|
The Security Team: Mark Bayer - KSG Raghav Chandra - KSG Jaime Chambron - FAS Jamil Ghani - FAS Nanthikesan - KSG Angelina Ornelas - KSG Alex C. Snoeren - MIT |
| Tech Note: Ideally, the security of a cryptosystem is based on the difficulty of finding the appropriate key. Keys are chosen from some key space, the size of which is usually given by the length of the key. A 56-bit key comes from the space of all 56-bit long integers, from 0 to 256. A brute force attack might need to try each of the 72 quadrillion possibilities. Since the key space grows exponentially, a 64-bit key would be 256 times harder to crack. |
Congress should seriously consider legislation that would impose criminal penalties on the use of encrypted communications in interstate commerce with the intent to commit a federal crime.The CRISIS report did, however, acknowledge that "on balance, the advantages of more widespread use of cryptography outweigh the disadvantages." The difficulty, then, is determining the appropriate levels for both domestic and international use.
| Tech Note: In January, 1997, a Berkeley student cracked a 40-bit key in three and a half hours by harnessing the power of 250 networked Sun workstations. Using 3,500 networked systems along with several super computers, a student at the Swiss Federal Institute of Technology was able to crack a 48-bit key in 13 days. Deputy Director of the NSA, William Crowell, noted that it would have taken the Berkeley machines 9 trillion times the age of the universe (roughly 15 billion years) to break a 128-bit key. Even if all the estimated 260 million computers in the world were set to the task, it would still take roughly 12 million times the age of the universe. |
Security levels, costs, measures, practices and procedures should be appropriate and proportionate to the value of and degree of reliance on the information systems and to the severity, probability and extent of potential harm, as the requirements for security vary depending upon the particular information systems.As Dorothy Denning, a well-known technical expert, has noted, users sometimes perceive that stronger security is needed than is actually required: "Domestic versions of products often use key lengths far in excess of what is needed to prevent compromise. For example, the domestic version of Netscape's Navigator 3.0 offers 125-bit RC4 and 168-bit Triple-DES. Breaking such keys by brute force is totally infeasible and could remain so forever." More robust technologies often require higher degrees of technical sophistication and take longer to implement than weaker versions. In general, users should take into account the sensitivity of their communications, physical steps they can take to improve the security of their data, cost and ease of use when deciding the level of security to use.
| Continue to Current Crisis | Return to the Outline |