[280] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: GAK in domestic crypto products

daemon@ATHENA.MIT.EDU (David Wagner)
Fri Feb 21 21:36:51 1997

To: cryptography@c2.net
From: daw@cs.berkeley.edu (David Wagner)
Date: 21 Feb 1997 17:41:05 -0800

In article <2.2.32.19970221202425.006c7178@remote.transarc.com>,
Lyle Seaman  <lws@ms.com> wrote:
> I think that all this is saying is that if a domestic entity (person,
> server, whatever) is communicating with a foreign entity (person, client,
> whatever), then the keys which are obtained must be able to decrypt data
> flowing in each direction.  
> 
> I don't see how it makes it terribly difficult to interoperate.

Oh, but it does, for offline store-and-forward communications.  (Think email.)

In more detail, you must make sure that recipients who can support non-GAKed
crypto will receive email encrypted with non-GAKed keys; how does the domestic
sender know what security level the recipient can support?

(You'll end up re-designing the concept of autocerts, and you'll have to make
sure that those autocerts get distributed *securely* by the key distribution
infrastructure along with each public key.  Now try to figure out how to do
this for PGP -- heh, good luck.  Raph Levien has talked about this a number
of times.)

The S/MIME folks, in fact, ran into this problem headlong, as Raph reported
some months back.  I don't know whether they've solved it satisfactorily by
now, but it could represent a weak underbelly; the problem certainly presents
non-trivial design issues.

Matt Blaze likes to point out that GAK adds lots of untested complexity to
our cryptosystems; and complexity is directly at odds with robust security.
He's right, and this is yet another example of that general principle.

home help back first fref pref prev next nref lref last post