Accessibility

6.033--Computer System Engineering

Discussion Ideas Surrounding the Clipper Chip.

by J. H. Saltzer, 23 April, 1993


Only a few of the following points are original; most are based on
conversations and reading of RISKS, PRIVACY-FORUM, and private e-mail
messages.

- The algorithm is secret.  Why?  (To reduce ability for terrorists to
reproduce it in software?)

- The government will invite a team of experts to examine the
algorithm. What is the problem with this proposal?  Will anyone be
willing to join the team if it requires signing a non-disclosure
statement or obtaining a security clearance?

- Can the algorithm be properly evaluated without being publicly
revealed?  What would it take to convince you that the algorithm was
secure?

- Once a key is obtained it can be used to unseal all past (recorded)
and future conversations with that telephone.  No provision for
protecting keys revealed to Law Enforcement agencies.  (They make a
list?)

- One can buy several telephones, and use different ones at different
times, for different purposes, thus impeding the warrant process. Does
this opportunity reduce the value of the Clipper Chip concept?

- Does national security require a warrant?  If not, how do the escrow
agencies handle national security requests?

- No method is suggested for initial session key exchange.  Why not?
Perhaps it would be too hard to get agreement now?

- Clinton administration couldn't have had time to work this out; must
have been presented as a fait accompli.  Perhaps leaped in prematurely?

- What would public reaction be to a requirement that locksmiths must
report your house key tumbler settings to a bank to be held in escrow,
in case they are needed by law enforcement agencies?  How about a law
requiring that TV cameras be installed throughout your home, but that
they can be activated only by court order?  Are these valid analogies?

-  Supposing that the SkipJack algorithm is an 80-bit DES, how secure
is it against chip technology that is improving in speed at 50%/year?

- what is to stop people from doing their own encryption?  Modern PC's
are beginning to provide digital interfaces to the telephone line
(nominally to grab caller ID and look things up in a data base, and
perhaps to program a digital answering machine), so packages that can
do really secure encryption could soon be available at Egghead
software.

- is there a risk that this is the first step in the direction of
outlawing civilian use of unapproved encryption systems?  What, if
anything, would stop movement in that direction.

- Q&A statement says that this development does not expand authority of
law enforcement.  Is there a benign inefficiency argument that says
that although the authority doesn't change the effect of that authority
does? Imagine an FBI agent in an office in Denver sending an
(authenticated) e-mail message to a judge in California asking for a
warrant that direct PacBell to send to Denver a copy of all bit streams
going to and from a particular San Jose telephone.  The warrant returns
that day by e-mail, is forwarded to Pac Bell, and the bit streams start
arriving a few minutes later.  The agent starts recording all the
forwarded bit streams, then decodes the identification packet and
forwards, by authenticated e-mail, a request to the two escrow agents
for the underlying keys.  They return by e-mail a few hours later and
the agent begins decoding.  All without leaving his office.  Is this
scenario realistic?  Does it represent a qualitatively different result
from one where the agent must personally visit a wire center in San
Jose, install alligator clips and a tape recorder, and come back to
pick up the tapes?

- The system is "more secure than many other voice encryption systems
readily available today".  Does this provide any reassurance at all?

- Is it plausible that the "Family" key ("F" in Denning's note) can be
kept secret?  How many people have to know it?  What value is there it
keeping it secret?  Who benefits from its secrecy, and who finds it a
hassle?

- Is there a believable threat to privacy from traffic analysis
(starting with a log of who is calling whom and initiating secure
conversations)

- Is it appropriate for a proposed national standard to depend on a
technology that only one company has access to?  That in order to enter
the market, other companies must obtain security clearances? For which
foreign competition is effectively forbidden?

------------------------------------------------------------------------

Here are several suggestions from Andre DeHon:

Cipra points out that the rapid rate of progress in computer power may
undermine the trustworthiness of digital time stamps.  Explain how the
problem is worse  or better for secure communications using encryption?
How does Clipper address the issues?

...as far as I can tell, it does not.  However, that does seem to be an
omission worth noting.

Given what you know about the progress of computer technology, what
kind of guarantees can you expect for secure communications?

That idea is to focus in on formulating a  specific guarantee like the
one Rivest develops: mean-time-to-cryptanalyze = f(T[i.e. year],$) -- make
some ballpark assumptions and come up with a rough formula -- should
also note that your security has a finite lifetime)

One key component of the community outrage is that the standard  was
not developed under public scrutiny.  Given what has (and particularly
has not) been said about Clipper, what technical concerns should you
have?

The government is trying to embed encryption technology into the  NII.
Does the government understand the end-to-end argument? Does the
government understand technology progress?



Comments and suggestions: Saltzer@mit.edu