💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › SURFPUNK › surf0080.txt captured on 2022-06-12 at 14:29:58.

View Raw

More Information

-=-=-=-=-=-=-

Date: Thu, 22 Apr 93 17:27:05 PDT
Reply-To: <surfpunk@osc.versant.com> Return-Path: <cocot@osc.versant.com>
Message-ID: <surfpunk-0080@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@osc.versant.com (nepuvir ohooyrf)
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0080] BUBBLES: talk radio; _A New Age_; clipper chip

//					Subject: Archive Bubbles
					From: gt1274b@prism.gate
					ch.edu (Dan Puckett) To: 
					surfpunk@osc.versant.com
					Date: Thu, 22 Apr 93

					Archive
					Bubbles
					Calendar
					Door
					EEPROM
					Funding
					Gateway
					Hell
					I
					JMP
					Kill
					Local
					Memory
					Null
					Object
					Pulse
					Quote
					Revise
					Stack
					Telephone
					User
					Virtual
					Wastebasket
					XOFF
					Yes
					Zero

					Now I know my ABC's.
					Won't you come and play with me?

________________________________________________________________________

Date: Fri, 16 Apr 1993 13:13:19 -0700 (PDT)
From: Kwan-Seng Low <kwan@osc.versant.com>

Here's something I got from the net, did anyone play with this before?
care to comment/discussion?

Kwan

.....
.....
.....
Radio Free VAT is an experiment being run by the folks that are
working on IP multicasting.  They have set up an IP multicast backbone
that goes all over the place.  You can use programs to connect to
various sessions that are transmitting audio or slow frame video
across the multicast connections.  Radio Free VAT is one such session
where people sign up for slots where they can broadcast whatever.  In
the past, they've used this for broadcasting various meetings, such as
the IETF meetings.
.....
.....
Internet Talk Radio is a bunch of audio files that Carl Malamud has
put together.  He's been interviewing folks and junk like that.  Its
interesting.  I only know of it through the world wide web (www) - you
can find a handy web page for it at
http://www.ncsa.uiuc.edu/radio/radio.html, if you have access to the
web.


________________________________________________________________________

From: surfpunk <strick>
Subject: Internet Talk Radio

Kwan, I meant to assemble more info on this, but didn't get
around to it.  Perhaps someone can assemble us a precis on
Internet Talk Radio.  Here's the page from the web.  If you don't
have access to the web, notice how I telnet to port 80 and then
type capital GET followed by the tail end of the path in order to
get the page.  You should be able to read through this markup language.   

Archie can find "vat", and the IP multicasting package.  
On a sparcstation you should be able to play the .au files by
catting into /dev/audio, right?

This is something I haven't built/heard yet, either.        strick

________________________________________________________________________


Script started on Thu Apr 22 16:48:48 1993
$ telnet www.ncsa.uiuc.edu 80
Trying 141.142.4.5 ...
Connected to rs5.ncsa.uiuc.edu.
Escape character is '^]'.
GET /radio/radio.html
<TITLE>Internet Talk Radio</TITLE>
<H1>Internet Talk Radio</H1>

<H2>General Information</H2>

<UL>
<LI> <A NAME=9 HREF="ITRintro.readme.txt">Introduction</A> to Internet Talk Radio.
<LI> <A NAME=10 HREF="ITRgeek.readme.txt">Overview</A> of Geek of the Week.
</UL>

<H2>April 21, 1993</H2>

Here's the <A HREF="042193_geek_ITR.readme.txt">overview</A> of the
April 21 edition of Internet Talk Radio.  <P>

<UL>
<LI> <A HREF="042193_geek_01_ITR.au">Steve Deering, Part 1</A> (5.6 megs)
<LI> <A HREF="042193_geek_02_ITR.au">The Incidental Tourist</A> (1.6 megs)
<LI> <A HREF="042193_geek_03_ITR.au">Steve Deering, Part 2</A> (6.0 megs)
<LI> <A HREF="042193_geek_04_ITR.au">Book Byte</A> (0.7 megs)
<LI> <A HREF="042193_geek_05_ITR.au">Steve Deering, Part 3</A> (5.4 megs)
</UL>

<H2>April 14, 1993</H2>

Here's the <A HREF="041493_geek_ITR.readme.txt">overview</A> of the
April 14 edition of Internet Talk Radio.  <P>

<UL>
<LI> <A HREF="041493_geek_01_ITR.au">Daniel Lynch, Part 1</A> (5.7 megs)
<LI> <A HREF="041493_geek_02_ITR.au">The Incidental Tourist</A> (0.9 megs)
<LI> <A HREF="041493_geek_03_ITR.au">Daniel Lynch, Part 2</A> (5.5 megs)
<LI> <A HREF="041493_geek_04_ITR.au">Legal Stuff</A> (0.2 megs)
<LI> <A HREF="041493_geek_05_ITR.au">Daniel Lynch, Part 3</A> (3.4 megs)
</UL>

<H2>April 7, 1993</H2>

Here's the <A HREF="040793_geek_ITR.readme.txt">overview</A> of the
April 7 edition of Internet Talk Radio.  <P>

<UL>
<LI> <A HREF="040793_geek_01_ITR.au">Dr. Erik Huizer, Part 1</A> (5.4 megs)
<LI> <A HREF="040793_geek_02_ITR.au">The Incidental Tourist</A> (1.5 megs)
<LI> <A HREF="040793_geek_03_ITR.au">Dr. Erik Huizer, Part 2</A> (4.8 megs)
<LI> <A HREF="040793_geek_04_ITR.au">Book Byte</A> (0.7 megs)
<LI> <A HREF="040793_geek_05_ITR.au">Dr. Erik Huizer, Part 3</A> (5.9 megs)
<LI> <A HREF="040793_geek_06_ITR.au">Name That Acronym</A> (0.5 megs)
<LI> <A HREF="040793_geek_07_ITR.au">Dr. Erik Huizer, Part 4</A> (5.2 megs)
</UL>

<H2>March 31, 1993</H2>

Here's the <A NAME=8
HREF="033193_geek_ITR.readme.txt">overview</A> of the March 31
edition of Internet Talk Radio.  <P>

<UL>
<LI> <A NAME=1 HREF="033193_geek_01_ITR.au">Dr. Marshall Rose, Part 1</A> (5.6 megs)
<LI> <A NAME=2 HREF="033193_geek_02_ITR.au">The Incidental Tourist</A> (1.5 megs)
<LI> <A NAME=3 HREF="033193_geek_03_ITR.au">Dr. Marshall Rose, Part 2</A> (5.1 megs)
<LI> <A NAME=4 HREF="033193_geek_04_ITR.au">Book Byte</A> (0.6 megs)
<LI> <A NAME=5 HREF="033193_geek_05_ITR.au">Dr. Marshall Rose, Part 3</A> (5.6 megs)
<LI> <A NAME=6 HREF="033193_geek_06_ITR.au">Name That Acronym</A> (0.5 megs)
<LI> <A NAME=7 HREF="033193_geek_07_ITR.au">Dr. Marshall Rose, Part 4</A> (4.2 megs)
</UL>

<ADDRESS> <A NAME=29
HREF="http://hoohoo.ncsa.uiuc.edu/ncsa-people.html#andreessen">marca@ncsa.uiuc.edu</A>
</ADDRESS>
Connection closed by foreign host.
$ 
script done on Thu Apr 22 16:49:17 1993


________________________________________________________________________



Date: Mon, 19 Apr 93 21:10 GMT
From: Don Webb <0004200716@mcimail.com>
To: ARCANA <ARCANA%UNCCVM.BITNET@pucc.princeton.edu>
To: Fringeware <fringeware@wixer.cactus.org>
To: surfpunk <surfpunk@osc.versant.com>
Subject: _A New Age_

Dear Folk,

I don't know why I didn't think of this earlier.  Wayne Edwards
runs a a wonderful series called _A New Age_ in which various
members of differing faiths and philosophies each write up their
own belief system.  The packets are 66 pages long, 8.5 x 11
tri-punched and shrink wrapped.  They are currently two.  I
strongly recommend both the packets,  (Why not send off for
packet one today? -  it's $4.75). and the practice.

Send to:

Merrimack Books
_A New Age_
PO box 158
Lynn, IN 57355-0158



0004200716@mcimail.com
Don Webb
The Secret of magic is to transform the magician.

________________________________________________________________________


Date: Wed, 21 Apr 1993 22:57:41 -0400
From: gt0269b@prism.gatech.edu (David D. Clark)
To: surfpunk@osc.versant.com
Subject: The Clipper Chip: Technical Info (From comp.risks)

			[ "Fine with me.  Post anywhere." -- Dorothy ]

I'm sure this will be all over everywhere on the net being discussed, but
this seems like a pretty good summary.
Original author: denning@cs.cosc.georgetown.edu (Dorothy Denning)


                     THE CLIPPER CHIP: A TECHNICAL SUMMARY
                               Dorothy Denning
                           Revised, April 21, 1993

INTRODUCTION

On April 16, the President announced a new initiative that will bring
together the Federal Government and industry in a voluntary program
to provide secure communications while meeting the legitimate needs of
law enforcement.  At the heart of the plan is a new tamper-proof encryption
chip called the "Clipper Chip" together with a split-key approach to
escrowing keys.  Two escrow agencies are used, and the key parts from
both are needed to reconstruct a key.


CHIP CONTENTS

The Clipper Chip contains a classified single-key 64-bit block
encryption algorithm called "Skipjack."  The algorithm uses 80 bit keys
(compared with 56 for the DES) and has 32 rounds of scrambling
(compared with 16 for the DES).  It supports all 4 DES modes of
operation.  The algorithm takes 32 clock ticks, and in Electronic
Codebook (ECB) mode runs at 12 Mbits per second.

Each chip includes the following components:

   the Skipjack encryption algorithm
   F, an 80-bit family key that is common to all chips
   N, a 30-bit serial number (this length is subject to change)
   U, an 80-bit secret key that unlocks all messages encrypted with the chip

The chips are programmed by Mykotronx, Inc., which calls them the
"MYK-78."  The silicon is supplied by VLSI Technology Inc.  They are
implemented in 1 micron technology and will initially sell for about
$30 each in quantities of 10,000 or more.  The price should drop as the
technology is shrunk to .8 micron.


ENCRYPTING WITH THE CHIP

To see how the chip is used, imagine that it is embedded in the AT&T
telephone security device (as it will be).  Suppose I call someone and
we both have such a device.  After pushing a button to start a secure
conversation, my security device will negotiate an 80-bit session key K
with the device at the other end.  This key negotiation takes place
without the Clipper Chip.  In general, any method of key exchange can
be used such as the Diffie-Hellman public-key distribution method.

Once the session key K is established, the Clipper Chip is used to
encrypt the conversation or message stream M (digitized voice).  The
telephone security device feeds K and M into the chip to produce two
values:

   E[M; K], the encrypted message stream, and 
   E[E[K; U] + N; F], a law enforcement field , 

which are transmitted over the telephone line.  The law enforcement
field thus contains the session key K encrypted under the unit key U
concatenated with the serial number N, all encrypted under the family
key F.  The law enforcement field is decrypted by law enforcement after
an authorized wiretap has been installed.

The ciphertext E[M; K] is decrypted by the receiver's device using the
session key:

   D[E[M; K]; K] = M .


CHIP PROGRAMMING AND ESCROW

All Clipper Chips are programmed inside a SCIF (Secure Compartmented
Information Facility), which is essentially a vault.  The SCIF contains
a laptop computer and equipment to program the chips.  About 300 chips
are programmed during a single session.  The SCIF is located at
Mykotronx.

At the beginning of a session, a trusted agent from each of the two key
escrow agencies enters the vault.  Agent 1 enters a secret, random
80-bit value S1 into the laptop and agent 2 enters a secret, random
80-bit value S2. These random values serve as seeds to generate unit
keys for a sequence of serial numbers.  Thus, the unit keys are a
function of 160 secret, random bits, where each agent knows only 80.
  
To generate the unit key for a serial number N, the 30-bit value N is
first padded with a fixed 34-bit block to produce a 64-bit block N1.
S1 and S2 are then used as keys to triple-encrypt N1, producing a
64-bit block R1:

        R1 = E[D[E[N1; S1]; S2]; S1] .

Similarly, N is padded with two other 34-bit blocks to produce N2 and
N3, and two additional 64-bit blocks R2 and R3 are computed:  

        R2 = E[D[E[N2; S1]; S2]; S1] 
        R3 = E[D[E[N3; S1]; S2]; S1] .

R1, R2, and R3 are then concatenated together, giving 192 bits. The
first 80 bits are assigned to U1 and the second 80 bits to U2.  The
rest are discarded.  The unit key U is the XOR of U1 and U2.  U1 and U2
are the key parts that are separately escrowed with the two escrow
agencies.

As a sequence of values for U1, U2, and U are generated, they are
written onto three separate floppy disks.  The first disk contains a
file for each serial number that contains the corresponding key part
U1.  The second disk is similar but contains the U2 values.  The third
disk contains the unit keys U.  Agent 1 takes the first disk and agent
2 takes the second disk.  Thus each agent walks away knowing
an 80-bit seed and the 80-bit key parts.  However, the agent does not
know the other 80 bits used to generate the keys or the other 80-bit
key parts.  

The third disk is used to program the chips.  After the chips are
programmed, all information is discarded from the vault and the agents
leave.  The laptop may be destroyed for additional assurance that no
information is left behind.
 
The protocol may be changed slightly so that four people are in the
room instead of two.  The first two would provide the seeds S1 and S2,
and the second two (the escrow agents) would take the disks back to
the escrow agencies. 

The escrow agencies have as yet to be determined, but they will not
be the NSA, CIA, FBI, or any other law enforcement agency.  One or
both may be independent from the government.


LAW ENFORCEMENT USE

When law enforcement has been authorized to tap an encrypted line, they
will first take the warrant to the service provider in order to get
access to the communications line.  Let us assume that the tap is in
place and that they have determined that the line is encrypted with the
Clipper Chip.  The law enforcement field is first decrypted with the
family key F, giving E[K; U] + N.  Documentation certifying that a tap
has been authorized for the party associated with serial number N is
then sent (e.g., via secure FAX) to each of the key escrow agents, who
return (e.g., also via secure FAX) U1 and U2.  U1 and U2 are XORed
together to produce the unit key U, and E[K; U] is decrypted to get the
session key K.  Finally the message stream is decrypted.  All this will
be accomplished through a special black box decoder.


CAPSTONE: THE NEXT GENERATION

A successor to the Clipper Chip, called "Capstone" by the government
and "MYK-80" by Mykotronx, has already been developed.  It will include
the Skipjack algorithm, the Digital Signature Standard (DSS), the
Secure Hash Algorithm (SHA), a method of key exchange, a fast
exponentiator, and a randomizer.  A prototoype will be available for
testing on April 22, and the chips are expected to be ready for
delivery in June or July.


ACKNOWLEDGMENT AND DISTRIBUTION NOTICE.  This article is based on
information provided by NSA, NIST, FBI, and Mykotronx.  Permission to
distribute this document is granted.
---
David D. Clark: With a middle name like Darwin how can I not be an athiest?
 "We only want a quiet place to finish working while God eats our brains."
--Bruce Sterling              Fnord.               gt0269b@prism.gatech.edu

________________________________________________________________________

Date: Fri, 16 Apr 93 20:02:28 -0700
From: Eric Hughes <hughes@soda.berkeley.edu>
To: cypherpunks@toad.com
Subject: a cypherpunk's clipper reaction


Fellows:

I will, in the coming weeks have much more to say on the matter of
this Clipper chip proposal.  For now, however, I have only one thing
to say.

No compromises.

Eric

________________________________________________________________________

Date: Sat, 17 Apr 93 23:05:23 PDT
From: "Martin Hellman" <hellman@isl.stanford.edu>
Message-Id: <9304180605.AA22827@ISL.Stanford.EDU>
To: <bunches-o-net-people>
Subject: Clipper Chip

[ Notice the authors's request:
	------- Forwarded Message

	Date: Sun, 18 Apr 93 11:41:42 PDT
	From: "Martin Hellman" <hellman@isl.stanford.edu>
	To: smb@research.att.com
	Subject: Re: Clipper Chip

	It is fine to post my previous message to sci.crypt
	if you also post this message with it in which:

	1. I ask recipients to be sparse in their requesting further info
	from me or asking for comments on specific questions. By
	this posting I apologize for any messages I am unable to
	respond to. (I already spend too much time answering too much
	e-mail and am particularly overloaded this week with other
	responsibilities.)

	2. I note a probably correction sent to me by Dorothy Denning.
	She met with the person from NSA that
	I talked with by phone, so her understanding is likely to
	better than mine on this point: Where I said the transmitted
	info is  E{ E[M; K], E[K; UK], serial number;  SK}
	she says the message is not double encrypted. The system
	key (or family key as she was told it is called) only encrypts
	the serial number or the serial number and the encrypted
	unit key. This is not a major difference, but I thought it
	should be mentioned and thank her for bringing it to
	my attention. It makes more sense since it cuts down
	on encryption computation overhead.

	------- End of Forwarded Message

]



Most of you have seen the announcement in Friday's NY Times,
etc. about NIST (National Institute of Standards & Technology)
announcing the "Clipper Chip" crypto device. Several messges
on the net have asked for more technical details, and some have
been laboring under understandable misunderstandings given
the lack of details in the news  articles. So here to help out
is your friendly NSA link: me. I was somewhat surprised Friday
to get a call from the Agency which supplied many of the missing
details. I was told the info was public, so here it is (the cc of this
to Dennis Branstad at NIST is mostly as a double check on my
facts since I assume he is aware of all this; please let me know
if I have anything wrong):

The Clipper Chip will have a secret crypto algorithm embedded in
Silicon. Each chip will have two secret, 80-bit keys. One will be the
same for all chips (ie a system-wide key) and the other will be unit
specific. I don't know what NIST and NSA will call them, but I will
call them the system key SK and unit key UK in this message.
The IC will be designed to be extremely difficult to reverse so
that the system key can be kept secret. (Aside: It is clear that
they also want to keep the algorithm secret and, in my opinion,
it may be as much for that as this stated purpose.) The unit key
will be generated as the XOR of two 80-bit random numbers K1
and K2 (UK=K1+K2) which will be kept by the two escrow
authorities. Who these escrow authorities will be is still to be
decided by the Attorney General, but it was stressed to me that
they will NOT be NSA or law enforcement agencies, that they
must be parties acceptable to the users of the system as unbiased.
When a law enforcement agency gets a court order, they will
present it to these two escrow authorities and receive K1 and
K2, thereby allowing access to the unit key UK.

In addition to the system key, each user will get to choose his
or her own key and change it as often as desired. Call this key
plain old K. When a message is to be sent it will first be
encrypted under K, then K will be encrypted under the unit key UK,
and the serial number of the unit added to produce a three part
message which will then be encrypted under the system key SK
producing

     E{ E[M; K], E[K; UK], serial number;  SK}

When a court order obtains K1 and K2, and thence K, the law
enforcement agency will use SK to decrypt all information
flowing on the suspected link [Aside: It is my guess that
they may do this constantly on all links, with or without a
court order, since it is almost impossible to tell which links
over which a message will flow.] This gives the agency access to

     E[M; K], E[K; UK], serial number

in the above message. They then check the serial number
of the unit and see if it is on the "watch list" for which they
have a court order. If so, they will decrypt E[K; UK] to obtain K,
and then decrypt E[M; K] to obtain M.

I am still in the process of assessing this scheme, so please do
not take the above as any kind of endorsement of the proposed
scheme. All I am trying to do is help all of us assess the scheme
more knowledgably. But I will say that the need for just one court
order worries me. I would feel more comfortable (though not
necessarily comfortable!) if two separate court orders were
needed, one per escrow authority. While no explanation is
needed, the following story adds some color: In researching
some ideas that Silvio Micali and I have been kicking around,
I spoke with Gerald Gunther, the constitutional law expert
here at Stanford and he related the following story: When
Edward Levi became Pres. Ford's attorney general (right
after Watergate), he was visited by an FBI agent asking
for "the wiretap authorizations." When Levy asked for
the details so he could review the cases as required by
law, the agent told him that his predecessors just turned
over 40-50 blank, signed forms every time. Levi did not
comply and changed the system, but the lesson is clear:
No single person or authority should have the power to
authorize wiretaps (or worse yet, divulging of personal
keys). Sometimes he or she will be an Edward Levi
and sometimes a John Mitchell.

Martin Hellman

------- End of Forwarded Message


________________________________________________________________________

From: tcmay@netcom.com (Timothy C. May)
Subject: Explanation of Clipper Chip Name
To: cypherpunks@toad.com

In the days before Xerox machines, one provided copies of
correspondence to others by using sheets of carbon paper to make
duplicates when typing.

This is the origin of "cc" or "cc:" on memos and correspondence.

Henceforth, "cc" refers to the automatic carbon copy provided by the
"cc" chip, the Clipper Chip. BB (Big Brother) gets a CC of everything.

(I know, it's a voice encryption standard, and it's voluntary, but a
quick look at the "Capstone" chip reveals it's a complete crypto
package, containing the DSS government signature standard, and lots of
other stuff. The Wiretap Chip will be used for more than just voice,
I'll be willing to bet.)

-Tim

--
..........................................................................
Timothy C. May         | Crypto Anarchy: encryption, digital money,
tcmay@netcom.com       | anonymous networks, digital pseudonyms, zero
408-688-5409           | knowledge, reputations, information markets,
W.A.S.T.E.: Aptos, CA  | black markets, collapse of governments.
Higher Power: 2^756839 | Public Key: PGP and MailSafe available.




________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix.  Quantum Californians appear in one of two states,
spin surf or spin punk.  Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@osc.versant.com>, subscription requests 
to <surfpunk-request@osc.versant.com>.  MIME encouraged.  
Xanalogical archive access soon.  Received: by osc.versant.com (4.1/SMI-4.1)
________________________________________________________________________
________________________________________________________________________





		# ) The Clipper Chip contains a classified single-key
		# ) 64-bit block encryption algorithm called
		# ) "Skipjack."  The algorithm uses 80 bit keys
		# ) (compared with 56 for the DES) and has 32 rounds
		# ) of scrambling (compared with 16 for the DES).  It
		# ) supports all 4 DES modes of operation.  The
		# ) algorithm takes 32 clock ticks, and in Electronic
		# ) Codebook (ECB) mode runs at 12 Mbits per second.
		# 
		# What's it take to crack DES with keys twice as
		# big?  [timeOfDES]^2, which is about ten minutes
		# nowadays.  Worthless encryption, doubly so with
		# the NSA backdoor.  It will provide a good
		# platform for EE hackers to work off of to create
		# truly secure crypt chips though.

		You're going to have to argue a bit to convince
		me that an 80-bit-key 32-round DES-like
		encryption is crackable in 10 minutes.  Even
		without chaining, which everyone uses anyway.

		How do you figure that?

		12 MBit/second ECB, div 64 bits/cypherblock, is
		like 188,000 blocks/sec.  Say we're within a
		magnitude, and call it 2^18 = 262000 per second.

		Now you've got to attempt 2^80 keys.  So you need
		2^(80-18) = s^62 = 4611686018427387904 seconds to
		try all keys with one of these chips runing at
		the above rate.  That converts to 3598381724740
		years, a little more than 10 seconds.  Just for
		one cypherblock.  Which is hardly enough to
		determine *the* key, since the key is so many
		more bits than the cypherblock, you'll find
		billions of keys that all decypher it correctly,
		and still won't be able to distingusih the
		correct decyphtering from billions of other
		equally plausible decypherings.  What were you
		thinking?

		Q.  Which brand of DES does PGP use for DEK,
		anyways?  Probably 56-bit-key DES in either CBC
		or PCBC mode, right?

		 TAB
		 TAB
		 TAB
		 TAB
		s   LIKE
		  t   OKAY
		  r   LIKE
		  i   OKAY
		  c   LIKE
		  k   OKAY
		   BANG
		 UMMM