[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Fighting the Wiretap Chip Plan




When this "Clipper chip" story broke, I was off on an extropian (if 
not cypherpunk) activity--helping freeze Alcor's 27 patient (another 
HIV+ case.)  

I doubt I am the strongest hardware person on these groups, but nobody 
else has commented on this aspect.  You just *can't* make chips 
entirely resistant to reverse engineering.  I know, I have spent close 
to 10% of my engineering career reverse engineering things.  Given 
time and a few samples, *any* chip can be reverse engineered.  This is 
especially true with tools such as SEM stimulator/state readers and 
Focused Ion Beam chip slicers and dicers widely available.  *Somebody* 
will dig out every gate in their spare time.  Thus the following 
statement looks very odd: 

>Q:   How strong is the security in the device?  How can I be sure
>     how strong the security is?
>
>A:   This system is more secure than many other voice encryption
>     systems readily available today.  While the algorithm will
>     remain classified to protect the security of the key escrow
>     system,

Say what?  Does this mean that if somebody slices up a chip and 
publishes the algorithm the "security of the key escrow system" is 
broken?  Can a representative of the government say why, or if, this 
is the case?  If it is not the case, why not publish the algorithm and 
be done with it?  Because, soon as the chip can be bought over the 
counter or stolen, the algorithm will be deduced.

>             we are willing to invite an independent panel of
>     cryptography experts to evaluate the algorithm to assure all
>     potential users that there are no unrecognized
>     vulnerabilities.

Well, unless the "independent panel" includes people who can follow 
the algorithm all the way through to silicon, I would not trust their 
report even if I trusted the experts, and that goes double for the 
next set of masks. 

Keith Henson