[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Militarily Critical Technologies



The Militarily Critical Technologies List (MCTL) tersely
describes the full range of technologies controlled by the 
ITAR, EAR and Regimes like the Wassenaar Arrangment.
Information systems and cryptography are covered in
Section 8 of the MCTL which we've put with the TOC at:

     http://jya.com/mctl08.htm

It provides an informative chart that compares information
systems capabilities for 27 nations, and the leaders in a
few cases are surprising. 

The document summarizes crypto:

  1. Cryptanalytic Technologies (for breaking
  ciphertext): 

  Critical Parameters: Due to the numerous variables
  required to implement an information security scheme
  and the wide range of products and services in which
  information security can be deployed this technology
  does not lend itself to specifically enumerated
  parameters.

  Critical Materials: None identified.

  Unique Equipment: Computers of 10,000 CTP, or greater,
  and software specially designed to test the ability of
  cryptanalytic systems to perform key searches,
  statistical, linear and differential cryptanalyses; and
  factor 110 decimal digit, or larger, numbers.

  Unique Software: Operating systems and applications for
  massively parallel cryptanalytic processors (> 16
  processors) specially designed to perform statistical,
  linear and differential cryptanalyses, exhaustive key
  searches and quadratic and number field sieve
  factoring.

  Control Regimes: WA ML 11, 21; WA IL Cat 5.

  2. Cryptographic Technologies (for keeping data
  secure):

  Critical Parameters: Due to the numerous variables
  required to implement an information security scheme
  and the wide range of products and services in which
  information security can be deployed this technology
  does not lend itself to specifically enumerated
  parameters.

  Critical Materials: None identified.

  Unique Equipment: Computers of 10,000 CTP, or greater,
  and software specially designed to perform Randomness,
  Correlation, Weak Key and Symmetry Under
  Complementation tests to evaluate the strength of new
  USG encryption algorithms during development.

  Unique Software: The software providing the
  cryptographic functionality must be specially designed
  and integrated into each application. The system
  engineering and integration, user system interface,
  algorithms and key generators must have zero defects.

  Control Regimes: WA ML 11, 21; WA IL Cat 5.

The document states, "A high rate of IS knowledge transfer
from the US to foreign competitors occurs through open
source US trade journals, technical literature, various
international fora, the Internet and intelligence. As a
result, the US technology leadership in communications and
computer systems has declined in recent years relative to
Europe and Japan."

Section 9 covers Information Warfare Technology and will
interest those who wonder what technologies may be more
effective than cryptography for information security, as
the NRC Crypto Report suggested. We've put this section
(in its original PDF format) at:

  http://jya.com/mcsec09.pdf (122K)