26 June 1998


Date: Fri, 26 Jun 1998 16:03:34 -0500
To: John Young <jya@pipeline.com>
From: Alan Davidson <abd@CDT.ORG>
Subject: Fips Flop

John,

Thought you might be interested in this for Cryptome. The
final letter from NIST's Technical Advisory Committee to Develop a 
Federal Information Processing Standard for the Federal Key 
Management Infrastructure is attached below.

Regards,

Alan

Alan Davidson, Staff Counsel                 202.637.9800 (v)
Center for Democracy and Technology          202.637.0968 (f)
1634 Eye St. NW, Suite 1100                  <abd@cdt.org>
Washington, DC 20006                         PGP key via finger

-----------------

U.S. effort on encryption "backdoors" ends in failure
    By Aaron Pressman

WASHINGTON, June 25 (Reuters) - A U.S. government panel has failed in a
two-year effort to design a federal computer security system that includes
"back doors," a feature that would enable snooping by law enforcement
agencies, people familiar with the effort said this week.

   The failure casts further doubt on the Clinton administration policy --
required for government agencies and strongly encouraged for the private
sector -- of including such back doors in computer encryption technology
used to protect computer data and communications, according to outside
experts.

   But administration officials said the panel, which is set to expire in
July, simply needed more time.

   "I wouldn't pronounce the issue dead by any means," Undersecretary of
Commerce William Reinsch told Reuters. "It clearly has turned out to be a
difficult task. ... This one was a hard one."

   The 22-member panel appointed by the secretary of commerce in 1996
concluded at a meeting last week that it could not overcome the technical
hurdles involved in creating a large-scale infrastructure that would meet
the needs of law enforcers, panel members said.

   The group was tapped to write a formal government plan known as a
"Federal Information Processing Standard," or FIPS, detailing how
government agencies should build systems including back doors.

   In a letter to Commerce Secretary William Daley obtained by Reuters, the
panel said it "encountered some significant technical problems that,
without resolution, prevent the development of a useful FIPS."

   "Because the focus of this work is security, we feel that it is
critically important that we produce a document that is complete, coherent,
and comprehensive in addressing the many facets of this complex security
technology," the group added. "The attached document does not satisfy these
criteria."

   The group is formally known as the Technical Advisory Committee to
Develop a Federal Information Processing Standard for the Federal Key
Management Infrastructure, but with the unwieldy acronym of TACDFIPSFKMI,
members of the panel jokingly referred to themselves as "Bob."

   The failure after two years to write a FIPS vindicates the view of
critics of the administration's encryption policy, said Alan Davidson,
staff counsel at the Center for Democracy and Technology, a nonprofit
advocacy group.

   "The administration keeps spending taxpayer money to pursue a ...
strategy that's wrong-headed and won't protect security," Davidson said.
"Its own advisory committee can't answer basic questions about how to make
it work for the government, yet they continue to push for its adoption by
everyone, worldwide."

   The administration and law enforcement agencies have been at odds with
high-tech companies, Internet users and civil liberties groups for years
over encryption regulation.

   Encryption products -- which use mathematical formulas to scramble
information and render it unreadable without a password or software "key"
-- have become critical tools for protecting all kinds of digital data,
including cellular phone calls and credit card numbers sent over the
Internet.

   But law enforcement agencies, fearing such products will be used by
criminals or others to hide wrongdoing, have pushed for the inclusion of
back doors in all encryption.

   High-tech industry groups, Internet users and privacy advocates have
opposed those requirements, joined by leading lawmakers, including the
Senate majority leader and the House minority and majority leaders.

   They worry that back doors will weaken the security of all encrypted
data, allow for improper government snooping and add tremendous cost and
complexity to security systems.

   Foreign governments and companies have also expressed concern about the
prospect that the policy will enable U.S. government agencies to read their
e-mail.

   Bruce Schneier, a leading cryptography researcher and critic of the
government policy, said the FIPS panel failed because of the impossibility
of meeting the needs of both law enforcers and industry.

   "You can't solve this problem," said Schneier, president of the computer
consulting firm Counterpane Systems. "If it was obvious, they could have
agreed. The interests of government and business aren't the same, and when
you try to balance the two, you end up with nothing."

   But Edward Roback, an official with the U.S. National Institution of
Standards and Technology who worked closely with the panel, said the
technical problems the group encountered were surmountable with more time.

   "These technical experts wanted more time," Roback said, pointing out
that the panel's charter expires in July. "I wouldn't characterize it that
they ran into roadblocks but more that they have a road ahead of them."
((Aaron Pressman, Washington newsroom, 202-898-8312))

Friday, 26 June 1998 14:17:59
RTRS [nN25122338]

------------------------------------------------------------------------
Any views expressed in this message are those of the individual  sender,
except  where  the  sender  specifically  states them to be the views of
Reuters Ltd.


-----------------
Final Letter From the National Instititue of Standards and Technology (NIST)
Technical Advisory Committee to Develop a Federal Information Processing
Standard for the Federal Key Management Infrastructure

			June 19, 1998
--------

Dear Mr. Secretary:

We respectfully submit the attached technical input from the "Technical
Advisory Committee to Develop a Federal Information Processing Standard for
the Federal Key Management Infrastructure" (TAC) for Requirements for Key
Recovery Products.  The TAC is cognizant of the steps you are obligated to
take under various statutes and policies to seek public comment in making
your determination about implementing a Federal Information Processing
Standard.  However, the TAC believes significant, substantive additional
work is necessary before this document will be ready for the next step in
the process. Specifically, we believe that this document is not ready to be
released for public comment, to be used as a basis for generation of answers
to policy questions relevant to a FIPS, or to begin planning for development
of implementation guidance.

With regard to this latter topic, we suggest initiating work on detailed
implementation guidance, once this document is completed. Such guidance will
be essential to the successful deployment of any key recovery system (KRS),
since many aspects of  KRS security are outside the scope of the work we
have undertaken.  We also urge pursuit of conformance testing based on the
NVLAP model, e.g., as employed for FIPS 140-1.  Because of the complexity
and security sensitivity of KRS technology, we do not support vendor
self-declaration of conformance.

The TAC has made substantial progress and a completed version of the work
begun here could provide a basis for the development of a FIPS.  However,
the TAC encountered some significant technical problems that, without
resolution, prevent the development of a useful FIPS. There are unresolved
conflicts among some requirements. In addition, the model that underlies the
product evaluation process is not yet complete.

In retrospect, the time and effort devoted to this task were not sufficient
to develop an adequate set of technical requirements for a FIPS.  Because
the focus of this work is security, we feel that it is critically important
that we produce a document that is complete, coherent, and comprehensive in
addressing the many facets of this complex security technology.  The
attached document does not satisfy these criteria.

The TAC understands that its charter expires in July of 1998.  However, the
TAC has gained much experience during this process, and is willing to
continue to work towards the completion of its initial charge.

As you know, TAC members were appointed for their individual expertise.  The
actions of the TAC do not have the explicit or implicit endorsement of the
corporations or organizations with which its members are affiliated.

On behalf of the TAC, we hope that you find our efforts have been useful,
and we thank you for the opportunity to work on your behalf.


More on the committee's final work and documents:

Source: http://csrc.nist.gov/tacdfipsfkmi/

Technical Advisory Committee to Develop a
Federal Information Processing Standard for the
Federal Key Management Infrastructure

The Technical Advisory Committee to Develop a Federal Information Processing Standard for the Federal Key Management Infrastructure was established by the Department of Commerce in July, 1996. The Committee, which was formally chartered on July 24, 1996, held its first meeting on December 5-6, 1996. The Committee's last meeting was held June 17-19, 1998.

[Excerpts]

Meeting Agendas

1998-05-21 June 17-19, 1998          Meeting Agenda agenda9806.txt [908 bytes]

Materials from June 1998 Meeting

 
June 19, 1998 Revised Cover Letter (6/19/98) revisedcover.txt
June 19, 1998 Revised Assembled Document (6/19/98) (MS Word '97) revisedFIPS9806.doc
June 1998 Discussion Draft Cover Letter cover.txt
June 1998 Draft Assembled Document (MS Word '97) Original FIPS698_Word97.doc
June 1998 Draft Assembled Document (MS Word 6 / '95) FIPS698_Word95.doc
June 1998 Draft Assembled Document text format FIPS698.txt