[3146] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

We don't need a PKI to build universal strong encryption

daemon@ATHENA.MIT.EDU (John Gilmore)
Wed Aug 5 14:14:39 1998

To: cryptography@c2.net, gnu@toad.com
In-reply-to: <v03130302b1ee226908ad@[24.128.118.45]> 
Date: Wed, 05 Aug 1998 10:50:14 -0700
From: John Gilmore <gnu@toad.com>

Arnold Reinhold said:
> I think what Hambre and FBI Director Freeh really fear is universal strong
> encryption, where almost everyone's e-mail and even phone calls are
> strongly encrypted just because they have Windows 2002 installed. Doing
> that requires a public key infrastructure and that is not so easy to build.

Universal strong encryption does NOT require a public-key infrastructure!

The Diffie-Hellman "key agreement" protocol can agree on keys to
protect 99.99% of the traffic with no additional public-key crypto,
and no infrastructure.  Widely deployed D-H that then keys Triple-DES
or some other strong cipher would protects against all passive attacks
except traffic analysis.  It would require specific intervention in
your phone call with customized equipment -- or physically bugging
your house -- to recover the contents of the message.

If you want to make that 100x as secure, you can have the two sides
authenticate each other with a public key they remember from session
to session (as SSH does).  When you call Joe, your phone starts
shrieking if Joe's suddenly got a different public key than he did the
last time you called him.

If you want to make it another 1000x as secure as that, then you need
a public-key infrastructure.  

But let's do steps one and two first -- there is NOTHING the government
can do to stop us!

> So they feel they still have time to influence how it is designed.

So do we.  And we're in the heart of the industry that's building
these products.

	John


home help back first fref pref prev next nref lref last post