[9323] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

RE: crypto backdoors = terrorisms free reign

daemon@ATHENA.MIT.EDU (Amir Herzberg)
Sun Sep 16 12:03:19 2001

Message-ID: <078EE8822DCFD411AAA1000629D56ADC0B7F05@IMP01>
From: Amir Herzberg <AMIR@newgenpay.com>
To: cryptography@wasabisystems.com
Date: Sun, 16 Sep 2001 10:00:21 +0300
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"

Hadmut replied to Jim:
> > Incorrect.  You will weaken the absolute security of many, but the few
who
> > choose to use strong (non-GAK) crypto will be easily distinguished from
> > those who comply with the rules. 
> 
> No. It cannot be easily distinguished. That's the mistake
> almost all politicians do.

Correct, but let me explain _why_. 

Suppose by law, everybody can use GAK encryption alg, say `GEEK`. Attacker
wishes to use non-GAK algorithm, say `TRICK`. GEEK has a distinguisher
module available to NSA which outputs GEEK or SUSPECT for encrypted data
(using GEEK or any other algorithm, respectively). 

Attacker encrypts his data with TRICK and then with GEEK. So this is validly
GEEK encrypted data. Until the NSA tries to decipher it, it looks fine. 

(As far as I know, sending this message is still legal. I definitely hope
so.)

Best, Amir Herzberg



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post