Breaking Iranian Codes (Re: CRYPTO-GRAM, June 15, 2003)

At 4:03 AM -0500 6/15/04, Bruce Schneier wrote:
-- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

"R. A. Hettinga" <rah@shipwright.com> forwarded:
Someone (half-)remembered reading the Crypto AG story in the Baltimore Sun several years ago, bragged to Chalabi that the US had compromised Iranian crypto, and the story snowballed from there. The story could have started out with a loquacious (Sun-reading) cab driver for all we know. Some reports have suggested the source was drunk, so maybe it was a drunk in a bar. Maybe Chalabi read the story himself and invented the snitch to make it seem more important than it was, or to drive the US security community nuts with an orgy of internal witch-hunting. Given the lack of further information, it could have been just about anything. Peter.

Crypto AG's website denies the allegation of its machines being compromised. Its FAQ claims the false the story got started in 1992 by a disgruntled employee. There, that reassures Iran, Botswana, Nigeria and Uganda. NSA never had those meetings with the machine designers. Now, how about that story of Phil Zimmermann getting out of prosecution by agreeing to a backdoor in PGP after 2.0? A man swears Phil told him that face-to-face, man says he disassembled the source code to see the damning hole. And the one about PK being rigged at birth, not the Brit version, the one made in the USA. A drunk ex-NSA had that on a ready-to-lose laptop bar-lifted by A. Melon. And the uncrackability of crypto-mathematics, need only to worry about faulty implementation and poor passwords and black bag jobs and key loggers and insiders and EM leakage. Heard the one about TEMPEST being a long-running tail-chaser?

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 At 2:09 PM -0400 6/15/04, Jack Lloyd wrote:
Erm... he disassembled source code? With what? Emacs? Or vim maybe?
If you look down a bit, you might notice he's pulling your leg. If you're not *real* careful, he'll pull it clean off and beat you over the head with it. Besides, he's an architect, ferchrissakes. The only disassembly he knows about is done with stuff like this: <http://www.rocklandmfg.com/demolition_attachments.htm>
BTW, I met a guy once who swore you were an fed informer. I mean, he sounded really positive. Said you had told him yourself.
Naw. That was his brother-in-law, or something. The one in Maryland, someplace. A venerated man in his profession, John's still an old lefty from way back. If you squint real hard, maybe you can see him in the crowd here: <http://www.columbia.edu/acis/history/68-dead.html>. ;-) He ain't no spook. His heart would stop, or something. There are lots of people who hate the state from the left. John's one of 'em -- if you can understand what he says. :-) Cheers, RAH -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQM9UZsPxH8jf3ohaEQIF+ACgwp8+iQCp0ZQvJfQ+tHgd9592IdkAnRvQ JIgNq+x70jzgFNAoWmwKBcRJ =KS9O -----END PGP SIGNATURE----- -- ----------------- R. A. Hettinga <mailto: rah@ibuc.com> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

Maybe Chalabi made up a story that turned out to be true and, like the 1965 movie "I saw what you did and I know who you are" where a pair of teenagers make prank calls at random and say that sentence -- which is fun until they ring up a guy who just murdered his wife -- now has to explain that which is impossible to explain. --dan

James Bamford is an author of several books, including some of the first on the National Security Agency, the code breakers and signals intelligence operators. He has written a recent book on intelligence manipulation in the run up to the Iraq war. During a radio interview he was asked about the Iranian code crack. http://freshair.npr.org/day_fa.jhtml;jsessionid=0DIL5REBMCVQPLA5AINSFFA?display=day&todayDate=06/08/2004 His reply, from sources in the NSA- Current cryptosystems are very complex and hard (near impossible) to crack. The way its done now a days (as opposed to WWII Ultra efforts), is to penetrate an embassy (in this instance, Iran's embassy in Baghdad) and bug the hardware, getting the information before its encrypted. Of special interest- bug the keyboard, bug the monitor, bug the power cord. How its gathered by the interested parties was not discussed, Yours- Ridge ---------------------------------- Peter Gutmann wrote:
participants (6)
-
geer@world.std.com
-
Jack Lloyd
-
John Ridge Cook
-
John Young
-
pgut001@cs.auckland.ac.nz
-
R. A. Hettinga