[45362] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Attacking Clipper with timing info?

daemon@ATHENA.MIT.EDU (Matt Blaze)
Thu Dec 14 01:01:59 1995

To: Jim_Miller@bilbo.suite.com
Cc: rittle@comm.mot.com, cypherpunks@toad.com
In-Reply-To: Your message of "Wed, 13 Dec 1995 20:21:00 CST."
             <9512140222.AA23036@bilbo.suite.com> 
Date: Thu, 14 Dec 1995 00:31:00 -0500
From: Matt Blaze <mab@crypto.com>

> 
> That was indeed what I was wondering.  I expect we wont have to wait too  
> long before we hear whether Clipper chips require the same or a different  
> amount of time to encrypt/decrypt.  Should be interesting.
>
Clipper chips require fixed time to do a codebook cipher operation (exactly
64 clock ticks).  It's in the chip spec.

Capstone chips, on the other hand (as embodied in Tessera/Fortezza) have
public-key operations (DSA and a classified key exchange algorithm called
KEA that appears based on its interface to be El Gamal-like).  The cards
aren't supposed to reveal the secrets stored on them, ever.  There does
appear to be some variability in those functions, however.  I've not yet
reached any firm conclusions, however.

-matt


home help back first fref pref prev next nref lref last post