Re: Comparing PGP to Symantec's Secret Stuff

(I just posted this in a discussion on alt.security.pgp, and thought it might also be of interest to the List. _Vin) ALCO Jakarta <alcojkt@bit.net.id> queried the Newsgroup:
Could anyone give me a quick trun-down on the difference between these two programs and which one is more secure? Is the latter more practical to use than PGP 2.6.2?
That's comparing real crypto vs a sophisticated version of the Captain Crunch crypto ring. PGP in all of its forms uses strong crypto, which is why it is difficult to legally export it from the US to any overseas entity, except branches and subsidiaries of US firms. (Thus, the effort to sustain the international version of PGP, and PhilZ's long travail while the US govt tried to investigate how those sneaky non-Yanks got their hands on this oh-so-useful RSA/IDEA utility.) Norton Secret Stuff secures the data using the 32-bit Blowfish encryption algorithm -- which is why it's approved for unrestricted export outside the US by the U.S. government. It's far better than, say, ROT13 -- but it would not provide meaningful confidentiality or security for anything of any worth, or anything which might otherwise spur a curious and clever grad student to spend somewhere between a couple hours (with a college computer lab at his proposal) to a few days (on a fast PC) doing a brute force search of all possible 32-bit keys. A more complex comparison would put PGP against Norton's YEO, but that too is an apples to oranges matchup, albiet with strong crypto on both sides. PGP was designed to be a mail encyptor. YEO -- with RSA + RC4, RC5, DES, DES3, and Blowfish too, I think -- was designed as a file and disk encryptor. Each is optimized for its primary function. The lack of published source code is an issue, but if you see such a product being purchased by multinationals or US defense contractors you can be certain the implementation -- which is the real arena of vulnerability, once the algorithm is chosen -- has been carefully studied by informed cryptographers. (For non-American product, look for similar purchases by government-connected agencies in the vendor's nation.) You don't sound like the source code is going to do _you_ any good, right? Like most buyers, you have to trust the judgement of talented pros somewhere.
I use PGP and don't find it's use so difficult to master even as a rookie in cryptographic matters. But this Secret Stuff program is commerical so I don't trust it's degree of security to gov't snooping based on my suspicion of corporate submission to gov't will. Is that a reasonable assumption?
Actually, corporate or commercial products are better than that. Secret Stuff is overtly weak crypto. It's also free from Symantec. Norton YEO from Symantec, or any competitive heavy-duty product like RSA SecurPC, will be clearly labelled as to the relative strength (key length) of their crypto -- strong for domestic user; weak for the intl mass market -- in terms anyone with a basic understanding of crypto and crypto export regs can understand. Export permits for the strong domestic versions of products like these will be all but impossible to obtain for mass market sales to non-American individuals. (Neither of these firms probably sells or even tries to sell the export version overseas; the weaker products exist largely because US corporate buyers demand an interoperable product that _can_ be shipped to overseas associates.) Export permits to ship the strong-crypto version of these products American corporations will require that the vendor have a key recovery mechanism -- no big deal, since we are dealing with stored files, so backup access is a standard requirement for disaster recovery -- which is to be held by the US firm in a location which makes it accessible to legal US court orders. Any and all US firms will respond to a legal court order to provide information. (Commercial firms in other nations will provide any info they hold when confronted with a court order too, right?) It is always rash to expect any commercial firm in any nation to be either a martyr or an arbiter of moral or political issues. Corporate officers have fiduciary responsibilities and they can be replaced. Corporations get a set of rules from the society in which they operate, and then -- within the context of those rules -- they seek to maximize their profit and their stockholders' return on investment with a certain degree of ruthless intensity. That's the nature of the beast. When corporate self-interest and some corporate executive's personal philosophy line up, we get some interesting fireworks -- sometimes even heroic moments which dramatically change the course of a government's industrial policy, as in the US banks vehement rejection of the NSA's CCEP and Clipper programs. The apparent exception really validates the rule. It's really rare for the US govt to try to overtly challenge or crush an American firm like they did with RSADSI for a decade. The NSA tried to bully the US banking industry and got handed its collective head -- and got branded as naive and turned into something of a laughingstock as well. On the other hand, commercial vendors which provide a product for sale have to describe and warranty that product as having certain properties. If those products are used by individuals or commercial customers and fail to measure up to their advance billing, the vendor is thereafter liable for significant (even company-threatening) losses, in both recompense and punitive damages. That's commercial law in the US -- no matter what sort of mealy-mouth language might be in the shrink-wrap license. US lawyers get a blueprint of an altar upon which they can sacrifice such firms when they get their law degree. Corporate "submission to gov't will" is a real issue, particularly for vendors of privacy and security tech -- but for US firms, it is far more likely to play out formally (as with a court order for a message recovery key) or in some negotiated backroom deal where the government demands some feature added, or asks for some feature to be removed from free-market product, before the vendor is given some commercial advantage like a government contract, or GSA approval, or an export permit. You see the whole American IT industry being put through this sort of blackmail in the current US crypto export policy. Only vendors which have or agree to design key/message "recovery" mechanisms in file or communications crypto apps get export permits to ship their 56-bit versions of their crypto products -- or (among other vendors,) crypto-enhanced applications like RDBSs and operating systems -- to the international market. Nothing subtle or secret about that -- and historically, the model has probably been pretty much the same, if less blatent. US export controls in crypto exist to bludgeon the vendors, so that the US govt can obtain something it wants in that company's domestic or overseas product lines. (It certainly does not restrict the international bad guy's access to strong crypto, no matter what the latest Four Horseman propaganda is.) Today, I think this leverage is probably being applied more on the big US vendors of operating systems and networking software and major applications -- all of which require crypto for their commercial products today -- than it is upon the puny crypto vendors (who are, relatively speaking, small potatos and aren't allowed to sell strong versions of their products -- even with message-recovery -- to anyone interesting, anyway;-) In commercial encryption products, the hidden backdoors of myth and legend are far less likely, given the liability issue and US commercial law. Overt and well-labelled backdoors are a different story. <sigh> Surete, _Vin "Cryptography is like literacy in the Dark Ages. Infinitely potent, for good and ill... yet basically an intellectual construct, an idea, which by its nature will resist efforts to restrict it to bureaucrats and others who deem only themselves worthy of such Privilege." _ A thinking man's Creed for Crypto/ vbm. * Vin McLellan + The Privacy Guild + <vin@shore.net> * 53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548

Vin, Having worked for those multinationals and defense contractors, I've seen them buy new products with serious weaknesses in key generation, with year 2000 problems, with stream ciphers used to protect stored data--keyed the same way each time. I've seen them use code that sent cleartext where it should have been encrypting on the wire. I could retire a rich man if I never wanted to come back to the US. Do due dilligence yourself. Read the snake oil faq. Insist on speaking to someone at the vendor with two brain cells to rub together. If they claim Acme bought it so you should, too, insist on speaking to the security folks at Acme who did the eval. Its your money. Its their security product. Feel free to evaluate it right. If the vendor won't cooperate, go elsewhere. The product I'm building uses 'brand name' cryptography-- libraries and tools from well known sources. It takes a bit of speed away (I'd have prefered to use X9.17 over SSL for our bits on the wire, but I couldn't find a peer reviewed X9.17 library out there.) Adam Vin McLellan wrote: | The lack of published source code is an issue, but if you see such a | product being purchased by multinationals or US defense contractors you | can be certain the implementation -- which is the real arena of | vulnerability, once the algorithm is chosen -- has been carefully studied | by informed cryptographers. (For non-American product, look for similar | purchases by government-connected agencies in the vendor's nation.) -- "It is seldom that liberty of any kind is lost all at once." -Hume

Adam Shostack <adam@homeport.org> wrote:
Having worked for those multinationals and defense contractors, I've seen them buy new products with serious weaknesses in key generation, with year 2000 problems, with stream ciphers used to protect stored data--keyed the same way each time. I've seen them use code that sent cleartext where it should have been encrypting on the wire.
I could retire a rich man if I never wanted to come back to the US.
Do due dilligence yourself. Read the snake oil faq. Insist on speaking to someone at the vendor with two brain cells to rub together. If they claim Acme bought it so you should, too, insist on speaking to the security folks at Acme who did the eval. Its your money. Its their security product. Feel free to evaluate it right. If the vendor won't cooperate, go elsewhere.
Now how could anyone disagree with that;-) The problem is: how does someone like my online correspondent from Jakarta, a self-described innocent in cryptography, deal with his need to purchase a commercial crypto product now. I was suggesting helpful guidelines for a guy with a decision to make, not an optimal solution for a crypto-savvy buyer in a consumers' paradise. If he can get the odds in his favor as far as the basic security of the products he is choosing among, what he (most managers) will look for is ease of use, even transparency. Come the Revolution, we'll make them all show their stuff, publish the source code, and dance in the streets. Then, of course, we'll have to force other guys to study it and report to us. Once we develop some system of retribution for those who review in ignorance or exhibit bias, I'm certain we'll have the problem licked.... ;-)
The product I'm building uses 'brand name' cryptography-- libraries and tools from well known sources. It takes a bit of speed away (I'd have prefered to use X9.17 over SSL for our bits on the wire, but I couldn't find a peer reviewed X9.17 library out there.)
Vin McLellan wrote:
| The lack of published source code is an issue, but if you see such a | product being purchased by multinationals or US defense contractors you | can be certain the implementation -- which is the real arena of | vulnerability, once the algorithm is chosen -- has been carefully studied | by informed cryptographers. (For non-American product, look for similar | purchases by government-connected agencies in the vendor's nation.)
-- "It is seldom that liberty of any kind is lost all at once." -Hume
Vin McLellan + The Privacy Guild + <vin@shore.net> 53 Nichols St., Chelsea, MA 02150 USA <617> 884-5548 -- <@><@> --

At 3:01 AM -0800 12/16/97, Vin McLellan wrote:
Norton Secret Stuff secures the data using the 32-bit Blowfish encryption algorithm -- which is why it's approved for unrestricted export outside the US by the U.S. government.
This is the first I've heard of a Blowfish based produce being approved for export. Since Blowfish has about 9 bits worth of protection against brute force searches in its key schedule, this is about a 41 bit approval. Does anyone know of an export permit for a version of Blowfish with a key longer than 32 bits? ------------------------------------------------------------------------- Bill Frantz | One party wants to control | Periwinkle -- Consulting (408)356-8506 | what you do in the bedroom,| 16345 Englewood Ave. frantz@netcom.com | the other in the boardroom.| Los Gatos, CA 95032, USA

Having worked for those multinationals and defense contractors, I've seen them buy new products with serious weaknesses in key generation, with year 2000 problems, with stream ciphers used to protect stored data--keyed the same way each time. I've seen them use code that sent cleartext where it should have been encrypting on the wire.
I second this. The pitiful state of "secure code" is shocking. (Actually, I just wrote an essay on the topic. Get a copy for yourself at: http://www.counterpane.com/pitfalls.html.) Bruce ************************************************************************** * Bruce Schneier For information on APPLIED CRYPTOGRAPHY * Counterpane Systems 2nd EDITION (15% discount and errata), * schneier@counterpane.com Counterpane Systems's consulting services, * http://www.counterpane.com/ or the Blowfish algorithm, see my website. **************************************************************************

At 08:56 PM 12/16/97 -0800, Bill Frantz wrote:
At 3:01 AM -0800 12/16/97, Vin McLellan wrote:
Norton Secret Stuff secures the data using the 32-bit Blowfish encryption algorithm -- which is why it's approved for unrestricted export outside the US by the U.S. government.
This is the first I've heard of a Blowfish based produce being approved for export. Since Blowfish has about 9 bits worth of protection against brute force searches in its key schedule, this is about a 41 bit approval. Does anyone know of an export permit for a version of Blowfish with a key longer than 32 bits?
Blowfish with a 32-bit key has been approved for export before. The argument is that the long key setup time makes 32-bit Blowfish as weak as 40-bit anything else. I don't particularly agree, but there you have it. Bruce ********************************************************************** Bruce Schneier, President, Counterpane Systems Phone: 612-823-1098 101 E Minnehaha Parkway, Minneapolis,MN 55419 Fax: 612-823-1590 http://www.counterpane.com
participants (4)
-
Adam Shostack
-
Bill Frantz
-
Bruce Schneier
-
Vin McLellan