[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NRC Session Hiss



Lucky Green wrote:
> That PGP is ubiquitous is subject to discussion. PGP is widely available,
> but that doesn't mean that it is widely used. What percentage of email is
> PGP encrypted? Less than half a percent?

   Full agreement here. Further, nothing that the PGP people are doing 
seems likely to fundamentally change this fact.

> PGP was a failure in the mass market, regardless how popular it may be
> with some subscribers of this list. The email encryption method that *will*
> be ubiquitous and that will cause PGP to be used only by a relatively
> small fringe is S/MIME. Within a few months, S/MIME will be on the
> desktops of some 20 million people. It, not PGP is the future standard.

   Yes.

> Of course S/MIME will default to 40 bit RC-4 and carry the signatures
> outside the encryption envelope. There is little doubt in my mind that
> the pannel will find it much easier to support than PGP.

   Actually, this is the case in the current standard, but in the next 
one, it might change.
   I'll try to bring cypherpunks up to date - the debate is still 
happening on the smime-dev mailing list.

   A couple of weeks ago, one of RSA's consultants in Washington got what 
appears to be approval for certain relaxation of the export rules for 
S/MIME. The rules themselves apply to S/MIME only. They are also quite 
confusing, mostly because capabilities for message sending and message 
receiving are so asymmetric. I'll try to briefly summarize the 
characteristics of exportable S/MIME clients here.
   Signature generation is quite good - signatures can be generated and 
verified at 2048 bits. This applies both to messages and certificates. The 
limitations apply to encryption only.
   Basically, an exportable S/MIME client can transmit messages up to 
1024/40 bit RSA/RC2 (or RSA/DES), and receive messages up to 512/64 bit 
RSA/RC2 (or RSA/DES, but in the latter case I would imagine it's actually 
restricted to 512/56 because of the keysize of DES). Note that the 
asymmetry actually points in different directions for the public and 
symmetric keysizes.
   Most users of exportable clients will want to generate separate RSA 
keys for signatures and encryption, otherwise signatures would be limited 
to 512 bits.

   In any case, the fact that RSA keysizes are linked to symmetric 
keysizes is _extremely_ good news. It means that that it is possible to 
tell whether the recipient is an export version or not. If the keysize is 
512 bits or less, the default algorithm should be 64-bit RC2. Otherwise, 
it should be 168-bit Triple-DES. If you work it out, you'll see that this 
policy will not cause any interoperability problems. For example, if the 
default encryption algorithm were simply changed to Triple-DES, then 
export clients would be unable to read the message at all.

   I'm pushing to get this policy codified in the S/MIME implementation 
guidelines and also widely implemented. If this happens, there really 
wouldn't be much point in trying to keep PGP alive.

   Of course, the division into export and domestic versions would still 
probably ensure that most of the clients in the field were restricted to 
export-grade, but I think it's likely that the population of non-export 
clients will far exceed that of PGP, so it's progress in any case. Also, 
if S/MIME catches on, it creates a fabulous opportunity for a company 
outside the US to market good S/MIME clients.

Raph