Practical Aspects of Modern Cryptography 3 March 12, 2002 Practical Aspects of Modern Cryptography 4 March 12, 2002

Total Page:16

File Type:pdf, Size:1020Kb

Practical Aspects of Modern Cryptography 3 March 12, 2002 Practical Aspects of Modern Cryptography 4 March 12, 2002 Practical Aspects of Lecture 10: Modern Cryptography IPSEC and Crypto Politics Josh Benaloh & Brian LaMacchia But First...We Need to Vote IPSEC ! Two choices for the final project schedule: ! IPSEC = IP (Internet Protocol) Security ! Option 1: ! Suite of protocols that provide encryption, integrity and authentication services for IP ! Tuesday, March 19 @ UW EE1-003 packets ! Thursday, March 21 @ Redmond (room TBD) ! Mandatory-to-implement for IPv6, optional (but ! Option 2: available) for IPv4 ! Tuesday, March 19 @ Redmond (room TBD) ! Consists of two main components: ! Thursday, March 21 @ UW EE1-003 ! IPSEC proper (encryption & auth of IP packets) ! Which do you prefer? ! IPSEC key management Practical Aspects of Modern Cryptography 3 March 12, 2002 Practical Aspects of Modern Cryptography 4 March 12, 2002 IPSEC Operation IPSEC Protection Protocols ! Provides two modes of protection ! Authentication Header (AH) ! Tunnel Mode ! Authenticates payload data ! Transport Mode ! Authenticates network header ! Protection protocols ! Gives anti-replay protection ! Authentication and Integrity (AH) ! Encapsulated Security Payload (ESP) ! Confidentiality (ESP) ! Encrypts payload data ! Replay Protection ! Authenticates payload data ! Gives anti-replay protection Practical Aspects of Modern Cryptography 5 March 12, 2002 Practical Aspects of Modern Cryptography 6 March 12, 2002 1 Authentication Header (AH) IPSEC Authentication Header (AH) in Transport Mode ! Authentication is applied to the entire packet, with the mutable fields in the IP header Orig IP Hdr TCP Hdr Data zeroed out Insert ! If both ESP and AH are applied to a packet, Orig IP Hdr AH Hdr TCP Hdr Data AH follows ESP Integrity hash coverage (except for mutable fields in IP hdr) Next Hdr Payload Len Rsrv SecParamIndex Seq# Keyed Hash AH is IP protocol 51 24 bytes total Practical Aspects of Modern Cryptography 7 March 12, 2002 Practical Aspects of Modern Cryptography 8 March 12, 2002 IPSEC AH in Tunnel Mode Encapsulated Security Payload (ESP) Orig IP Hdr TCP Hdr Data ! Must encrypt and/or authenticate in each packet ! Encryption occurs before authentication IP Hdr AH Hdr Orig IP Hdr TCP Hdr Data ! Authentication is applied to data in the IPSEC header as well as the data contained Integrity hash coverage (except for mutable new IP hdr fields) as payload New IP header with source & destination IP address Practical Aspects of Modern Cryptography 9 March 12, 2002 Practical Aspects of Modern Cryptography 10 March 12, 2002 IPSEC ESP in Transport Mode IPSEC ESP in Transport Mode Orig IP Hdr TCP Hdr Data Insert Append Orig IP Hdr TCP Hdr Data Orig IP Hdr ESP Hdr TCP Hdr Data ESP Trailer ESP Auth Insert Append Usually encrypted Orig IP Hdr ESP Hdr TCP Hdr Data ESP Trailer ESP Auth integrity hash coverage Usually encrypted integrity hash coverage SecParamIndex Seq# InitVector Keyed Hash 22-36 bytes total Padding PadLength NextHdr ESP is IP protocol 50 Practical Aspects of Modern Cryptography 11 March 12, 2002 Practical Aspects of Modern Cryptography 12 March 12, 2002 2 IPSEC ESP Tunnel Mode IPSEC Key Management ! IPSEC Key Management is all about Orig IP Hdr TCP Hdr Data establishing and maintaining Security Associations (SAs) between pairs of communicating hosts IPHdr ESP Hdr IP Hdr TCP Hdr Data ESP Trailer ESP Auth Usually encrypted integrity hash coverage New IP header with source & destination IP address Practical Aspects of Modern Cryptography 13 March 12, 2002 Practical Aspects of Modern Cryptography 14 March 12, 2002 Security Associations (SA) Internet Key Exchange (IKE) ! New concept for IP communication ! Phase I ! SA not a “connection”, but very similar ! Establish a secure channel(ISAKMP SA) ! Establishes trust between computers ! Authenticate computer identity ! If securing with IPSEC, need SA ! Phase II ! ISAKMP protocol negotiates security parameters ! Establishes a secure channel between computers according to policy intended for the transmission of data (IPSEC ! Manages cryptographic keys and lifetime SA) ! Enforces trust by mutual authentication Practical Aspects of Modern Cryptography 15 March 12, 2002 Practical Aspects of Modern Cryptography 16 March 12, 2002 ISAKMP/OAKLEY ISAKMP/OAKLEY (2) ! Merge of two key management protocols ! What’s used today is a combination ! ISAKMP: Internet Security Association and Key ! ISAKMP provides the protocol framework Management Protocol ! OAKLEY provides the security mechanisms ! NSA-designed protocol to exchange security parameters (but not establish keys) ! OAKLEY ! Diffie-Hellman based key management protocol Practical Aspects of Modern Cryptography 17 March 12, 2002 Practical Aspects of Modern Cryptography 18 March 12, 2002 3 Main Mode Main Mode (Pre-shared Key) ! Main mode negotiates an ISAKMP SA which will be used to create IPSEC SA ! Three steps Initiator Responder ! SA negotiation Header, SA Proposals ! Diffie-Hellman and nonce exchange Header, Selected SA Proposal ! Authentication Header, D-H Key Exchange, Noncei Header, D-H Key Exchange, Noncer Encrypted Header, Idi,Hashi Header, Idr,Hashr Practical Aspects of Modern Cryptography 19 March 12, 2002 Practical Aspects of Modern Cryptography 20 March 12, 2002 Main Mode (Kerberos) Main Mode (Certificate) Initiator Responder Initiator Responder Header, SA Proposals Header, SA Proposals Header, Selected SA Proposal Header, Selected SA Proposal Header, D-H Key Exchange, Nonce , i Header, D-H Key Exchange, Noncei Kerberos Tokeni Header, D-H Key Exchange, Noncer, Header, D-H Key Exchange, Kerberos Tokenr Noncer,Certificate Request Encrypted Encrypted Header, Id ,Hash i i Header, Idi, Certificatei, Signaturei, Header, Idr,Hashr Certificate Request Header, Idr, Certificater, Signaturer Practical Aspects of Modern Cryptography 21 March 12, 2002 Practical Aspects of Modern Cryptography 22 March 12, 2002 Quick Mode Quick Mode Negotiation ! All traffic is encrypted using the ISAKMP Security Association ! Each quick mode negotiation results in two Initiator Responder IPSec Security Associations (one inbound, Encrypted one outbound) Header, IPSec Proposed SA Header, IPSec Selected SA Header, Hash Header, Connected Notification Practical Aspects of Modern Cryptography 23 March 12, 2002 Practical Aspects of Modern Cryptography 24 March 12, 2002 4 How It All Fits Together IPSEC Bundling/Wrapping Transport ! Multiple IPSEC transforms may be wrapped Tunnel successively around a single IP datagram ! Example: IPSEC transport sent over an IPSEC tunnel Practical Aspects of Modern Cryptography 25 March 12, 2002 Practical Aspects of Modern Cryptography 26 March 12, 2002 Sending in Transport Mode Sending in Tunnel Mode Application IPSec IP IP IPSec Transport Physical Physical IP IPSec Physical Application Physical IP IPSec TCP Data Application Application Physical IP IPSec TCP IP IPSec TCP Data Data Outer Inner Application Physical IPSec IPSec TCP IP IP Data Practical Aspects of Modern Cryptography 27 March 12, 2002 Practical Aspects of Modern Cryptography 28 March 12, 2002 Receiving in Tunnel Mode Receiving in Transport Mode Application IPSec IP IP IPSec Transport Physical Physical IPSec IP Physical Outer Inner Application Physical IPSec IPSec TCP IP IP Data Application IP IPSec TCP Application Data Physical IP IPSec TCP Data Application Physical IP IPSec TCP Data Practical Aspects of Modern Cryptography 29 March 12, 2002 Practical Aspects of Modern Cryptography 30 March 12, 2002 5 What is Network Address Translation NATs Rewrite Address/Port (NAT) ? Pairs ! Network Address Translation (NAT) User Kernel TCPIP.SYS IPNAT.SYS Translation Table ! Dynamically modifies source address S 10.0.0.2 S 10.0.0.2 10.0.0.2, 1185, 23 =172.31.249.14 D 131.107.1.7 D 131.107.1.7 Kernel mode 10.0.0.3, 1185, 23 =172.31.249.14 ! Dynamically recomputes interior UDP/TCP firewall hook checksums S 172.31.249.14 S 172.31.249.14 D 131.107.1.7 D 131.107.1.7 ! Port Address Translation (PAT) ! Dynamically modifies TCP/UDP source address and port ! Dynamically recomputes interior UDP/TCP checksums Practical Aspects of Modern Cryptography 31 March 12, 2002 Practical Aspects of Modern Cryptography 32 March 12, 2002 IPSEC AH and NAT IPSEC ESP and NAT ! Change in address or port will cause message ! Can change IP header in special cases only integrity check to fail ! Special TCP/UDP ignores pseudo header used in ! Packet will be rejected by destination IPSEC checksum calculation ! AH cannot be used with NAT or PAT devices ! Port information encrypted! ! Can’t change ESP header because integrity hash coverage Orig IP Hdr AH Hdr TCP Hdr Data Message Integrity Check coverage (except for mutable fields) Orig IP Hdr ESP Hdr TCP Hdr Data ESP Trailer ESP Auth encrypted integrity hash coverage Practical Aspects of Modern Cryptography 33 March 12, 2002 Practical Aspects of Modern Cryptography 34 March 12, 2002 Why Talk About Crypto Politics? ! You can’t really avoid the political aspects of crypto, especially if you’re trying to ship a The Politics of Crypto product that depends on good crypto ! In the past, the regulations have been so complex & time consuming that companies had dedicated individuals/departments for dealing with regs. ! Often public pronouncements don’t match reality ! Just because a government body says “crypto is freely exportable” doesn’t make it so Practical Aspects of Modern Cryptography 36 March 12, 2002 6 Topics in Crypto Politics Caveats... ! I’m going to present a U.S.-centric view of ! Export controls the issues ! Key Escrow ! Each country deals differently with these issues, ! Patents but the U.S. typically
Recommended publications
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext
    An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext By Isaac Quinn DuPont A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by Isaac Quinn DuPont 2017 ii An Archeology of Cryptography: Rewriting Plaintext, Encryption, and Ciphertext Isaac Quinn DuPont Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract Tis dissertation is an archeological study of cryptography. It questions the validity of thinking about cryptography in familiar, instrumentalist terms, and instead reveals the ways that cryptography can been understood as writing, media, and computation. In this dissertation, I ofer a critique of the prevailing views of cryptography by tracing a number of long overlooked themes in its history, including the development of artifcial languages, machine translation, media, code, notation, silence, and order. Using an archeological method, I detail historical conditions of possibility and the technical a priori of cryptography. Te conditions of possibility are explored in three parts, where I rhetorically rewrite the conventional terms of art, namely, plaintext, encryption, and ciphertext. I argue that plaintext has historically been understood as kind of inscription or form of writing, and has been associated with the development of artifcial languages, and used to analyze and investigate the natural world. I argue that the technical a priori of plaintext, encryption, and ciphertext is constitutive of the syntactic iii and semantic properties detailed in Nelson Goodman’s theory of notation, as described in his Languages of Art. I argue that encryption (and its reverse, decryption) are deterministic modes of transcription, which have historically been thought of as the medium between plaintext and ciphertext.
    [Show full text]
  • The Export of Cryptography in the 20 Century and the 21
    The Export of Cryptography th st in the 20 Century and the 21 ∗ Whitfield Diffie and Susan Landau Sun Microsystems, Inc Palo Alto CA April 19, 2005 August 2000 On the 14th of January 2000, the Bureau of Export Administration issued long-awaited revisions to the rules on exporting cryptographic hardware and software. The new regulations, which grew out of a protracted tug of war between the computer industry and the U.S. Government, are seen by indus- try as a victory. Their appearance, which was attended by both excitement and relief, marked a substantial change in export policy. This paper exam- ines the evolution of export control in the cryptographic area and considers its impact on the deployment of privacy-protecting technologies within the United States. Before the electronic age, all \real-time" interaction between people had to take place in person. Privacy in such interactions could be taken for granted. No more than reasonable care was required to assure yourself that only the people you were addressing | people who had to be right there with you | could hear you. Telecommunications have changed this. The people with whom you interact no longer have to be in your immediate vicinity; they can be on the other side of the world, making what was once impossible spontaneous and inexpensive. Telecommunication, on the other hand, makes protecting yourself from eavesdropping more difficult. Some other security mechanism is required to replace looking around to see that ∗To appear in the Handbook of the History of Information Security Elsevier B.V. 1 no one is close enough to overhear: that mechanism is cryptography, the only security mechanism that directly protects information passing out of the physical control of the sender and receiver.
    [Show full text]
  • Cryptography Export Controls - Canada's Dichotomous Cryptography Policy
    Canadian Journal of Law and Technology Volume 4 Number 3 Article 5 8-1-2005 Cryptography Export Controls - Canada's Dichotomous Cryptography Policy Paul Bates Follow this and additional works at: https://digitalcommons.schulichlaw.dal.ca/cjlt Part of the Computer Law Commons, Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Paul Bates, "Cryptography Export Controls - Canada's Dichotomous Cryptography Policy" (2005) 4:3 CJLT. This Article is brought to you for free and open access by the Journals at Schulich Law Scholars. It has been accepted for inclusion in Canadian Journal of Law and Technology by an authorized editor of Schulich Law Scholars. For more information, please contact [email protected]. CRYPTOGRAPHY EXPORT CONTROLS — CANADA’S DICHOTOMOUS CRYPTOGRAPHY POLICY Paul Bates† Introduction 1 of the Canadian Charter of Rights and Freedoms (Charter). 6 The effort to erect strong legal barriers to ryptography makes electronic transactions more trans-national distribution of cryptography has signifi- C secure and reliable. Recognizing the importance of cant gaps because strong cryptography can be obtained cryptography to e-commerce, the Canadian government and used within Canada without legal restrictions. This adopted a digital cryptography policy in 1998. The paper advocates that Canada should exercise its discre- policy provides for ‘‘digital freedom’’ for domestic cryp- tion under the WA to diminish, not fortify, the restric- tography by permitting Canadians to develop, import, tions of the export control regime. and use for lawful purposes, any cryptographic products, without restrictions based upon the strength of the cryp- tography, the source of supply, the identity of the recip- ient, or the nature of the use.
    [Show full text]
  • Lecture 1: Course Introduction
    Lecture 1: Course Introduction Thomas Johansson T. Johansson (Lund University) 1 / 17 Course intro - Cryptography Welcome to Cryptography (EDIN01)! Everything in English! Course information The course web page: http://www.eit.lth.se Prerequisites: Math and programming skills! T. Johansson (Lund University) 2 / 17 Other crypto/security courses Dept. of EIT, Crypto and Security group (Continuation course for PhD students: Mathematical Cryptology (EDIN05), 7,5hp) Security courses: Computer Security (EIT060), 7,5hp Web Security (EITF05), 4hp Advanced Computer Security (EITN50) 7,5hp Advanced Web Security (EITN41), 7,5hp NEW COURSE: Secure Systems Engineering, 7.5hp (vt1 2020) Project in EIT (EITN35), 7,5hp Master’s thesis: see the department website: http://www.eit.lth.se T. Johansson (Lund University) 3 / 17 Introduction to Cryptography Much of the theoretical work in cryptography concerns cryptographic primitives, algorithms with basic cryptographic properties. A cryptographic protocol involve back and forth communication among two or more parties. Symmetric-key cryptography – methods in which both the sender and receiver share the same key (block ciphers, stream ciphers, MAC algorithms). Cryptographic hash functions are a related and important class of cryptographic algorithms. Public-key cryptography – two different but mathematically related keys are used a public key and a private key. T. Johansson (Lund University) 4 / 17 History of cryptography Before the modern era, cryptography was concerned solely with message confidentiality (i.e., encryption) Encryption was used to (attempt) to ensure secrecy for spies, military, and diplomats. The field has expanded to include techniques for message integrity checking, sender/receiver identity authentication, digital signatures, interactive proofs and secure computation, ..
    [Show full text]
  • Question 1.1. What Is the RSA Laboratories' Frequently Asked
    Copyright © 1996, 1998 RSA Data Security, Inc. All rights reserved. RSA BSAFE Crypto-C, RSA BSAFE Crypto-J, PKCS, S/WAN, RC2, RC4, RC5, MD2, MD4, and MD5 are trade- marks or registered trademarks of RSA Data Security, Inc. Other products and names are trademarks or regis- tered trademarks of their respective owners. For permission to reprint or redistribute in part or in whole, send e-mail to [email protected] or contact your RSA representative. RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography, v4.0 2 Table of Contents Table of Contents............................................................................................ 3 Foreword......................................................................................................... 8 Section 1: Introduction .................................................................................... 9 Question 1.1. What is the RSA Laboratories’ Frequently Asked Questions About Today’s Cryptography? ................................................................................................................ 9 Question 1.2. What is cryptography? ............................................................................................10 Question 1.3. What are some of the more popular techniques in cryptography? ................... 11 Question 1.4. How is cryptography applied? ............................................................................... 12 Question 1.5. What are cryptography standards? ......................................................................
    [Show full text]
  • THE DILEMMA for FUTURE COMMUNICATION TECHNOLOGIES: How to CONSTITUTIONALLY DRESS the CRYPTO-GENIE1
    THE DILEMMA FOR FUTURE COMMUNICATION TECHNOLOGIES: How TO CONSTITUTIONALLY DRESS THE CRYPTO-GENIE1 Jason Kerben "The proliferation of encryption of technology threat- munication.4 This system of communication has ens the ability of law enforcement and national security officials to protect the nation's citizens against ter- been used throughout history. One of the earliest rorists, as well as organized criminals, drug traffickers known examples of cryptography was used by Ju- 2 and other violent criminals." lius Caesar when he sent military messages to his "If the freedom of the press . [or freedom of speech] armies.5 Most cryptographic system have two perishes, it will not be by sudden death . It will be a 6 long time dying from a debilitating disease caused by a basic functions: encoding and decoding. The en- series of erosive measures, each of which, if examined coding function converts the normal data com- singly, would have a great deal to be said for it."3 monly known as "plaintext" into incompre- The preceding two statements epitomize the hensible data commonly known as "ciphertext."7 enduring struggle that has pitted the law enforce- The decoding function reverses the process, by ment community against those who are con- changing the "ciphertext" back into "plaintext." cerned with protecting their privacy interests. In order to perform these functions, a sequence The expanded use of advanced technologies in of bits, or "keys" must be obtained by the sender communications has propelled the cryptography and receiver of each message.9 The strength of debate into the spotlight. the coded communication is greatly dependent Cryptography uses codes to create secret com- upon the length of the key.' 0 This system is an I The term "crypto-genie" was apparently first used by au- metric cryptography is for an individual to choose two secret thor Steven Levy in 1994.
    [Show full text]
  • Applied Crypto Hardening
    DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan Applied Crypto HarDENING WOLFGANG BrEyha, David Durvaux, TOBIAS Dussa, L. AarON Kaplan, Florian Mendel, Christian Mock, Manuel Koschuch, Adi Kriegisch, Ulrich Pöschl, Ramin Sabet, BerG San, Ralf Schlatterbeck, Thomas Schreck, AarON Zauner, Pepi Zawodsky (University OF Vienna, CERT.be, KIT-CERT, CERT.at, A-SIT/IAIK, CORetec.at, FH Campus Wien, VRVis, MilCERT Austria, A-Trust, Runtux.com, Friedrich-AleXANDER University Erlangen-NurEMBERg, azet.org, maclemon.at) January 13, 2014 DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan Do NOT TALK UNENCRYPTED Applied Crypto HarDENING • DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan PAGE 2 OF 81 DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan AcknoWLEDGEMENTS WE WOULD LIKE TO EXPRESS OUR THANKS TO THE FOLLOWING REVIEWERS AND PEOPLE WHO HAVE GENEROUSLY OffERED THEIR TIME AND INTEREST (in ALPHABETICAL ORder): BrOwn, Scott Millauer, TOBIAS Brulebois, Cyril O’Brien, Hugh Dirksen-Thedens, Mathis Pacher, Christoph DulaunoY, AleXANDRE Palfrader, Peter Gühring Philipp Pape, TOBIAS (layout) Grigg, IAN Petukhova, Anna (Logo) Horenbeck, Maarten Pichler, Patrick Huebl, AxEL Roeckx, Kurt Kovacic, Daniel Seidl, Eva (PDF layout) Lenzhofer, Stefan Wagner, Sebastian (“SEBIX”) Lorünser, Thomas Zangerl, AleXANDER The REVIEWERS DID REVIEW PARTS OF THE DOCUMENT IN THEIR AREA OF Expertise; ALL REMAINING ERRORS IN THIS DOCUMENT ARE THE SOLE RESPONSIBILITY OF THE PRIMARY authors. Applied Crypto HarDENING • DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan PAGE 3 OF 81 DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan DrAFT REvision: ea089c8 (2014-01-11 22:11:44 +0100) AarON Kaplan AbstrACT “Unfortunately, THE COMPUTER SECURITY AND CRYPTOLOGY COMMUNITIES HAVE DRIFTED APART OVER THE LAST 25 years.
    [Show full text]
  • International Cryptography Regulation and the Global Information Economy Nathan Saper
    Northwestern Journal of Technology and Intellectual Property Volume 11 | Issue 7 Article 5 Fall 2013 International Cryptography Regulation and the Global Information Economy Nathan Saper Recommended Citation Nathan Saper, International Cryptography Regulation and the Global Information Economy, 11 Nw. J. Tech. & Intell. Prop. 673 (2013). https://scholarlycommons.law.northwestern.edu/njtip/vol11/iss7/5 This Comment is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY International Cryptography Regulation and the Global Information Economy Nathan Saper September 2013 VOL. 11, NO. 7 © 2013 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2013 by Northwestern University School of Law Volume 11, Number 7 (September 2013) Northwestern Journal of Technology and Intellectual Property International Cryptography Regulation and the Global Information Economy By Nathan Saper∗ I. INTRODUCTION .............................................................................................. 673 II. INTRODUCTION TO ENCRYPTION AND CRYPTOGRAPHY ................... 674 III. CRYPTOGRAPHY REGULATION AROUND THE WORLD ....................... 677 A. Cryptography Regulation, Generally .................................................................
    [Show full text]
  • Practical Aspects of Modern Cryptography 2 Agenda
    Winter 2011 Josh Benaloh Brian LaMacchia Agenda Guest lecture Final project presentation logistics The Politics of Crypto Export Controls Key Escrow The Clipper Chip Copyright and the DMCA Course evaluations March 10, 2011 Practical Aspects of Modern Cryptography 2 Agenda Guest lecture Final project presentation logistics The Politics of Crypto Export Controls Key Escrow The Clipper Chip Copyright and the DMCA Course evaluations March 10, 2011 Practical Aspects of Modern Cryptography 3 Final Project Presentations All sessions start at 6:30pm MSR Building 99 sessions will be in 99/1915 Thursday evening, March 17, at UW 15 Friday evening, March 18, at MSR 9 Wednesday evening, March 16, at MSR 6 Either Wednesday or Friday 5 If you selected this option (either Wed or Fri) please come on Wednesday March 10, 2011 Practical Aspects of Modern Cryptography 4 Agenda Guest lecture Final project presentation logistics The Politics of Crypto Export Controls Key Escrow The Clipper Chip Copyright and the DMCA Course evaluations March 10, 2011 Practical Aspects of Modern Cryptography 5 Why Talk About Crypto Politics? You can’t really avoid the political aspects of crypto, especially if you’re trying to ship a product that depends on good crypto In the past, the regulations have been so complex & time consuming that companies had dedicated individuals/departments for dealing with regs. Often public pronouncements don’t match reality Just because a government body says “crypto is freely exportable” doesn’t make it so March 10, 2011 Practical Aspects of Modern Cryptography 6 Caveats... I’m going to present a (mostly) U.S.-centric view of the issues Each country deals differently with these issues, but the U.S.
    [Show full text]
  • An Introduction to Cryptography
    An Introduction to Cryptography Jon Callas Chief Technology Officer and Chief Security Officer Rest Secured™ Release Information An Introduction to Cryptography. tember 2006. Copyright Information © 2008 by PGP Corporation. All Rights Reserved. Licensing and Patent Information The IDEA cryptographic cipher described in US patent number 5,214,703 is licensed from Ascom Tech AG. The CAST encryption algorithm is licensed from Northern Telecom, Ltd. PGP Corpor- ation has secured a license to the patent rights contained in the patent application Serial Number 10/655,563 by The Regents of the University of California, entitled Block Cipher Mode of Operation for Constructing a Wide-blocksize block Cipher from a Conventional Block Cipher. PGP Corpora- tion may have patents and/or pending patent applications covering subject matter in this software or its documentation; the furnishing of this software or documentation does not give you any license to these patents. Trademarks PGP , the PGP logo, Pretty Good Privacy , and Pretty Good are all registered trademarks of PGP Corporation. All other registered and unregistered trademarks are the sole property of their respective owners. Acknowledgements The compression code in PGP software is by Mark Adler and Jean-Loup Gailly, used with permission from the free Info-ZIP implementation. Limitations The information in this document is subject to change without notice. PGP Corporation does not warrant that the information meets your requirements or that the information is free of errors. The information may include technical inaccuracies or typographical errors. Changes may be made to the information and incorporated in new editions of this document, if and when made available by PGP Corporation.
    [Show full text]