+ "Chess Grandmaster Problem" and other Frauds and Spoofs
|
||
- of central importance to proofs of identity (a la Fiat-
|
||
Shamir)
|
||
- "terrorist" and "Mafia spoof" problems
|
||
5.4.14. Where else should I look?
|
||
5.4.15. Crypto, Technical
|
||
+ Ciphers
|
||
- traditional
|
||
- one-time pads, Vernams ciphers, information-theoretically
|
||
secure
|
||
+ "I Have a New Idea for a Cipher---Should I Discuss it
|
||
Here?"
|
||
- Please don't. Ciphers require careful analysis, and
|
||
should be in paper form (that is, presented in a
|
||
detailed paper, with the necessary references to show
|
||
that due diligence was done, the equations, tables,
|
||
etc. The Net is a poor substitute.
|
||
- Also, breaking a randomly presented cipher is by no
|
||
means trivial, even if the cipher is eventually shown
|
||
to be weak. Most people don't have the inclination to
|
||
try to break a cipher unless there's some incentive,
|
||
such as fame or money involved.
|
||
- And new ciphers are notoriously hard to design. Experts
|
||
are the best folks to do this. With all the stuff
|
||
waiting to be done (described here), working on a new
|
||
cipher is probably the least effective thing an amateur
|
||
can do. (If you are not an amateur, and have broken
|
||
other people's ciphers before, then you know who you
|
||
are, and these comments don't apply. But I'll guess
|
||
that fewer than a handful of folks on this list have
|
||
the necessary background to do cipher design.)
|
||
- There are a vast number of ciphers and systems, nearly
|
||
all of no lasting significance. Untested, undocumented,
|
||
unused--and probably unworthy of any real attention.
|
||
Don't add to the noise.
|
||
- What is DES and can it be broken?
|
||
+ ciphers
|
||
- RC4, stream cipher
|
||
+ DolphinEncrypt
|
||
-
|
||
+ "Last time Dolphin Encrypt reared its insecure head
|
||
in this forum,
|
||
- these same issues came up. The cipher that DE uses
|
||
is not public and
|
||
- was not designed by a person of known
|
||
cryptographicc competence. It
|
||
- should therefore be considered extremely weak.
|
||
<Eric Hughes, 4-16-94, Cypherpunks>
|
||
+ RSA
|
||
- What is RSA?
|
||
- Who owns or controls the RSA patents?
|
||
- Can RSA be broken?
|
||
- What alternatives to RSA exist?
|
||
+ One-Way Functions
|
||
- like diodes, one-way streets
|
||
- multiplying two large numbers together is
|
||
easy....factoring the product is often very hard
|
||
- (this is not enough for a usable cipher, as the recipient
|
||
must be able to perform the reverse operation..it turns
|
||
out that "trapdoors" can be found)
|
||
- Digital Signatures
|
||
+ Digital Cash
|
||
- What is digital cash?
|
||
- How does digital cash differ from VISA and similar
|
||
electronic systems?
|
||
- Clearing vs. Doublespending Detection
|
||
- Zero Knowledge
|
||
- Mixes and Remailers
|
||
- Dining Cryptographers
|
||
+ Steganography
|
||
- invisible ink
|
||
- microdots
|
||
- images
|
||
- sound files
|
||
+ Random Number Generators
|
||
+ von Neumann quote about living in a state of sin
|
||
- also paraphrased (I've heard) to include _analog_
|
||
methods, presumably because the nonrepeating (form an
|
||
initial seed/start) nature makes repeating experiments
|
||
impossible
|
||
+ Blum-Blum-Shub
|
||
+ How it Works
|
||
- "The Blum-Blum-Shub PRNG is really very simple.
|
||
There is source floating around on the crypto ftp
|
||
sites, but it is a set of scripts for the Unix bignum
|
||
calculator "bc", plus some shell scripts, so it is
|
||
not very portable.
|
||
|
||
"To create a BBS RNG, choose two random primes p and
|
||
q which are congruent to 3 mod 4. Then the RNG is
|
||
based on the iteration x = x*x mod n. x is
|
||
initialized as a random seed. (x should be a
|
||
quadratic residue, meaning that it is the square of
|
||
some number mod n, but that can be arranged by
|
||
iterating the RNG once before using its output.)"
|
||
[Hal Finney, 1994-05-14]
|
||
- Look for blum-blum-shub-strong-randgen.shar and related
|
||
files in pub/crypt/other at ripem.msu.edu. (This site
|
||
is chock-full of good stuff. Of course, only Americans
|
||
are allowed to use these random number generators, and
|
||
even they face fines of $500,000 and imprisonment for
|
||
up to 5 years for inappopriate use of random numbers.)
|
||
- source code at ripem ftp site
|
||
- "If you don't need high-bandwidth randomness, there are
|
||
several good PRNG, but none of them run fast. See the
|
||
chapter on PRNG's in "Cryptology and Computational
|
||
Number Theory"." [Eric Hughes, 1994-04-14]
|
||
+ "What about hardware random number generators?"
|
||
+ Chips are available
|
||
-
|
||
+ "Hughes Aircraft also offers a true non-deterministic
|
||
chip (16 pin DIP).
|
||
- For more info contact me at kephart@sirena.hac.com"
|
||
<7 April 94, sci.crypt>
|
||
+ "Should RNG hardware be a Cypherpunks project?"
|
||
- Probably not, but go right ahead. Half a dozen folks
|
||
have gotten all fired up about this, proposed a project-
|
||
-then let it drop.
|
||
- can use repeated applications of a cryptographic has
|
||
function to generate pretty damn good PRNs (the RSAREF
|
||
library has hooks for this)
|
||
+ "I need a pretty good random number generator--what
|
||
should I use?"
|
||
- "While Blum-Blum-Shub is probably the cool way to go,
|
||
RSAREF uses repeated iterations of MD5 to generate its
|
||
pseudo-randoms, which can be reasonably secure and use
|
||
code you've probably already got hooks from perl
|
||
for.[BillStewart,1994-04-15]
|
||
+ Libraries
|
||
- Scheme code: ftp://ftp.cs.indiana.edu/pub/scheme-
|
||
repository/scm/rand.scm
|
||
+ P and NP and all that jazz
|
||
- complexity, factoring,
|
||
+ can quantum mechanics help?
|
||
- probably not
|
||
+ Certification Authorities
|
||
- heierarchy vs. distributed web of trust
|
||
- in heierarchy, individual businesses may set themselves
|
||
up as CAs, as CommerceNet is talking about doing
|
||
+ Or, scarily, the governments of the world may insist that
|
||
they be "in the loop"
|
||
- several ways to do this: legal system invocation, tax
|
||
laws, national security....I expect the legal system to
|
||
impinge on CAs and hence be the main way that CAs are
|
||
partnered with the government
|
||
- I mention this to give people some chance to plan
|
||
alternatives, end-runs
|
||
- This is one of the strongest reasons to support the
|
||
decoupling of software from use (that is, to reject the
|
||
particular model RSADSI is now using)
|
||
5.4.16. Randomness
|
||
- A confusing subject to many, but also a glorious subject
|
||
(ripe with algorithms, with deep theory, and readily
|
||
understandable results).
|
||
+ Bill Stewart had a funny comment in sci.crypt which also
|
||
shows how hard it is to know if something's really random
|
||
or not: "I can take a simple generator X[i] = DES( X[i-1],
|
||
K ), which will produce nice random white noise, but you
|
||
won't be able to see that it's non-random unless you rent
|
||
time on NSA's DES-cracker." [B.S. 1994-09-06]
|
||
- In fact, many seemingly random strings are actually
|
||
"cryptoregular": they are regular, or nonrandom, as soon
|
||
as one uses the right key. Obviously, most strings used
|
||
in crypto are cryptoregular in that they _appear_ to be
|
||
random, and pass various randomness measures, but are
|
||
not.
|
||
+ "How can the randomness of a bit string be measured?"
|
||
- It can roughly be estimated by entropy measures, how
|
||
compressible it is (by various compression programs),
|
||
etc.
|
||
- It's important to realize that measures of randomness
|
||
are, in a sense, "in the eye of the beholder"--there just
|
||
is no proof that a string is random...there's always room
|
||
for cleverness, if you will
|
||
+ Chaitin-Kolmogoroff complexity theory makes this clearer.
|
||
To use someone else's words:
|
||
- "Actually, it can't be done. The consistent measure of
|
||
entropy for finite objects like a string or a (finite)
|
||
series of random numbers is the so-called ``program
|
||
length complexity''. This is defined as the length of
|
||
the shortest program for some given universal Turing
|
||
machine
|
||
which computes the string. It's consistent in the
|
||
sense that it has the familiar properties of
|
||
``ordinary'' (Shannon) entropy. Unfortunately, it's
|
||
uncomputable: there's no algorithm which, given an
|
||
arbitrary finite string S, computes the program-length
|
||
complexity of S.
|
||
|
||
Program-length complexity is well-studied in the
|
||
literature. A good introductory paper is ``A Theory of
|
||
Program Size Formally Identical to Information Theory''
|
||
by G. J. Chaitin, _Journal of the ACM_, 22 (1975)
|
||
reprinted in Chaitin's book _Information Randomness &
|
||
Incompleteness_, World Scientific Publishing Co.,
|
||
1990." [John E. Kreznar, 1993-12-02]
|
||
+ "How can I generate reasonably random numbers?"
|
||
- I say "reasonably" becuae of the point above: no number
|
||
or sequence is provably "random." About the best that can
|
||
be said is that a number of string is the reuslt of a
|
||
process we call "random." If done algorithimically, and
|
||
deterministically, we call this process "pseudo-random."
|
||
(And pseudorandom is usually more valuable than "really
|
||
random" because we want to be able to generate the same
|
||
sequence repeatedly, to repeat experiments, etc.)
|
||
5.4.17. Other crypto and hash programs
|
||
+ MDC, a stream cipher
|
||
- Peter Gutman, based on NIST Secure Hash Algorithm
|
||
- uses longer keys than IDEA, DES
|
||
- MD5
|
||
- Blowfish
|
||
- DolphinEncrypt
|
||
5.4.18. RSA strength
|
||
- casual grade, 384 bits, 100 MIPS-years (Paul Leyland, 3-31-
|
||
94)
|
||
- RSA-129, 425 bits, 4000 MIPS-years
|
||
- 512 bits...20,000 MIPS-years
|
||
- 1024 bits...
|
||
5.4.19. Triple DES
|
||
- "It involves three DES cycles, in encrypt-decrypt-encrypt
|
||
order. THe keys used may be either K1/K2/K3 or K1/K2/K1.
|
||
The latter is sometimes caled "double-DES". Combining
|
||
two DES operations like this requires twice as much work to
|
||
break as one DES, and a lot more storage. If you have the
|
||
storage, it just adds one bit to the effective key size. "
|
||
[Colin Plumb, colin@nyx10.cs.du.edu, sci.crypt, 4-13-94]
|
||
5.4.20. Tamper-resistant modules (TRMs) (or tamper-responding)
|
||
+ usually "tamper-indicating", a la seals
|
||
- very tough to stop tampering, but relatively easy to see
|
||
if seal has been breached (and then not restored
|
||
faithfully)
|
||
- possession of the "seal" is controlled...this is the
|
||
historical equivalent to the "private key" in a digital
|
||
signature system, with the technological difficulty of
|
||
forging the seal being the protection
|
||
+ usually for crypto. keys and crypto. processing
|
||
- nuclear test monitoring
|
||
- smart cards
|
||
- ATMs
|
||
+ one or more sensors to detect intrusion
|
||
- vibration (carborundum particles)
|
||
- pressure changes (a la museum display cases)
|
||
- electrical
|
||
- stressed-glass (Corning, Sandia)
|
||
+ test ban treaty verification requires this
|
||
- fiber optic lines sealing a missile...
|
||
- scratch patterns...
|
||
- decals....
|
||
+ Epoxy resins
|
||
- a la Intel in 1970s (8086)
|
||
+ Lawrence Livermore: "Connoisseur Project"
|
||
- gov't agencies using this to protect against reverse
|
||
engineering, acquisition of keys, etc.
|
||
+ can't stop a determined effort, though
|
||
- etches, solvents, plasma ashing, etc.
|
||
- but can cause cost to be very high (esp. if resin
|
||
formula is varied frequently, so that "recipe" can't be
|
||
logged)
|
||
+ can use clear epoxy with "sparkles" in the epoxy and
|
||
careful 2-position photography used to record pattern
|
||
- perhaps with a transparent lid?
|
||
+ fiber optic seal (bundle of fibers, cut)
|
||
- bundle of fibers is looped around device, then sealed and
|
||
cut so that about half the fibers are cut; the pattern of
|
||
lit and
|
||
unlit fibers is a signature, and is extremely difficult
|
||
to reproduce
|
||
- nanotechnology may be used (someday)
|
||
5.4.21. "What are smart cards?"
|
||
- Useful for computer security, bank transfers (like ATM
|
||
cards), etc.
|
||
- may have local intelligence (this is the usual sense)
|
||
- microprocessors, observor protocol (Chaum)
|
||
+ Smart cards and electronic funds transfer
|
||
- Tamper-resistant modules
|
||
+ Security of manufacturing
|
||
- some variant of "cut-and-choose" inspection of
|
||
premises
|
||
+ Uses of smart cards
|
||
- conventional credit card uses
|
||
- bill payment
|
||
- postage
|
||
- bridge and road tolls
|
||
- payments for items received electronically (not
|
||
necessarily anonymously)
|
||
|
||
5.5. Cryptology-Technical, Mathematical
|
||
5.5.1. Historical Cryptography
|
||
+ Enigma machines
|
||
- cracked by English at Bletchley Park
|
||
- a secret until mid-1970s
|
||
+ U.K. sold hundreds of seized E. machines to embassies,
|
||
governments, even corporations, in late 1940s, early
|
||
1950s
|
||
- could then crack what was being said by allies
|
||
+ Hagelin, Boris (?)
|
||
- U.S. paid him to install trapdoors, says Kahn
|
||
+ his company, Crypto A.G., was probably an NSA front
|
||
company
|
||
- Sweden, then U.S., then Sweden, then Zug
|
||
- rotor systems cracked
|
||
5.5.2. Public-key Systems--HISTORY
|
||
+ Inman has admitted that NSA had a P-K concept in 1966
|
||
- fits with Dominik's point about sealed cryptosystem boxes
|
||
with no way to load new keys
|
||
- and consistent with NSA having essentially sole access to
|
||
nation's top mathematicians (until Diffies and Hellmans
|
||
foreswore government funding, as a result of the anti-
|
||
Pentagon feelings of the 70s)
|
||
- Merkle's "puzzle" ideas, circa mid-70s
|
||
- Diffie and Hellman
|
||
- Rivest, Shamir, and Adleman
|
||
5.5.3. RSA and Alternatives to RSA
|
||
+ RSA and other P-K patents are strangling development and
|
||
dissemination of crypto systems
|
||
- perhaps out of marketing stupidity, perhaps with the help
|
||
of the government (which has an interest in keeping a
|
||
monopoly on secure encryption)
|
||
+ One-way functions and "deposit-only envelopes"
|
||
- one-way functions
|
||
- deposit-only envelopes: allow additions to envelopes and
|
||
only addressee can open
|
||
- hash functions are easy to implement one-way functions
|
||
(with no need for an inverse)
|
||
5.5.4. Digital Signatures
|
||
+ Uses of Digital Signatures
|
||
- Electronic Contracts
|
||
- Voting
|
||
- Checks and other financial instruments (similar to
|
||
contracts)
|
||
- Date-stamped Transactions (augmenting Notary Publics)
|
||
- Undeniable digital signatures
|
||
+ Unforgeable signatures, even with unlimited computational
|
||
power, can be achieved if the population is limited (a
|
||
finite set of agents)
|
||
- using an untraceable sending protocol, such as "the
|
||
Dining Cryptographers Problem" of Chaum
|
||
5.5.5. Randomness and incompressibility
|
||
+ best definition we have is due to Chaitin and Kolmogoroff:
|
||
a string or any structure is "random" if it has no shorter
|
||
description of itself than itself.
|
||
- (Now even specific instances of "randomly generated
|
||
strings" sometimes will be compressible--but not very
|
||
often. Cf. the works of Chaitin and others for more on
|
||
these sorts of points.)
|
||
5.5.6. Steganography: Methods for Hiding the Mere Existence of
|
||
Encrypted Data
|
||
+ in contrast to the oft-cited point (made by crypto purists)
|
||
that one must assume the opponent has full access to the
|
||
cryptotext, some fragments of decrypted plaintext, and to
|
||
the algorithm itself, i.e., assume the worst
|
||
- a condition I think is practically absurd and unrealistic
|
||
- assumes infinite intercept power (same assumption of
|
||
infinite computer power would make all systems besides
|
||
one-time pads breakable)
|
||
- in reality, hiding the existence and form of an encrypted
|
||
message is important
|
||
+ this will be all the more so as legal challenges to
|
||
crypto are mounted...the proposed ban on encrypted
|
||
telecom (with $10K per day fine), various governmental
|
||
regulations, etc.
|
||
- RICO and other broad brush ploys may make people very
|
||
careful about revealing that they are even using
|
||
encryption (regardless of how secure the keys are)
|
||
+ steganography, the science of hiding the existence of
|
||
encrypted information
|
||
- secret inks
|
||
- microdots
|
||
- thwarting traffic analysis
|
||
- LSB method
|
||
+ Packing data into audio tapes (LSB of DAT)
|
||
+ LSB of DAT: a 2GB audio DAT will allow more than 100
|
||
megabytes in the LSBs
|
||
- less if algorithms are used to shape the spectrum to
|
||
make it look even more like noise
|
||
- but can also use the higher bits, too (since a real-
|
||
world recording will have noise reaching up to perhaps
|
||
the 3rd or 4th bit)
|
||
+ will manufacturers investigate "dithering" circuits?
|
||
(a la fat zero?)
|
||
- but the race will still be on
|
||
+ Digital video will offer even more storage space (larger
|
||
tapes)
|
||
- DVI, etc.
|
||
- HDTV by late 1990s
|
||
+ Messages can be put into GIFF, TIFF image files (or even
|
||
noisy faxes)
|
||
- using the LSB method, with a 1024 x 1024 grey scale image
|
||
holding 64KB in the LSB plane alone
|
||
- with error correction, noise shaping, etc., still at
|
||
least 50KB
|
||
- scenario: already being used to transmit message through
|
||
international fax and image transmissions
|
||
+ The Old "Two Plaintexts" Ploy
|
||
- one decoding produces "Having a nice time. Wish you were
|
||
here."
|
||
- other decoding, of the same raw bits, produces "The last
|
||
submarine left this morning."
|
||
- any legal order to produce the key generates the first
|
||
message
|
||
+ authorities can never prove-save for torture or an
|
||
informant-that another message exists
|
||
- unless there are somehow signs that the encrypted
|
||
message is somehow "inefficiently encrypted, suggesting
|
||
the use of a dual plaintext pair method" (or somesuch
|
||
spookspeak)
|
||
- again, certain purist argue that such issues (which are
|
||
related to the old "How do you know when to stop?"
|
||
question) are misleading, that one must assume the
|
||
opponent has nearly complete access to everything except
|
||
the actual key, that any scheme to combine multiple
|
||
systems is no better than what is gotten as a result of
|
||
the combination itself
|
||
- and just the overall bandwidth of data...
|
||
+ Several programs exist:
|
||
- Stego
|
||
- etc. (described elsewhere)
|
||
5.5.7. The Essential Impossibility of Breaking Modern Ciphers and
|
||
Codes
|
||
- this is an important change from the past (and from various
|
||
thriller novels that have big computers cracking codes)
|
||
- granted, "unbreakable" is a misleading term
|
||
+ recall the comment that NSA has not really broken any
|
||
Soviet systems in many years
|
||
- except for the cases, a la the Walker case, where
|
||
plaintext versions are gotten, i.e., where human screwups
|
||
occurred
|
||
- the image in so many novels of massive computers breaking
|
||
codes is absurd: modern ciphers will not be broken (but the
|
||
primitive ciphers used by so many Third World nations and
|
||
their embassies will continue to be child's play, even for
|
||
high school science fair projects...could be a good idea
|
||
for a small scene, about a BCC student who has his project
|
||
pulled)
|
||
+ But could novel computational methods crack these public
|
||
key ciphers?
|
||
+ some speculative candidates
|
||
+ holographic computers, where large numbers are
|
||
factored-or at least the possibilities are somehown
|
||
narrowed-by using arrays that (somehow) represent the
|
||
numbers to be factored
|
||
- perhaps with diffraction, channeling, etc.
|
||
- neural networks and evolutionary systems (genetic
|
||
algorithms)
|
||
- the idea is that somehow the massive computations can be
|
||
converted into something that is inherently parallel
|
||
(like a crystal)
|
||
+ hyperspeculatively: finding the oracle for these problems
|
||
using nonconventional methods such as ESP and lucid
|
||
dreaming
|
||
- some groups feel this is worthwhile
|
||
5.5.8. Anonymous Transfers
|
||
- Chaum's digital mixes
|
||
- "Dining Cryptographers"
|
||
+ can do it with exchanged diskettes, at a simple level
|
||
- wherein each person can add new material
|
||
+ Alice to Bob to Carol....Alice and Carol can conspire to
|
||
determine what Bob had added, but a sufficient "mixing"
|
||
of bits and pieces is possible such that only if
|
||
everybody conspires can one of the participants be caught
|
||
- perhaps the card-shuffling results?
|
||
+ may become common inside compute systems...
|
||
- by this vague idea I mean that various new OS protocols
|
||
may call for various new mechanisms for exchanging
|
||
information
|
||
5.5.9. Miscellaneous Abstract Ideas
|
||
- can first order logic predicates be proven in zero
|
||
knowledge?
|
||
- Riemannn hypothesis
|
||
+ P = NP?
|
||
- would the universe change?
|
||
- Smale has shown that if the squares have real numbers in
|
||
them, as opposed to natural numbers (integers), then P =
|
||
NP; perhaps this isn't surprising, as a real implies sort
|
||
of a recursive descent, with each square having unlimited
|
||
computer power
|
||
+ oracles
|
||
- speculatively, a character asks if Tarot cards, etc.,
|
||
could be used (in addition to the normal idea that such
|
||
devices help psychologically)
|
||
- "a cascade of changes coming in from hundreds of
|
||
decimal places out"
|
||
+ Quantum cryptography
|
||
- bits can be exchanged-albeit at fairly low
|
||
efficiencies-over a channel
|
||
- with detection of taps, via the change of polarizations
|
||
+ Stephen Wiesner wrote a 1970 paper, half a decade before
|
||
the P-K work, which outlined this-not published until
|
||
much later
|
||
- speculate that the NSA knew about this and quashed the
|
||
publication
|
||
+ But could novel computational methods crack these public
|
||
key ciphers?
|
||
+ some speculative candidates
|
||
+ holographic computers, where large numbers are
|
||
factored-or at least the possibilities are somehown
|
||
narrowed-by using arrays that (somehow) represent the
|
||
numbers to be factored
|
||
- perhaps with diffraction, channeling, etc.
|
||
- neural networks and evolutionary systems (genetic
|
||
algorithms)
|
||
- the idea is that somehow the massive computations can be
|
||
converted into something that is inherently parallel
|
||
(like a crystal)
|
||
+ hyperspeculatively: finding the oracle for these problems
|
||
using nonconventional methods such as ESP and lucid
|
||
dreaming
|
||
- some groups feel this is worthwhile
|
||
- links to knot theory
|
||
- "cut and choose" protocols (= zero knowledge)
|
||
+ can a "digital coin" be made?
|
||
- this is formally similar to the idea of an active agent
|
||
that is unforgeable, in the sense that the agent or coin
|
||
is "standalone"
|
||
+ bits can always be duplicated (unless tied to hardware,
|
||
as with TRMs), so must look elsewhere
|
||
+ could tie the bits to a specific location, so that
|
||
duplication would be obvious or useless
|
||
- the idea is vaguely that an agent could be placed in
|
||
some location...duplications would be both detectable
|
||
and irrelevant (same bits, same behavior,
|
||
unmodifiable because of digital signature)
|
||
+ coding theory and cryptography at the "Discrete
|
||
Mathematics"
|
||
- http://www.win.tue.nl/win/math/dw/index.html
|
||
5.5.10. Tamper-resistant modules (TRMs) (or tamper-responding)
|
||
+ usually "tamper-indicating", a la seals
|
||
- very tough to stop tampering, but relatively easy to see
|
||
if seal has been breached (and then not restored
|
||
faithfully)
|
||
- possession of the "seal" is controlled...this is the
|
||
historical equivalent to the "private key" in a digital
|
||
signature system, with the technological difficulty of
|
||
forging the seal being the protection
|
||
+ usually for crypto. keys and crypto. processing
|
||
- nuclear test monitoring
|
||
- smart cards
|
||
- ATMs
|
||
+ one or more sensors to detect intrusion
|
||
- vibration (carborundum particles)
|
||
- pressure changes (a la museum display cases)
|
||
- electrical
|
||
- stressed-glass (Corning, Sandia)
|
||
+ test ban treaty verification requires this
|
||
- fiber optic lines sealing a missile...
|
||
- scratch patterns...
|
||
- decals....
|
||
+ Epoxy resins
|
||
- a la Intel in 1970s (8086)
|
||
+ Lawrence Livermore: "Connoisseur Project"
|
||
- gov't agencies using this to protect against reverse
|
||
engineering, acquisition of keys, etc.
|
||
+ can't stop a determined effort, though
|
||
- etches, solvents, plasma ashing, etc.
|
||
- but can cause cost to be very high (esp. if resin
|
||
formula is varied frequently, so that "recipe" can't be
|
||
logged)
|
||
+ can use clear epoxy with "sparkles" in the epoxy and
|
||
careful 2-position photography used to record pattern
|
||
- perhaps with a transparent lid?
|
||
+ fiber optic seal (bundle of fibers, cut)
|
||
- bundle of fibers is looped around device, then sealed and
|
||
cut so that about half the fibers are cut; the pattern of
|
||
lit and
|
||
unlit fibers is a signature, and is extremely difficult
|
||
to reproduce
|
||
- nanotechnology may be used (someday)
|
||
|
||
5.6. Crypto Programs and Products
|
||
5.6.1. PGP, of course
|
||
- it's own section, needless to say
|
||
5.6.2. "What about hardware chips for encryption?"
|
||
- Speed can be gotten, for sure, but at the expense of
|
||
limiting the market dramatically. Good for military uses,
|
||
not so good for civilian uses (especially as most civilians
|
||
don't have a need for high speeds, all other things being
|
||
equal).
|
||
5.6.3. Carl Ellison's "tran" and mixing various ciphers in chains
|
||
- "tran.shar is available at ftp.std.com:/pub/cme
|
||
- des | tran | des | tran | des
|
||
- to make the job of the attacker much harder, and to make
|
||
differential cryptanalyis harder
|
||
- "it's in response to Eli's paper that I advocated prngxor,
|
||
as in:
|
||
des | prngxor | tran | des | tran | des
|
||
with the DES instances in ECB mode (in acknowledgement of
|
||
Eli's attack). The prngxor destroys any patterns from the
|
||
input, which was the purpose of CBC, without using the
|
||
feedback path which Eli exploited."[ Carl Ellison, 1994-07-
|
||
15]
|
||
5.6.4. The Blum-Blum-Shub RNG
|
||
- about the strongest algorithmic RNG we know of, albeit slow
|
||
(if they can predict the next bit of BBS, they can break
|
||
RSA, so....
|
||
- ripem.msu.edu:/pub/crypt/other/blum-blum-shub-strong-
|
||
randgen.shar
|
||
5.6.5. the Blowfish cipher
|
||
+ BLOWFISH.ZIP, written by Bruce Schneier,1994. subject of an
|
||
article in Dr. Dobb's Journal:
|
||
- ftp.dsi.unimi.it:/pub/security/crypt/code/schneier-
|
||
blowfish.c.gz
|
||
|
||
5.7. Related Ideas
|
||
5.7.1. "What is "blinding"?"
|
||
+ This is a basic primitive operation of most digital cash
|
||
systems. Any good textbook on crypto should explain it, and
|
||
cover the math needed to unerstand it in detail. Several
|
||
people have explained it (many times) on the list; here's a
|
||
short explanation by Karl Barrus:
|
||
- "Conceptually, when you blind a message, nobody else can
|
||
read it. A property about blinding is that under the
|
||
right circumstances if another party digitally signs a
|
||
blinded message, the unblinded message will contain a
|
||
valid digital signature.
|
||
|
||
"So if Alice blinds the message "I owe Alice $1000" so
|
||
that it reads (say) "a;dfafq)(*&" or whatever, and Bob
|
||
agrees to sign this message, later Alice can unblind the
|
||
message Bob signed to retrieve the original. And Bob's
|
||
digital signature will appear on the original, although
|
||
he didn't sign the original directly.
|
||
|
||
"Mathematically, blinding a message means multiplying it
|
||
by a number (think of the message as being a number).
|
||
Unblinding is simply dividing the original blinding
|
||
factor out." [Karl Barrus, 1993-08-24]
|
||
+ And another explanation by Hal Finney, which came up in the
|
||
context of how to delink pharmacy prescriptions from
|
||
personal identity (fears of medial dossiers(:
|
||
- "Chaum's "blinded credential" system is intended to solve
|
||
exactly this kind of problem, but it requires an
|
||
extensive infrastructure. There has to be an agency
|
||
where you physically identify yourself. It doesn't have
|
||
to know anything about you other than some physical ID
|
||
like fingerprints. You and it cooperate to create
|
||
pseudonyms of various classes, for example, a "go to the
|
||
doctor" pseudonym, and a "go to the pharmacy" pseudonym.
|
||
These pseudonyms have a certain mathematical relationship
|
||
which allows you to re-blind credentials written to one
|
||
pseudonym to apply to any other. But the agency uses
|
||
your physical ID to make sure you only get one pseudonym
|
||
of each kind....So, when the doctor gives you a
|
||
prescription, that is a credential applied to your "go to
|
||
the doctor" pseudonym. (You can of course also reveal
|
||
your real name to the doctor if you want.) Then you show
|
||
it at the pharmacy using your "go to the pharmacy"
|
||
pseudonym. The credential can only be shown on this one
|
||
pseudonym at the pharamacy, but it is unlinkable to the
|
||
one you got at the doctor's. " [Hal Finney, 1994-09-07]
|
||
5.7.2. "Crypto protocols are often confusing. Is there a coherent
|
||
theory of these things?"
|
||
- Yes, crypto protocols are often expressed as scenarios, as
|
||
word problems, as "Alice and Bob and Eve" sorts of
|
||
complicated interaction protocols. Not exactly game theory,
|
||
not exactly logic, and not exactly anything else in
|
||
particular...its own area.
|
||
- Expert systems, proof-of-correctness calculi, etc.
|
||
- spoofing, eavesdropping, motivations, reputations, trust
|
||
models
|
||
+ In my opinion, much more work is needed here.
|
||
- Graphs, agents, objects, capabilities, goals, intentions,
|
||
logic
|
||
- evolutionary game theory, cooperation, defection, tit-for-
|
||
tat, ecologies, economies
|
||
- mostly ignored, to date, by crypto community
|
||
5.7.3. The holder of a key *is* the person, basically
|
||
- that's the bottom line
|
||
- those that worry about this are free to adopt stronger,
|
||
more elaborate systems (multi-part, passphrases, biometric
|
||
security, limits on account access, etc.)
|
||
- whoever has a house key is essentially able to gain access
|
||
(not saying this is the legal situation, but the practical
|
||
one)
|
||
5.7.4. Strong crypto is helped by huge increases in processor power,
|
||
networks
|
||
+ Encryption *always wins out* over cryptanalysis...gap grows
|
||
greater with time
|
||
- "the bits win"
|
||
+ Networks can hide more bits...gigabits flowing across
|
||
borders, stego, etc.
|
||
- faster networks mean more "degrees of freedom," more
|
||
avenues to hide bits in, exponentially increasing efforts
|
||
to eavesdrop and track
|
||
- (However, these additional degrees of freedome can mean
|
||
greater chances for slipping up and leaving clues that
|
||
allow correlation. Complexity can be a problem.)
|
||
+ "pulling the plug" hurts too much...shuts down world
|
||
economy to stop illegal bits ("naughty bits"?)
|
||
- one of the main goals is to reach the "point of no
|
||
return," beyond which pulling the plug hurts too much
|
||
- this is not to say they won't still pull the plug, damage
|
||
be damned
|
||
5.7.5. "What is the "Diffie-Hellman" protocol and why is it
|
||
important?"
|
||
+ What it is
|
||
- Diffie-Hellman, first described in 1976, allows key
|
||
exchange over insecure channels.
|
||
+ Steve Bellovin was one of several people to explaine D-H
|
||
to the list (every few months someone does!). I'm
|
||
including his explanation, despite its length, to help
|
||
readers who are not cryptologists get some flavor of the
|
||
type of math involved. The thing to notice is the use of
|
||
*exponentiations* and *modular arithmetic* (the "clock
|
||
arithmetic" of our "new math" childhoods, except with
|
||
really, really big numbers!). The difficulty of inverting
|
||
the exponention (the discrete log problem) is what makes
|
||
this a cryptographically interesting approach.
|
||
- "The basic idea is simple. Pick a large number p
|
||
(probably a prime), and a base b that is a generator of
|
||
the group of integers modulo p. Now, it turns out that
|
||
given a known p, b, and (b^x) mod p, it's extremely
|
||
hard to find out x. That's known as the discrete log
|
||
problem.
|
||
|
||
"Here's how to use it. Let two parties, X and Y, pick
|
||
random numbers x and y, 1 < x,y < p. They each
|
||
calculate
|
||
|
||
(b^x) mod p
|
||
|
||
and
|
||
|
||
(b^y) mod p
|
||
|
||
and transmit them to each other. Now, X knows x and
|
||
(b^y) mod p, so s/he can calculate (b^y)^x mod p =
|
||
(b^(xy)) mod p. Y can do the same calculation. Now
|
||
they both know (b^(xy)) mod p. But eavesdroppers know
|
||
only (b^x) mod p and (b^y) mod p, and can't use those
|
||
quantities to recover the shared secret. Typically, of
|
||
course, X and Y will use that shared secret as a key to
|
||
a conventional cryptosystem.
|
||
|
||
"The biggest problem with the algorithm, as outlined
|
||
above, is that there is no authentication. An attacker
|
||
can sit in the middle and speak that protocol to each
|
||
legitimate party.
|
||
|
||
"One last point -- you can treat x as a secret key, and
|
||
publish
|
||
(b^X) mod p as a public key. Proof is left as an
|
||
exercise for
|
||
the reader." [Steve Bellovin, 1993-07-17]
|
||
- Why it's important
|
||
+ Using it
|
||
+ Matt Ghio has made available Phil Karn's program for
|
||
generating numbers useful for D-H:
|
||
- ftp cs.cmu.edu:
|
||
/afs/andrew.cmu.edu/usr12/mg5n/public/Karn.DH.generator
|
||
+ Variants and Comments
|
||
+ Station to Station protocol
|
||
- "The STS protocol is a regular D-H followed by a
|
||
(delicately designed) exchange of signatures on the key
|
||
exchange parameters. The signatures in the second
|
||
exchange that they can't be separated from the original
|
||
parameters.....STS is a well-thought out protocol, with
|
||
many subtleties already arranged for. For the issue at
|
||
hand, though, which is Ethernet sniffing, it's
|
||
authentication aspects are not required now, even
|
||
though they certainly will be in the near future."
|
||
[Eric Hughes, 1994-02-06]
|
||
5.7.6. groups, multiple encryption, IDEA, DES, difficulties in
|
||
analyzing
|
||
5.7.7. "Why and how is "randomness" tested?"
|
||
- Randomness is a core concept in cryptography. Ciphers often
|
||
fail when things are not as random as designers thought
|
||
they would be.
|
||
- Entropy, randomness, predictablility. Can never actually
|
||
_prove_ a data set is random, though one can be fairly
|
||
confident (cf. Kolmogorov-Chaitin complexity theory).
|
||
- Still, tricks can make a random-looking text block look
|
||
regular....this is what decryption does; such files are
|
||
said to be cryptoregular.
|
||
+ As to how much testing is needed, this depends on the use,
|
||
and on the degree of confidence needed. It may take
|
||
millions of test samples, or even more, to establish
|
||
randomness in set of data. For example:
|
||
- "The standard tests for 'randomness' utilized in govt
|
||
systems requires 1X10^6 samples. Most of the tests are
|
||
standard probability stuff and some are classified. "
|
||
[Wray Kephart, sci.crypt, 1994-08-07]
|
||
- never assume something is really random just becuase it
|
||
_looks_ random! (Dynamic Markov compressors can find
|
||
nonrandomness quickly.)
|
||
5.7.8. "Is it possible to tell if a file is encrypted?"
|
||
- Not in general. Undecideability and all that. (Can't tell
|
||
in general if a virus exists in code, Adleman showed, and
|
||
can't tell in general if a file is encrypted, compressed,
|
||
etc. Goes to issues of what we mean by encrypted or
|
||
compressed.)
|
||
+ Sometimes we can have some pretty clear signals:
|
||
- headers are attached
|
||
- other characteristic signs
|
||
- entropy per character
|
||
+ But files encrypted with strong methods typically look
|
||
random; in fact, randomness is closely related to
|
||
encyption.
|
||
+ regularity: all symbols represented equally, in all bases
|
||
(that is, in doubles, triples, and all n-tuples)
|
||
- "cryptoregular" is the term: file looks random
|
||
(regular) until proper key is applied, then the
|
||
randomness vaDCharles Bennett, "Physics of Computation
|
||
Workshop," 1993]
|
||
- "entropy" near the maximum (e.g., near 6 or 7 bits per
|
||
character, whereas ordinary English has roughly 1.5-2
|
||
bits per character of entropy)
|
||
5.7.9. "Why not use CD-ROMs for one-time pads?"
|
||
- The key distribution problem, and general headaches. Theft
|
||
or compromise of the keying material is of course the
|
||
greatest threat.
|
||
- And one-time pads, being symmetric ciphers, give up the
|
||
incredible advantages of public key methods.
|
||
- "CD ROM is a terrible medium for the OTP key stream.
|
||
First, you want exactly two copies of the random stream.
|
||
CD ROM has an economic advantage only for large runs.
|
||
Second, you want to destroy the part of the stream already
|
||
used. CD ROM has no erase facilities, outside of physical
|
||
destruction of the entire disk." [Bryan G. Olson,
|
||
sci.crypt, 1994-08-31]
|
||
- If you have to have a one-time pad, a DAT makes more sense;
|
||
cheap, can erase the bits already used, doesn't require
|
||
pressing of a CD, etc. (One company claims to be selling CD-
|
||
ROMs as one-time pads to customers...the security problems
|
||
here should be obvious to all.)
|
||
|
||
5.8. The Nature of Cryptology
|
||
5.8.1. "What are the truly basic, core, primitive ideas of
|
||
cryptology, crypto protocols, crypto anarchy, digital cash,
|
||
and the things we deal with here?"
|
||
- I don't just mean things like the mechanics of encryption,
|
||
but more basic conceptual ideas.
|
||
5.8.2. Crypto is about the creation and linking of private spaces...
|
||
5.8.3. The "Core" Ideas of Cryptology and What we Deal With
|
||
- Physics has mass, energy, force, momentum, angular
|
||
momentum, gravitation, friction, the Uncertainty Principle,
|
||
Complementarity, Least Action, and a hundred other such
|
||
concepts and prinicples, some more basic than others. Ditto
|
||
for any other field.
|
||
+ It seems to many of us that crypto is part of a larger
|
||
study of core ideas involving: identity, proof, complexity,
|
||
randomness, reputations, cut-and-choose protocols, zero
|
||
knowledge, etc. In other words, the buzzwords.
|
||
- But which of these are "core" concepts, from which others
|
||
are derived?
|
||
- Why, for example, do the "cut-and-choose" protocols work
|
||
so well, so fairly? (That they do has been evident for a
|
||
long time, and they literally are instances of Solomonic
|
||
wisdom. Game theory has explanations in terms of payoff
|
||
matrices, Nash equilibria, etc. It seems likely to me
|
||
that the concepts of crypto will be recast in terms of a
|
||
smaller set of basic ideas taken from these disparate
|
||
fields of economics, game theory, formal systems, and
|
||
ecology. Just my hunch.)
|
||
+ statements, assertions, belief, proof
|
||
- "I am Tim"
|
||
+ possession of a key to a lock is usually treated as proof
|
||
of...
|
||
- not always, but that's the default assumption, that
|
||
someone who unlocks a door is one of the proper
|
||
people..access privileges, etc.
|
||
5.8.4. We don't seem to know the "deep theory" about why certain
|
||
protocols "work." For example, why is "cut-and-choose," where
|
||
Alice cuts and Bob chooses (as in fairly dividing a pie),
|
||
such a fair system? Game theory has a lot to do with it.
|
||
Payoff matrices, etc.
|
||
- But many protocols have not been fully studied. We know
|
||
they work, but I think we don't know fully why they work.
|
||
(Maybe I'm wrong here, but I've seen few papers looking at
|
||
these issues in detail.)
|
||
- Economics is certainly crucial, and tends to get overlooked
|
||
in analysis of crypto protocols....the various "Crypto
|
||
Conference Proceedings" papers typically ignore economic
|
||
factors (except in the area of measuring the strength of a
|
||
system in terms of computational cost to break).
|
||
- "All crypto is economics."
|
||
- We learn what works, and what doesn't. My hunch is that
|
||
complex crypto systems will have emergent behaviors that
|
||
are discovered only after deployment, or good simulation
|
||
(hence my interest in "protocol ecologies").
|
||
5.8.5. "Is it possible to create ciphers that are unbreakable in any
|
||
amount of time with any amount of computer power?"
|
||
+ Information-theoretically secure vs. computationally-secure
|
||
+ not breakable even in principle, e.g., a one-time pad
|
||
with random characters selected by a truly random process
|
||
(die tosses, radioactive decay, certain types of noise,
|
||
etc.)
|
||
- and ignoring the "breakable by break-ins" approach of
|
||
stealing the one-time pad, etc. ("Black bag
|
||
cryptography")
|
||
- not breakable in "reasonable" amounts of time with
|
||
computers
|
||
- Of course, a one-time pad (Vernam cipher) is theoretically
|
||
unbreakable without the key. It is "information-
|
||
theoretically secure."
|
||
- RSA and similar public key algorithms are said to be only
|
||
"computationally-secure," to some level of security
|
||
dependent on modulus lenght, computer resources and time
|
||
available, etc. Thus, given enough time and enough computer
|
||
power, these ciphers are breakable.
|
||
- However, they may be practically impossible to break, given
|
||
the amount of energy in the universe.Not to split universes
|
||
here, but it is interesting to consider that some ciphers
|
||
may not be breakable in _our_ universe, in any amount of
|
||
time. Our universe presumably has some finite number of
|
||
particles (currently estimated to be 10^73 particles). This
|
||
leads to the "even if every particle were a Cray Y-MP it
|
||
would take..." sorts of thought experiments.
|
||
|
||
But I am considering _energy_ here. Ignoring reversible
|
||
computation for the moment, computations dissipate energy
|
||
(some disagree with this point). There is some uppper limit
|
||
on how many basic computations could ever be done with the
|
||
amount of free energy in the universe. (A rough calculation
|
||
could be done by calculating the energy output of stars,
|
||
stuff falling into black holes, etc., and then assuming
|
||
about kT per logical operation. This should be accurate to
|
||
within a few orders of magnitude.) I haven't done this
|
||
calculation, and won't today, but the result would likely
|
||
be something along the lines of X joules of energy that
|
||
could be harnessed for computation, resulting in Y basic
|
||
primitive computational steps.
|
||
|
||
I can then find a modulus of 3000 digits or 5000 digits, or
|
||
whatever,that takes more than this number of steps to
|
||
factor.
|
||
|
||
Caveats:
|
||
|
||
1. Maybe there are really shortcuts to factoring. Certainly
|
||
improvements in factoring methods will continue. (But of
|
||
course these improvements are not things that convert
|
||
factoring into a less than exponential-in-length
|
||
problem...that is, factoring appears to remain "hard.")
|
||
|
||
2. Maybe reversible computations (a la Landauer, Bennett,
|
||
et. al.) actually work. Maybe this means a "factoring
|
||
machine" can be built which takes a fixed, or very slowly
|
||
growing, amount of energy.
|
||
|
||
3. Maybe the quantum-mechanical idea of Shore is possible.
|
||
(I doubt it, for various reasons.)
|
||
|
||
I continue to find it useful to think of very large numbers
|
||
as creating "force fields" or "bobbles" (a la Vinge) around
|
||
data. A 5000-decimal-digit modulus is as close to being
|
||
unbreakable as anything we'll see in this universe.
|
||
|
||
5.9. Practical Crypto
|
||
5.9.1. again, this stuff is covered in many of the FAQs on PGP and
|
||
on security that are floating around...
|
||
5.9.2. "How long should crypto be valid for?"
|
||
+ That is, how long should a file remain uncrackable, or a
|
||
digital signature remain unforgeable?
|
||
- probabalistic, of course, with varying confidence levels
|
||
- depends on breakthroughs, in math and in computer power
|
||
+ Some messages may only need to be valid for a few days or
|
||
weeks. Others, for decades. Certain contracts may need to
|
||
be unforgeable for many decades. And given advances in
|
||
computer power, what appears to be a strong key today may
|
||
fail utterly by 2020 or 2040. (I'm of course not
|
||
suggesting that a 300- or 500-digit RSA modulus will be
|
||
practical by then.)
|
||
+ many people only need security for a matter of months or
|
||
so, while others may need it (or think they need it) for
|
||
decades or even for generations
|
||
- they may fear retaliation against their heirs, for
|
||
example, if certain communications were ever made
|
||
public
|
||
- "If you are signing the contract digitally, for instance,
|
||
you would want to be sure that no one could forge your
|
||
signature to change the terms after the fact -- a few
|
||
months isn't enough for such purposes, only something that
|
||
will last for fifteen or twenty years is okay." [Perry
|
||
Metzger, 1994-07-06]
|
||
5.9.3. "What about commercial encryption programs for protecting
|
||
files?"
|
||
- ViaCrypt, PGP 2.7
|
||
- Various commercial programs have existed for years (I got
|
||
"Sentinel" back in 1987-8...long since discontinued). Check
|
||
reviews in the leading magazines.
|
||
+ Kent Marsh, FolderBolt for Macs and Windows
|
||
- "The best Mac security program....is CryptoMactic by Kent
|
||
Marsh Ltd. It uses triple-DES in CBC mode, hashes an
|
||
arbitrary-length password into a key, and has a whole lot
|
||
of Mac-interface features. (The Windows equivalent is
|
||
FolderBolt for Windows, by the way.)" [Bruce Schneier,
|
||
sci.crypt, 1994-07-19]
|
||
5.9.4. "What are some practical steps to take to improve security?"
|
||
- Do you, like most of us, leave backup diskettes laying
|
||
around?
|
||
- Do you use multiple-pass erasures of disks? If not, the
|
||
bits may be recovered.
|
||
- (Either of these can compromise all encrypted material you
|
||
have, all with nothing more than a search warrant of your
|
||
premises.)
|
||
5.9.5. Picking (and remembering) passwords
|
||
- Many of the issues here also apply to choosing remailers,
|
||
etc. Things are often trickier than they seem. The
|
||
"structure" of these spaces is tricky. For example, it may
|
||
seem really sneaky (and "high entropy" to permute some
|
||
words in a popular song and use that as a pass
|
||
phrase....but this is obviously worth only a few bits of
|
||
extra entropy. Specifically, the attacker will like take
|
||
the thousand or so most popular songs, thousand or so most
|
||
popular names, slogans, speeches, etc., and then run many
|
||
permutations on each of them.
|
||
- bits of entropy
|
||
- lots of flaws, weaknesses, hidden factors
|
||
- avoid simple words, etc.
|
||
- hard to get 100 or more bits of real entropy
|
||
- As Eli Brandt puts it, "Obscurity is no substitute for
|
||
strong random numbers." [E.B., 1994-07-03]
|
||
- Cryptanalysis is a matter of deduction, of forming and
|
||
refining hypotheses. For example, the site
|
||
"bitbucket@ee.und.ac.za" is advertised on the Net as a
|
||
place to send "NSA food" to...mail sent to it gets
|
||
discarded. So , a great place to send cover traffic to, no?
|
||
No, as the NSA will mark this site for what it is and its
|
||
usefulness is blown. (Unless its usefulness is actually
|
||
something else, in which case the recursive descent has
|
||
begun.)
|
||
- Bohdan Tashchuk suggests [1994-07-04] using telephone-like
|
||
numbers, mixed in with words, to better fit with human
|
||
memorization habits; he notes that 30 or more bits of
|
||
entropy are routinely memorized this way.
|
||
5.9.6. "How can I remember long passwords or passphrases?"
|
||
- Lots of security articles have tips on picking hard-to-
|
||
guess (high entropy) passwords and passphrases.
|
||
+ Just do it.
|
||
- People can learn to memorize long sequences. I'm not good
|
||
at this, but others apparently are. Still, it seems
|
||
dangerous, in terms of forgetting. (And writing down a
|
||
passphrase may be vastly more risky than a shorter but
|
||
more easily memorized passphrase is. I think theft
|
||
of keys and keystroke capturing on compromised machines
|
||
are much
|
||
more important practical weaknesses.)
|
||
+ The first letters of long phrases that have meaning only to
|
||
the owner.
|
||
- e.g., "When I was ten I ate the whole thing."--->
|
||
"wiwtiatwt" (Purists will quibble that prepositional
|
||
phrases like "when i was" have lower entropy. True, but
|
||
better than "Joshua.")
|
||
+ Visual systems
|
||
- Another approach to getting enough entropy in
|
||
passwords/phrases is a "visual key" where one mouses from
|
||
position to position in a visual environment. That is,
|
||
one is presented with a scene containg some number of
|
||
nodes, perhaps representing familiar objects from one's
|
||
own home, and a path is chosen. The advantage is that
|
||
most people can remember fairly complicated
|
||
(read: high entropy) "stories." Each object triggers a
|
||
memory of the next object to visit. (Example: door to
|
||
kitchen to blender to refrigerator to ..... ) This is the
|
||
visual memory system said to be favored by Greek epic
|
||
poets. This also gets around the keyboard-monitoring
|
||
trick (but not necessarily the CRT-reading trick, of
|
||
course).
|
||
|
||
|
||
It might be an interesting hack to offer this as a front
|
||
end for PGP. Even a simple grid of characters which could
|
||
be moused on could be an assist in using long
|
||
passphrases.
|
||
|
||
5.10. DES
|
||
5.10.1. on the design of DES
|
||
- Biham and Shamir showed how "differential cryptanalyis"
|
||
could make the attack easier than brute-force search of the
|
||
2^56 keyspace. Wiener did a thought experiment design of a
|
||
"DES buster" machine (who ya gonna call?) that could break
|
||
a DES key in a matter of days. (Similar to the Diffie and
|
||
Hellman analysis of the mid-70s, updated to current
|
||
technology.)
|
||
+ The IBM designers knew about differential cryptanalyis, it
|
||
is now clear, and took steps to optimize DES. After Shamir
|
||
and Biham published, Don Coppersmith acknowledged this.
|
||
He's written a review paper:
|
||
- Coppersmith, D., "The Data Encryption Standard (DES) and
|
||
its strength against attacks." IBM Journal of Research
|
||
and Development. 38(3): 243-250. (May 1994)
|
||
|
||
5.11. Breaking Ciphers
|
||
5.11.1. This is not a main Cypherpunks concern, for a variety of
|
||
reasons (lots of work, special expertise, big machines, not a
|
||
core area, ciphers always win in the long run). Breaking
|
||
ciphers is something to consider, hence this brief section.
|
||
5.11.2. "What are the possible consequences of weaknesses in crypto
|
||
systems?"
|
||
- maybe reading messages
|
||
- maybe forging messages
|
||
- maybe faking timestamped documents
|
||
- maybe draining a bank account in seconds
|
||
- maybe winning in a crypto gambling system
|
||
- maybe matters of life and death
|
||
5.11.3. "What are the weakest places in ciphers, practically
|
||
speaking?"
|
||
- Key management, without a doubt. People leave their keys
|
||
lying around , write down their passphrases. etc.
|
||
5.11.4. Birthday attacks
|
||
5.11.5. For example, at Crypto '94 it was reported in a rump session
|
||
(by Michael Wiener with Paul van Oorschot) that a machine to
|
||
break the MD5 ciphers could be built for about $10 M (in 1994
|
||
dollars, of course) and could break MD5 in about 20 days.
|
||
(This follows the 1993 paper on a similar machine to break
|
||
DES.)
|
||
- Hal Finney did some calculations and reported to us:
|
||
- "I mentioned a few days ago that one of the "rump session"
|
||
papers at the crypto conference claimed that a machine
|
||
could be built which would find MD5 collisions for $10M in
|
||
about 20 days.....The net result is that we have taken
|
||
virtually no more time (the 2^64 creations of MD5 will
|
||
dominate) and virtually no space (compared to 2^64 stored
|
||
values) and we get the effect of a birthday attack. This
|
||
is another cautionary data point about the risks of relying
|
||
on space costs for security rather than time costs." [Hal
|
||
Finney, 1994-09-09]
|
||
5.11.6. pkzip reported broken
|
||
- "I finally found time to take a closer look at the
|
||
encryption algorithm by Roger Schlafly that is used in
|
||
PKZIP and have developed a practical known plaintext attack
|
||
that can find the entire 96-bit internal state." [Paul Carl
|
||
Kocher, comp.risks, 1994-09-04]
|
||
5.11.7. Gaming attacks, where loopholes in a system are exploited
|
||
- contests that are defeated by automated attacks
|
||
- the entire legal system can be viewed this way, with
|
||
competing teams of lawyers looking for legal attacks (and
|
||
the more complex the legal code, the more attacks can be
|
||
mounted)
|
||
- ecologies, where weaknesses are exploited ruthlessly,
|
||
forcing most species into extinction
|
||
- economies, ditto, except must faster
|
||
- the hazards for crypto schemes are clear
|
||
+ And there are important links to the issue of overly formal
|
||
systems, or systems in which ordinary "discretion" and
|
||
"choice" is overridden by rules from outside
|
||
- as with rules telling employers in great detail when and
|
||
how they can discharge employees (cf. the discussion of
|
||
"reasonable rules made mandatory," elsewhere)
|
||
- such rules get exploited by employees, who follow the
|
||
"letter of the law" but are performing in a way
|
||
unacceptable to the employer
|
||
- related to "locality of reference" points, in that
|
||
problem should be resolved locally, not with intervention
|
||
from afar.
|
||
- things will never be perfect, from the perspetive of all
|
||
parties, but meddling from outside makes things into a
|
||
game, the whole point of this section
|
||
+ Implications for digital money: overly complex legal
|
||
systems, without the local advantages of true cash (settled
|
||
locally)
|
||
+ may need to inject some supra-legal enforcement
|
||
mechanisms into the system, to make it converge
|
||
- offshore credit databases, beyond reach of U.S. and
|
||
other laws
|
||
+ physical violence (one reason people don't "play games"
|
||
with Mafia, Triads, etc., is that they know the
|
||
implications)
|
||
- it's not unethical, as I see it, for contracts in
|
||
which the parties understand that a possible or even
|
||
likely consequence of their failure to perform is
|
||
death
|
||
5.11.8. Diffie-Hellman key exchange vulnerabilities
|
||
- "man-in-the-midle" attack
|
||
+ phone systems use voice readback of LCD indicated number
|
||
- as computer power increases, even _this_ may be
|
||
insufficient
|
||
5.11.9. Reverse engineering of ciphers
|
||
- A5 code used in GSM phones was reverse engineered from a
|
||
hardware description
|
||
- Graham Toal reports (1994-07-12) that GCHQ blocked a public
|
||
lectures on this
|
||
|
||
5.12. Loose Ends
|
||
5.12.1. "Chess Grandmaster Problem" and other Frauds and Spoofs
|
||
- of central importance to proofs of identity (a la Fiat-
|
||
Shamir)
|
||
- "terrorist" and "Mafia spoof" problems
|