Date: Tue, 2 Oct 2001 19:28:01 -0400
To: Matthew Gaylor <freematt@coil.com>
From: Matthew Gaylor <freematt@coil.com>
Subject: Encryption Can't Be Limited
Content-Type: text/plain; charset="us-ascii" ; format="flowed"

<http://interactive.wsj.com/archive/retrieve.cgi?id=SB1001458580550103 280.djm&template=printing.tmpl>

September 25, 2001

Tech Center

Encryption Can't Be Limited, Experts Say In Setback for Lawmakers Seeking Change

By LEE GOMES Staff Reporter of THE WALL STREET JOURNAL

There is bad news in store for lawmakers thinking about changing the nation's laws to somehow limit encryption, an idea that has been mentioned in Washington since the Sept. 11 attacks.

You couldn't do so, say mathematicians and engineers -- even if you really wanted to.

Encryption, or the process by which a message is scrambled to make it unreadable by anyone but its intended recipient, has been a staple of war-time communications since ancient times. An extremely sophisticated form of encryption is used pervasively in personal computers, most commonly to provide for secure communications over the Internet.

In fact, the extensive steps that technology companies have taken in recent years to make people feel safe while shopping or buying stocks online is one of the biggest reasons encryption is now impervious to change.

For example, every single late-model Web browser in the U.S. has built into it the capability for very powerful encryption. There also are all manner of widely available e-mail programs containing strong encryption.

"The toothpaste is out of the tube, and it is covering the whole planet," said Phil Zimmermann, whose Pretty Good Privacy is one of the best-known of these e-mail systems.

These encryption systems, which have been developed during the past 20 or 30 years, make use of some powerful mathematical concepts to create encoding systems whose power is mind-numbing. It is a trivial matter, for example, to encrypt a message on a simple PC so that the biggest computer in the world couldn't decipher it without spending far more time on the problem than exists in lifespan of the entire universe.

Some in Washington have suggested that software firms redo their encryption programs to give lawmakers a backdoor means of reading encrypted files. That is technically possible, but would first require the "recall" of most existing Internet software, since it contains no such backdoor.

But even if all existing software was somehow modified to remove its encryption, experts say it would be a simple thing for anyone with even the most basic education in mathematics to develop new encryption software. Dan Boneh, a specialist in encryption at the computer-science department at Stanford University, said that simply by using the mathematics functions built into a spreadsheet program like Microsoft Excel, he could, in lessthan an hour, write a simple encryption system that would make do in an emergency.

"The algorithms to do it are very widely available," he said.

That is one reason that Dr. Boneh and others say the only sure-fire way to eliminate strong encryption is to somehow eliminate all PCs.

There are other problems with modifying encryption laws, experts say. Chief among them is the simple fact that if the laws somehow were changed, terrorists, criminals and others would be sure to no longer use encrypted PC communications to plan their deeds.

There has been no evidence that the Sept. 11 terrorists used encryption systems, though lawmakers have said they seemed to have made use of the free e-mail software readily available on the Web.

While there may be no technology-based way to deal with encryption, that doesn't mean law-enforcement officials are powerless against it, experts say. Various forms of low-tech "human intelligence" spying can be utilized, for example, to discover where someone has written down a password. According to news reports, agents from the Federal Bureau of Investigation who were tracking an organized-crime figure using encryption were able, with a search warrant, to install a program on the person's PC that read his keystrokes and transmitted his messages even before they were encrypted.


Distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. ---


Subscribe to Freematt's Alerts: Pro-Individual Rights Issues Send a blank message to: freematt@coil.com with the words subscribe FA on the subject line. List is private and moderated (7-30 messages per week) Matthew Gaylor, (614) 313-5722 ICQ: 106212065 Archived at http://groups.yahoo.com/group/fa/


Visit the Crazy Atheist Libertarian
Check out Atheists United - Arizona
Visit my atheist friends at Heritics, Atheists, Skeptics, Humanists, Infidels, and Secular Humanists - Arizona
Arizona Secular Humanists
Paul Putz Cooks the Arizona Secular Humanist's Check Book
News about crimes commited by the police and government
News about crimes commited by religious leaders and beleivers
Some strange but true news about the government
Some strange but real news about religion
Interesting, funny but otherwise useless news!
Libertarians talk about freedom