mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
533 lines
30 KiB
Text
533 lines
30 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 12 of 13
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Issue XXXV / Part Three PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Dispater PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
Prodigy Stumbles as a Forum...Again
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Mike Godwin (Electronic Frontier Foundation)
|
||
|
|
||
|
On some days, Prodigy representatives tell us they're running "the Disney
|
||
|
Channel of online services." On other days the service is touted as a forum
|
||
|
for "the free expression of ideas." But management has missed the conflict
|
||
|
between these two missions. And it is just this unperceived conflict that has
|
||
|
led the B'nai B'rith's Anti-Defamation League to launch a protest against the
|
||
|
online service..
|
||
|
|
||
|
On one level, the controversy stems from Prodigy's decision to censor
|
||
|
messages responding to claims that, among other things, the Holocaust never
|
||
|
took place. These messages--which included such statements as "Hitler had some
|
||
|
valid points" and that "wherever Jews exercise influence and power, misery,
|
||
|
warfare and economic exploitation ... follow"--were the sort likely to stir up
|
||
|
indignant responses among Jews and non-Jews alike. But some Prodigy members
|
||
|
have complained to the ADL that when they tried to respond to both the overt
|
||
|
content of these messages and their implicit anti-Semitism, their responses
|
||
|
were rejected by Prodigy's staff of censors.
|
||
|
|
||
|
The rationale for the censorship? Prodigy has a policy of barring
|
||
|
messages directed at other members, but allows messages that condemn a group.
|
||
|
The result of this policy, mechanically applied, is that one member can post a
|
||
|
message saying that "pogroms, 'persecutions,' and the mythical holocaust" are
|
||
|
things that Jews "so very richly deserve" (this was an actual message). But
|
||
|
another member might be barred from posting some like "Member A's comments are
|
||
|
viciously anti-Semitic." It is no wonder that the Anti-Defamation League is
|
||
|
upset at what looks very much like unequal treatment.
|
||
|
|
||
|
But the problem exposed by this controversy is broader than simply a badly
|
||
|
crafted policy. The problem is that Prodigy, while insisting on its Disney
|
||
|
Channel metaphor, also gives lip service to the notion of a public forum.
|
||
|
Henry Heilbrunn, a senior vice president of Prodigy, refers in the Wall Street
|
||
|
Journal to the service's "policy of free expression," while Bruce Thurlby,
|
||
|
Prodigy's manager of editorial business and operations, invokes in a letter to
|
||
|
ADL "the right of individuals to express opinions that are contrary to personal
|
||
|
standards or individual beliefs."
|
||
|
|
||
|
Yet it is impossible for any free-expression policy to explain both the
|
||
|
allowing of those anti-Semitic postings and the barring of responses to those
|
||
|
postings from outraged and offended members. Historically, this country has
|
||
|
embraced the principle that best cure for offensive or disturbing speech is
|
||
|
more speech. No regime of censorship--even of the most neutral and well-
|
||
|
meaning kind--can avoid the kind of result that appears in this case: some
|
||
|
people get to speak while others get no chance to reply. So long as a board of
|
||
|
censors is in place, Prodigy is no public forum.
|
||
|
|
||
|
Thus, the service is left in a double bind. If Prodigy really means to be
|
||
|
taken as a computer-network version of "the Disney Channel"--with all the
|
||
|
content control that this metaphor implies--then it's taking responsibility for
|
||
|
(and, to some members, even seeming to endorse) the anti-Semitic messages that
|
||
|
were posted. On the other hand, if Prodigy really regards itself as a forum
|
||
|
for free expression, it has no business refusing to allow members to respond to
|
||
|
what they saw as lies, distortions, and hate. A true free-speech forum would
|
||
|
allow not only the original messages but also the responses to them.
|
||
|
|
||
|
So, what's the fix for Prodigy? The answer may lie in replacing the
|
||
|
service's censors with a system of "conference hosts" of the sort one sees on
|
||
|
CompuServe or on the WELL. As WELL manager Cliff Figallo conceives of his
|
||
|
service, the management is like an apartment manager who normally allows
|
||
|
tenants to do what they want, but who steps in if they do something
|
||
|
outrageously disruptive. Hosts on the WELL normally steer discussions rather
|
||
|
than censoring them, and merely offensive speech is almost never censored.
|
||
|
|
||
|
But even if Prodigy doesn't adopt a "conference host" system, it
|
||
|
ultimately will satisfy its members better if it does allow a true forum for
|
||
|
free expression. And the service may be moving in that direction already:
|
||
|
Heilbrunn is quoted in the Wall Street Journal as saying that Prodigy has been
|
||
|
loosening its content restrictions over the past month. Good news, but not
|
||
|
good enough--merely easing some content restrictions is likely to be no more
|
||
|
successful at solving Prodigy's problems than Gorbachev's easing market
|
||
|
restrictions was at solving the Soviet Union's problems. The best solution is
|
||
|
to allow what Oliver Wendell Holmes called "the marketplace of ideas" to
|
||
|
flourish--to get out of the censorship business.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Computer Network to Ban 'Repugnant' Comments
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
>From Washington Post
|
||
|
|
||
|
Prodigy has been charged with allowing "antisemitic slurs" to run on its
|
||
|
network. Prodigy officials said they would *not* censor discussion of
|
||
|
controversial subjects, such as the one that has been raging over the net for
|
||
|
several months -- whether the Holocaust was a hoax.
|
||
|
|
||
|
The controversial message that was labeled "repugnant" included the
|
||
|
statements: "Hitler had some valid points...", and "...whenever Jews exercise
|
||
|
influence and power, misery, warfare and economic exploitation [are the
|
||
|
result]". There were six other messages that the Anti-Defamation League of
|
||
|
B'nai B'rith are complaining about. The Hitler message was not available to
|
||
|
all subscribers, it was just personal mail between users. The person who
|
||
|
received the mail brought it to the ADL's attention.
|
||
|
|
||
|
Civil liberties groups have compared computer networks to telephone
|
||
|
companies, which do not censor calls. However, Prodigy officials object to
|
||
|
that analogy, saying it is more like a newspaper, and that Prodigy must judge
|
||
|
what is acceptable and what is not, much as a newspaper editor must.
|
||
|
|
||
|
Prodigy officials take the position of, and I quote, "we were speaking in
|
||
|
broader terms ... we were focused on the broad issue of free expression".
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
More on Proctor & Gamble August 15, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Randall Rothenberg (New York Times)
|
||
|
Further Reading: Phrack Inc., Issue 33 , File.12, "Proctor & Gamble"
|
||
|
|
||
|
Law-enforcement officials in Ohio have searched the records of every
|
||
|
telephone user in southwestern Ohio to determine who, if anyone, called a Wall
|
||
|
Street Journal reporter to provide information that Proctor & Gamble said was
|
||
|
confidential and protected by state law.
|
||
|
|
||
|
The investigation goes far beyond examining the telephone records of
|
||
|
current and former employees of the giant consumer products company, an inquiry
|
||
|
the Hamilton County prosecutor's office confirmed on Monday. The Journal
|
||
|
reported the scope of the investigation Thursday.
|
||
|
|
||
|
The prosecutor, Arthur Ney Jr., acting on a complaint by Procter & Gamble,
|
||
|
ordered Cincinnati Bell to turn over all the telephone numbers from which
|
||
|
people called the home or office of the reporter, Alecia Swasy, from March 1 to
|
||
|
June 15.
|
||
|
|
||
|
The situation began sometime before June 17 when Procter & Gamble, which
|
||
|
makes Tide detergent, Crest toothpaste and other familiar supermarket products,
|
||
|
asked the Cincinnati police to determine whether current or former employees
|
||
|
were leaking confidential corporate information to The Wall Street Journal.
|
||
|
|
||
|
On Monday the newspaper reported that the company had been bothered by two
|
||
|
news articles published on June 10 and June 11 written by Ms. Swasy, a reporter
|
||
|
based in Pittsburgh who covers Procter & Gamble. The articles cited
|
||
|
unidentified sources saying that a senior executive was under pressure to
|
||
|
resign from the company, and that it might sell some unprofitable divisions.
|
||
|
|
||
|
But a spokeswoman for Procter and Gamble, Sydney McHugh, said Thursday
|
||
|
that the company "had been observing a disturbing pattern of leaks" since the
|
||
|
beginning of the year. She refused to elaborate, but said the decision to
|
||
|
pursue legal action was reviewed at several levels in the company and was made
|
||
|
by Jim Jessee, a corporate security officer.
|
||
|
|
||
|
Two Ohio statutes protect the unauthorized disclosure of trade secrets.
|
||
|
One makes it a felony to transmit formulas, customer lists or other tangible
|
||
|
pieces of information that would be valuable to a company and its competitors.
|
||
|
But another, broader law makes it a misdemeanor to disclose "any confidential
|
||
|
matter or information" without the company's consent.
|
||
|
|
||
|
The Cincinnati police approached the Hamilton County prosecutor's office,
|
||
|
which sought and received from a grand jury a subpoena for telephone records.
|
||
|
|
||
|
A copy of the subpoena, dated June 17, was given to The New York Times by
|
||
|
someone involved in the case who insisted on anonymity. The subpoena ordered
|
||
|
Cincinnati Bell to "identify all (513) area code numbers that have dialed" Ms.
|
||
|
Swasy's home or office telephones in Pittsburgh during an eight-week period
|
||
|
that started on March 1.
|
||
|
|
||
|
Cincinnati Bell serves 655,297 telephone numbers in the 513 area code, in
|
||
|
an area covering 1,156 square miles, said Cyndy Cantoni, a spokeswoman for the
|
||
|
company. In the company's entire jurisdiction, which also covers parts of
|
||
|
Kentucky and Pennsylvania, about 13 million toll calls are placed in an average
|
||
|
month, she said.
|
||
|
|
||
|
Ms. Cantoni said she could not comment on what Cincinnati Bell turned over
|
||
|
to the authorities, but said the company routinely complied with subpoenas.
|
||
|
Under normal procedure, the company's computers would have automatically
|
||
|
searched its customer list and printed out only the originating numbers, and
|
||
|
not the names or addresses, of calls to Ms. Swasy's numbers, Ms. Cantoni said.
|
||
|
|
||
|
The Wall Street Journal, which is published by Dow Jones & Co., reported
|
||
|
on Monday that neither Ms. Swasy nor executives at the Journal were informed of
|
||
|
the subpoena by the authorities.
|
||
|
|
||
|
Neither Terry Gaines, a first assistant prosecutor, nor Ed Ammann, a
|
||
|
police department colonel involved with the investigation, returned repeated
|
||
|
calls to their offices.
|
||
|
|
||
|
Alan F. Westin of Columbia University, an authority on technology and
|
||
|
privacy issues, said the legality of the Ohio authorities' search for the
|
||
|
Procter & Gamble whistleblower may depend on how the investigation was pursued.
|
||
|
|
||
|
If Procter & Gamble turned over the names and phone numbers of present and
|
||
|
former employees to the police and the police matched that list against the
|
||
|
numbers they were given by the telephone company, the rights of other,
|
||
|
uninvolved parties may not have been violated, Westin said. But if the police
|
||
|
learned the names of people unaffiliated with Procter & Gamble who called the
|
||
|
Journal's reporter, he said, or if they turned over a list of numbers to
|
||
|
Procter & Gamble for research, some Ohio residents' Fourth Amendment
|
||
|
protections may have been sullied.
|
||
|
|
||
|
"When technology allows you to run millions of calls involving 650,000
|
||
|
telephone subscribers through a computer in order to identify who called a
|
||
|
person, potentially to find out whether a crime was committed, you raise the
|
||
|
question of whether technological capacity has gone over the line in terms of
|
||
|
what is a reasonable search and seizure," Westin said.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Expert Fraud Shares Tricks of His Trade October 7, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Bob Reilly (New York Times)
|
||
|
|
||
|
PHOENIX -- A freelance writer didn't think the $333 that Forbes magazine
|
||
|
paid him for a one-page article was enough money so he used his personal
|
||
|
computer to duplicate the check in the amount of $30,000. And, the check
|
||
|
cleared.
|
||
|
|
||
|
A handyman fixes a bedroom window and gets paid by check. The handyman
|
||
|
copies down the homeowner's bank account number, name, address and check number
|
||
|
sequences and sends $4.95 to a company that prints fancy colored checks. The
|
||
|
handyman masters the homeowner's signature and then proceeds to cash the checks
|
||
|
after they arrive.
|
||
|
|
||
|
American Express and Mastercard traveler's checks are duplicated on a
|
||
|
colored photostat machine and spent in hotels and restaurants.
|
||
|
|
||
|
A man rents a banquet room in a hotel for $800 and gets the bill in the
|
||
|
mail a few days later. The man sends in a check for $400 with the notation
|
||
|
"paid in full" written in the lower left-hand corner. The hotel cashes the
|
||
|
check and sends a notice to the man saying $400 is still owed. The man refuses
|
||
|
to pay the $400 and wins in court because the law says by cashing the check the
|
||
|
hotel conceded the debt was paid.
|
||
|
|
||
|
White-collar crime amounts to more than $50 billion a year, said Frank
|
||
|
Abagnale, who cited the examples at a business-sponsored seminar in the Phoenix
|
||
|
Civic Center. By contrast, bank robbers, who get most of the media attention,
|
||
|
abscond with a paltry $450 million, he said.
|
||
|
|
||
|
Abagnale is said to have conducted scams and frauds in 26 nations. Known
|
||
|
as "The Imposter," he now advises government and industry. He says he served
|
||
|
six years in jail in France, Sweden and the U.S. for his crimes, which included
|
||
|
writing bad checks for more than $2.5 million.
|
||
|
|
||
|
"As technology improves, so does the ability to commit fraud," said
|
||
|
Abagnale.
|
||
|
|
||
|
He claims that at 16 he impersonated an airline pilot, at 18 was a chief
|
||
|
resident pediatrician in a Georgia hospital, at 19 passed the Louisiana state
|
||
|
bar exam and served as an assistant attorney general for the state.
|
||
|
|
||
|
Abagnale also claims he never flew an airplane or treated a patient but
|
||
|
along the way used false names to get jobs and pass bad checks. He claims he
|
||
|
even got a job at age 20 teaching sociology at Brigham Young University,
|
||
|
beating out three Ph.D.s for the job.
|
||
|
|
||
|
"I was always just one chapter ahead of the class," he said. Demeanor,
|
||
|
style, confidence, clothes and the overt display of wealth also help the con
|
||
|
man, Abagnale said.
|
||
|
|
||
|
Abagnale claimed he got one teller to cash a napkin because he drove up to
|
||
|
the bank in a chauffeur-driven Rolls Royce and entered wearing a $600 suit and
|
||
|
all the confidence of a billionaire. The feat was recorded for television by
|
||
|
CBS, he said.
|
||
|
|
||
|
Another time he supposedly put the numbers of the bank account he was
|
||
|
using on a bunch of deposit slips, placed the deposit slips in a bank for
|
||
|
public use, and in one day alone more than $40,000 was deposited into his
|
||
|
account by unsuspecting customers who picked up his slips because they had
|
||
|
either run out of their own or hadn't yet got their own deposit slips.
|
||
|
|
||
|
Abagnale asserted that there are several ways to discourage fraud,
|
||
|
including:
|
||
|
|
||
|
-- Use checks that are impossible to duplicate on a home computer.
|
||
|
-- Don't cash checks that don't have at least one rough edge.
|
||
|
-- Scan travelers checks by looking for impossible to reproduce
|
||
|
pictures or symbols that can only be seen at eye level or by
|
||
|
wetting the back, left-hand side of an American Express traveler's
|
||
|
check, which will smudge if it is authentic.
|
||
|
|
||
|
Abagnale is known as the author of a book called "Catch Me If You Can."
|
||
|
|
||
|
"I always knew I would eventually get caught," he said. "Only a fool
|
||
|
believes he won't. The law sometimes sleeps, but it never dies."
|
||
|
|
||
|
Abagnale claimed he started a life of crime when his parents divorced and
|
||
|
he was forced to choose between living with his mother or father. He said he
|
||
|
couldn't make the choice and ran away.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Dumb Jocks Learn First Lesson of Phreaking October 17, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
>From Associate Press
|
||
|
|
||
|
Four current Ball State University basketball players have admitted to
|
||
|
investigators that they charged a total of $820.90 in unauthorized long
|
||
|
distance calls. School officials announced the preliminary findings in the
|
||
|
first phase of their report the the NCAA. What the investigators found, in
|
||
|
regards to the unauthorized calls, was the following information:
|
||
|
|
||
|
Person Yr Calls Cost
|
||
|
~~~~~~~~~~~~~~~~ ~~~ ~~~~~ ~~~~~~~
|
||
|
Jeermal Sylvester Sop 255 $769.93
|
||
|
Chandler Thompson Sen 28 $ 45.14
|
||
|
Michael Spicer Sen 3 $ 4.43
|
||
|
Keith Stalling Sen 1 $ 1.40
|
||
|
|
||
|
Investigators reported three of the men said former players had provided
|
||
|
the long distance credit card numbers or authorization codes on which the calls
|
||
|
were made. The fourth player Keith Stalling, could not explain how his call
|
||
|
had been charged to the university. Head basketball coach Dick Hunsaker
|
||
|
reiterated that neither he nor the coaching staff had made available the
|
||
|
numbers that were assigned to the coaches.
|
||
|
|
||
|
"When this problem was first discovered back in August, it came as a shock
|
||
|
to me," Hunsaker said. "I'm disappointed with the judgement of the players
|
||
|
involved, but I'm glad we're getting to the bottom of it quickly and clearing
|
||
|
it up before the season starts."
|
||
|
|
||
|
"Our attention now will focus on former players and other people not
|
||
|
connected with the basketball program who might have used the same credit cards
|
||
|
and access numbers," said the university's auditor. The investigation that
|
||
|
began in August was conducted by the Ball State university's auditor and
|
||
|
Department of Public Safety. The investigation started one week after a
|
||
|
routine review of telephone records by athletic department officials. At the
|
||
|
time, investigators said the total cost of the unauthorized calls was in the
|
||
|
thousands of dollars.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Silicon Government in California October 28, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
>From UPI Sacramento
|
||
|
|
||
|
California unveiled an easy-to-use computer system Wednesday that is
|
||
|
designed to tell people about such topics as statewide job openings, where
|
||
|
parents can find child care and how to re-register a car.
|
||
|
|
||
|
Officials described the experimental "Info/California" program as an
|
||
|
information-dispensing version of an automatic teller machine at a bank. It
|
||
|
will operate in Sacramento and San Diego as a pilot project for the next nine
|
||
|
months.
|
||
|
|
||
|
Users will obtain free information on a variety of state services as they
|
||
|
touch the television-like computer screen to evoke an on-screen narration and
|
||
|
color graphics in English, Spanish and potentially other languages.
|
||
|
|
||
|
"It literally puts state government at our fingertips," a computerized
|
||
|
image of Gov. Pete Wilson said at a Capitol news conference.
|
||
|
|
||
|
Secretary Russell Gould of the Health and Welfare Agency said the system
|
||
|
may be especially useful to announce job openings as the economy rebounds from
|
||
|
the recession. Job-seekers will need a fourth-grade literacy level to use the
|
||
|
machine, which will refer them to Employment Development Department offices for
|
||
|
follow-up.
|
||
|
|
||
|
Director Frank Zolin of the Department of Motor Vehicles said the system
|
||
|
will benefit 20 million drivers who want vehicle registration renewals, vanity
|
||
|
license plate orders and faster service.
|
||
|
|
||
|
John Poland, Central California manager for IBM -- the state's partner in
|
||
|
the project -- said that besides telling the public about job opportunities, it
|
||
|
will allow Californians to order birth certificates and get information about
|
||
|
education, transportation, health and welfare at more than one site.
|
||
|
|
||
|
During the nine-month trial, people will use the system at 15 kiosks in
|
||
|
Sacramento and San Diego that will be similar to, and eventually integrated
|
||
|
with, local system kiosks such as those in the courts in Los Angeles and Long
|
||
|
Beach, and for community services in San Diego and Tulare counties.
|
||
|
|
||
|
Info/California was authorized under 1988 legislation. It is based on an
|
||
|
experimental touchscreen network in Hawaii that 30,260 people used over a six-
|
||
|
month period.
|
||
|
|
||
|
The state spent about $300,000 on the project, and IBM invested about $3
|
||
|
million to develop the technology. By performing functions now done by humans,
|
||
|
the system may ultimately replace some state workers and produce cost savings
|
||
|
for taxpayers.
|
||
|
|
||
|
"We're working smart here," Gould said. "This may diminish some of the
|
||
|
need for new state workers."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Digital Tapes Deal Endorsed by Music Industry October 30, 1991
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
>From (Congressional Monitor)
|
||
|
|
||
|
Record industry executives joined with retailers and consumer groups in
|
||
|
endorsing legislation (S 1623) that would pave the way for widescale
|
||
|
introduction of digital audio tapes into the U.S. marketplace.
|
||
|
|
||
|
For the first time, consumers would be allowed to legally make copies of
|
||
|
prerecordings for home use.
|
||
|
|
||
|
The agreement would allow artists, songwriters, and record companies to
|
||
|
collect royalty fees on the sale of blank tapes and digital audio recorders.
|
||
|
|
||
|
In addition, an electronics chip will be placed in the recorders to
|
||
|
prevent anything other than the original recording to be copied.
|
||
|
|
||
|
In testimony before the Senate Judiciary Committee's Subcommittee on
|
||
|
Patents, Copyrights, and Trademarks, pop star Debbie Gibson said that many
|
||
|
artists had been concerned that digital copying could spell the end of a
|
||
|
profitable music industry.
|
||
|
|
||
|
Unlike conventional tapes, digital audio recorders allow consumers to make
|
||
|
a perfect copy of a prerecording. The record industry says it already loses $1
|
||
|
billion a year in sales due to illegal copying. And, the industry says,
|
||
|
unchecked digital technology would dramatically increase that figure.
|
||
|
|
||
|
Electronics manufacturers and retailers won the assurance that they will
|
||
|
not be sued for copyright infringement due to the sale of blank tapes or
|
||
|
recorders.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Computer Cryptography: A Cure For The Common Code
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
|
||
|
Anyone can sign a postcard, but how do you sign a piece of electronic
|
||
|
mail? Without a "signature" to demonstrate that, say, an electronic transfer
|
||
|
of funds really comes from someone authorized to make the transfer, progress
|
||
|
towards all-electronic commerce is stymied. Ways of producing such signatures
|
||
|
are available, thanks to the technology of public-key cryptography. They will
|
||
|
not work to everyone's best advantage, though, until everyone uses the same
|
||
|
public- key system.
|
||
|
|
||
|
It is an obvious opportunity for standards-makers -- but in America they
|
||
|
have turned up their noses at all the variations on the theme currently in use.
|
||
|
The alternative standard for digital signatures now offered by America's
|
||
|
National Institute of Standards and Technology (NIST) has brought a long-
|
||
|
simmering controversy back to the boil.
|
||
|
|
||
|
Public-key cryptography could become one of the most common technologies
|
||
|
of the information age, underpinning all sorts of routine transactions. Not
|
||
|
only does it promise to provide the digital equivalent of a signature, it could
|
||
|
also give users an electronic envelope to keep private messages from prying
|
||
|
eyes. The idea is to create codes that have two related keys. In conventional
|
||
|
cryptography the sender and receiver share a single secret key; the sender uses
|
||
|
it to encode the message, the receiver to decode it.
|
||
|
|
||
|
In public-key techniques, each person has a pair of keys: a disclosed
|
||
|
public key and a secret private key. Messages encoded with the private key can
|
||
|
only be decoded with the corresponding public key, and vice versa. The public
|
||
|
keys are published like telephone numbers. The private keys are secret. With
|
||
|
this technology, digital signatures are simple. Encode your message, or just
|
||
|
the name you sign it with, using your private key. If the recipient can decode
|
||
|
the message with your public key, he can be confident it came from you.
|
||
|
Sending a confidential message -- putting electronic mail in a tamper-proof
|
||
|
envelope -- is equally straightforward.
|
||
|
|
||
|
To send a secret to Alice encode it with her public key. Only Alice (or
|
||
|
someone else who knows her private key) will be able to decode the message.
|
||
|
The heart of any system of public-key cryptography is a mathematical function
|
||
|
which takes in a message and a key, and puts out a code. This function must be
|
||
|
fairly quick and easy to use, so that putting things into code does not take
|
||
|
forever. It must be very hard to undo, so that getting things out of code does
|
||
|
take forever, unless the decoder has the decoding key. Obviously, there must
|
||
|
be no easy way to deduce the private key from the public key. Finding
|
||
|
functions that meet these criteria is "a combination of mathematics and
|
||
|
muddle," according to Roger Needham of the Cambridge Computer Laboratory.
|
||
|
|
||
|
The greatest successes to arise from the muddle so far are those using
|
||
|
functions called prime factorisation algorithms. They are based on the
|
||
|
mathematical insight that, while it is easy to multiply two numbers together,
|
||
|
it is very hard to work backwards to find the particular two numbers which were
|
||
|
multiplied together to produce some given number. If Alice chooses two large
|
||
|
prime numbers as her private key and publishes their 150-digit product as her
|
||
|
public key, it would probably take a code-breaker thousands of years to work
|
||
|
backwards to calculate her private keys.
|
||
|
|
||
|
A variety of schemes have been worked out which use this insight as the
|
||
|
basis for a workable public-key code. Most popular of these is the so-called
|
||
|
RSA algorithm, named after the three MIT professors who created it -- Ronald
|
||
|
Rivest, Adi Shamir and Len Adleman. It has been patented and is sold by a
|
||
|
Silicon Valley company, called RSA, that employs 15 people, most of them ex-MIT
|
||
|
graduate students. Faculty firms are to computer start-ups what family firms
|
||
|
were to the industrial revolution. RSA has attracted both academic praise and
|
||
|
a range of heavyweight commercial customers: Microsoft, Sun Microsystems,
|
||
|
Digital Equipment and Lotus Development. But, despite repeated applications, it
|
||
|
has never been endorsed by those in government. Rumors abound that the
|
||
|
codebreakers in the National Security Agency have discouraged standard-setters
|
||
|
from recommending RSA because they do not want to promote the use of codes they
|
||
|
cannot break. RSA, for obvious reasons, does not discourage the rumors.
|
||
|
Whatever the reason, the standard-setters at the NIST have sidestepped the
|
||
|
debate over RSA with their new algorithm, DSA. As set out in the standard, DSA
|
||
|
verifies the identity of the sender, but does not encrypt the message. It
|
||
|
appends to the message a number calculated from the message and the sender's
|
||
|
private key. The recipient can then use this number, the message and the
|
||
|
sender's public key to verify that the message is what it seems.
|
||
|
|
||
|
The NIST says that this technique is well suited to "smart cards" and
|
||
|
other applications where there is not a lot of computing power available for
|
||
|
working out codes. Because it hopes that DSA will be used for verifying the
|
||
|
identity of everyone from welfare recipients to military contractors, its
|
||
|
flexibility is a boon. Meanwhile, however, more and more companies are
|
||
|
choosing a public-key cryptography system for communicating confidentially --
|
||
|
often RSA, sometimes something different. Someday, probably soon, governments
|
||
|
will want to choose, too. Watch out for fireworks when they do.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
SWBT Sends Off First "Cross-Country" ISDN Call
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
>From Southwestern Bell Telephone
|
||
|
|
||
|
The nation's first "cross-country" public network ISDN was placed last
|
||
|
week, courtesy of SWBT. The historic first call was the result of a two-year
|
||
|
joint effort among SWBT, BellSouth Corp., US Sprint and Bellcore. SWBT's
|
||
|
Advanced Technology Lab originated the call, which used US Sprint's digital
|
||
|
facilities in Burlingame, Calif. The call terminated at a BellSouth switch
|
||
|
in Atlanta, Ga.
|
||
|
|
||
|
Using an ISDN video application, SWBT's trial director Ken Goodgold was
|
||
|
able to see and talk to BellSouth's David Collins. "With this test, the
|
||
|
geographic limits of ISDN-based services were stretched from a few miles to
|
||
|
cross-country," Goodgold says. "We began with protocol testing and service
|
||
|
verification, two key parts of the process," Goodgold says. "That required an
|
||
|
extremely complex series of technical tests. The Advanced Technology Lab staff
|
||
|
worked for months performing the tests leading up to the first successful
|
||
|
call."
|
||
|
|
||
|
Last week's test call was significant from a marketing perspective as well
|
||
|
as a technical one. That's because it demonstrated the economic benifits of
|
||
|
using ISDN for video information. "The cost of a long distance call is
|
||
|
approximately the same, whether it's a voice transmission using a regular phone
|
||
|
line or a video transmission using ISDN," Goodgold says. "That means a big
|
||
|
reduction in cost to arrange a videoconference." US Sprint joined the test
|
||
|
because ISDN has evolved beyond the local stage, says Terry Kero, the carrier's
|
||
|
director of InfoCom Systems Development Labs. "After today, it will be
|
||
|
technically possible to make an ISDN call across the country just as it is
|
||
|
possible today to make a regular long distance call," Kero says.
|
||
|
_______________________________________________________________________________
|