|
![]() |
![]()
on cryptography |
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
The View From Here: Your Word Is Your Bond
November 1995
This column aims to give you the practical basics for understanding, obtaining, and using cryptographic software to protect documents on your computer and email while in transit to another person.
Most likely you're using your computer - and your connection to networks - more and more for communicating with others. One would hope that not all of this traffic is trivial, unimportant, insignificant. Do you ever say anything that matters? I mean really matters?
Do you send employee evaluations, business strategems, sensitive data, or anything else you would rather not have your co-workers or competitors know before you're ready? Catty electronic mail (email)? Do you send notes of a personal nature to others? Romance? Self-help?
What about documents on your office and home computers? Anything you would prefer a snooping employee not read while you're out for a three-martini lunch? Anything you're not ready to have your significant other or offspring read?
Encryption - properly used - provides a way for you to control who sees your documents while the documents are on your computer. It also provides a way for you to control who can read your email (but not what they do with it once they decrypt it and read it). It also protects your email should it be perused in transit by a bored (or ill-intentioned) person in between you and the intended recipient, or should it bounce to a third-party postmaster (if you provide a bad email address, or a system is down, or some other unforeseen pothole on the net). If you have something you don't want to fall into the public domain, it's your responsibility to protect it.
Hiding the contents of email from the prying eyes of others is only one part of what we value in communications (such as when we spend money certifying or registering a letter through the postal services).
Each of the goals I've mentioned can be reached with the use of some rather simple mathematics (which you won't have to learn) and some rather elementary properties of prime numbers. Boiled down to one sentence, it's easy to multiply prime numbers, but a royal pain the the processor to factor them out of the product. Modern practical cryptography relies on this. "Asymmetric public key cryptography" provides us with
This last point is particularly important in an increasingly networked world, where having to meet each person at least once beforehand would be somewhere between impractical and impossible.
Okay, okay. Here we go.
Will Price's CryptDisk for Macintosh is all the program you'll ever need to protect the files on your computer. Once you've obtained CryptDisk, all you have to do is fire it up, make one (or more) encrypted folders, and put the files you want to protect in them. CryptDisk is so fast that you'll never notice it's there, except the first time you use that folder, when you'll have to provide a "pass-phrase".
Windows users have the DOS-level Secure File System, about which I'm not qualified to speak.
I use CryptDisk on my Macintosh PowerBook to store the folder hierarchy that "Eudora" (my email program) uses. Every message I send and receive is protected while on my machine. Since I take my PowerBook everywhere I go, from client to client and from country to country, I think it's prudent to protect my email.
CryptDisk satisfies only one of my four goals. I use Philip Zimmermann's
Once you obtain "PGP", you'll have four steps to follow before you're to communicate privately.
You now enjoy security for documents on your computer and during email transmission. There's much more to the fascinating world of cryptographic than what I've had space to describe, including secure voice communications (with PGPFone) and public debates on the appropriateness of privacy (or the stricture against it) in a democratic society.
Just some things you should know to round out this column.
In-depth documentation comes with each program; please read these files. You could stand to lose your data if you don't know how to operate cryptographic software.
If you're a Eudora for Macintosh user, you'll probably want to get the "MacPGP Kit", a set of AppleScripts that seamlessly unite PGP and "Eudora".
What some people don't understand about unbreakable security is that it's unbreakable. If you forget your pass-phrase, what you've encrypted is lost forever. Forever. It happened during a "coup in Trinidad" with tragic results.
There is a war going on, and know it or not, you'll be affected by its outcome. The war is being waged by the United States government against your ability to keep a private diary or to communicate in privacy with others. They want to be able to read everything you've stored on your computer or sent to others. The war is over in France, Iran, and Iraq; their citizens no longer have those rights. (The French government, which spies on its own citizenry, also "monitors" foreign companies doing business in France and passes the information gleaned onto local companies, and has an economic as well as a security incentive to prevent private communications.)
Debate and legislative implementation has been going on for several years, and continues today. There is much information available to you from my web pages, Wired magazine, the Cypherpunk archives, Computer Professionals for Social Responsibilty, and the Electronic Frontier Foundation.
It's interesting to note that the methods of encryption, RSA and IDEA, do not need to be hidden. The strength of these algorithms do not come from being secret, but rather on the properties of prime numbers and intense peer scrutiny of the source code for defects and weaknesses. Never, never, never, never trust a proprietary (secret) algorithm. They're worthless for these reasons:
Algorithms need to see the light of day, and to survive lengthy and concerted attacks. Both RSA and IDEA have survived them.
There are known algorithms for factoring primes out of a product. They are a mix of brute force and eliminating unpromising avenues of attack before wasting time on those attacks. They will, eventually, factor that product. We make "eventually" longer that the expected lifetime of the universe by choosing a proper key-length. (In cryptography, size counts.) A 512-byte key, considered unbreakable in 1982, is questionable today. It's been replaced by a 1024-byte key. The paranoid among us use a 2048-byte key. (The trade-off is the increased amount of time your computer will spend on each message if it has to process a 2048-byte key than a shorter one. Only you know how secure you need your information to be.)
Everything I've written holds true for factoring algorithms known to the public. It is always possible that a cryptographer in the employ of the "National Security Agency" (or somewhere else) has discovered a much quicker way to factor products. If this is true, the protection provided by a key of a certain length drops. It is the common belief of the cryptographic community that this is not terribly likely, especially as civilian cryptographers are doing their best to find such a thing. The upshot of finding one would be that we'd need to increase the length of our keys.
It is also possible that a cryptographer will discover some fatal flaw in the mathematics of prime number cryptography, and IDEA and RSA (and the software that depends upon them) will become worthless. Other methods have fallen before the passage of time. If that happens, I'll have to write another column.
Michael 'Mickey' Sattler has been involved in the cryptographic community since around 1982 (check out My PGP Story), when he coded an implementation of RSA with the help of "R". He has just finished one book, entitled Internet TV with CU-SeeMe, and is working on another, about electronic communications and security. He's a beta-tester for cryptographic communications software that you'll be using in 1996.
|
Have you found errors nontrivial or marginal, factual, analytical and illogical, arithmetical, temporal, or even typographical? Please let me know; drop me email. Thanks! |