scispace - formally typeset
Search or ask a question
Book ChapterDOI

Crypto in Europe - Markets, Law and Policy

03 Jul 1995-pp 75-89
TL;DR: This paper shows that the public debate on cryptography policy assumes that the issue is between the state's desire for effective policing and the privacy of the individual, and shows that this is misguided.
Abstract: The public debate on cryptography policy assumes that the issue is between the state's desire for effective policing and the privacy of the individual. We show that this is misguided.

Summary (2 min read)

1 Introduction

  • The US Clipper chip initiative has fuelled extensive and acrimonious debate on the privacy versus wiretap issue, and this has spread to other countries too.
  • On the one hand, GCHQ permitted the export of over $35m worth of tactical radios to Iraq, which used them against allied forces in the Gulf War on the other, it has made e orts to suppress academic research in cryptography.
  • Governments, and in particular by their signals intelligence agencies, claim to be concerned that the growth of commercial and academic cryptography might threaten intelligence and law enforcement capabilities.
  • There are tens of millions of these worldwide, with BSkyB having elded 3.45 million in the UK alone by mid 1994 Ran94] they may be the largest single installed base of cryptographic terminal equipment.

Electronic funds transfer at point of sale (eftpos)

  • There is a lot of overlap between ATM, eftpos and credit card systems.
  • The installed base of eftpos terminals has overtaken that of ATMs in most countries.
  • For the last twenty y ears, it has transmitted payment i nstructions between the several thousand banks which o wn it, and its primary use of cryptography is to calculate a message authentication code (MAC) on each p a yment message DP84].
  • These range from prepaid cards for public telephones to the much more sophisticated `subscriber identity modules' (SIMs) used in GSM digital mobile phones.

5 How Realistic is European Public Policy?

  • Most crypto is about authenticity rather than secrecy, and an increasing proportion of economic activity relies on it to some extent.
  • They are aware that the main problem facing law enforcement is not tra c processing, but tra c selection LKB+94]: in layman's terms, a ten minute scrambled telephone call from Medell n, Columbia, to 13 Acacia Avenue, Guildford, is an absolute giveaway.
  • One common modus operandi (in the USA and increasingly the UK) is to use an address agile system | cellular telephones are repeatedly reprogrammed with other phones' identities.
  • The authors conclude that the privacy versus police debate is misguided neither the libertarians nor the policemen have a serious case.

6 Conclusions

  • The politics of cryptology is often viewed as a Manichaean struggle between the privacy of the individual and the ability of the police to detect crimes such a s money laundering and child pornography.
  • The real law enforcement problem is that neither prosecutors nor civil litigants can rely on cryptographic evidence, and in an information based society, this kind of evidence is likely to gure in more and more trials.
  • The ITSEC/ITSEM procedure typically takes a y ear and a million dollars to evaluate a security product, while underwriters' laboratories might do the job in a month for twenty thousand dollars ESO94].
  • On past form, the authors expect that the securocrats will fail to adapt.

Did you find this useful? Give us your feedback

Content maybe subject to copyright    Report

Crypto in Europ e | Markets, Law and Policy
Ross J Anderson
Cambridge University Computer Lab oratory
Email:
rja14@cl.cam.ac.uk
Abstract.
The public debate on cryptography p olicy assumes that the
issue is b etween the state's desire for eective p olicing and the privacy
of the individual. Weshow that this is misguided.
We start o by examining the state of current and proposed legislation in
Europe, most of which is concerned with preserving national intelligence
capabilities by restricting the exp ort, and in cases even the domestic use,
of cryptography, on the pretext that it may be used to hide information
from law ocers. We then survey the currently elded cryptographic
applications, and nd that very few of them are concerned with secrecy:
most of them use crypto to prevent fraud, and are thus actually on the
side of law enforcement.
However, there are serious problems when we try to use cryptography
in evidence. We describ e a number of cases in which such evidence has
been excluded or discredited, and with a growing proportion of the world
economy based on transactions protected by cryptography,thisislikely
to b e a much more serious problem for law enforcement than o ccasional
use of cryptographyby criminals.
1 Intro duction
The US Clipper chip initiative has fuelled extensive and acrimonious debate on
the privacy versus wiretap issue, and this has spread to other countries too. At
this conference, for example, an ocial from the Australian Attorney General's
oce has prop osed that banks should use escrowed crypto, while ordinary people
and businesses should be forced to use weak crypto [Orl95].
We provide an alternative view by lo oking at the state of play in Europe.
We will rstly describ e the political situation, then lo ok at what cryptographyis
actually used for, and nally discuss the real problems of cryptography and law
enforcement. Along the way,we will challenge a number of widely held beliefs
about cryptology which underpin much research in the sub ject and condition
the public policy debate. These include:
1. the primary role of cryptology is to keep messages secret. So if it is made more
widely available, criminals will probably use it to stop the p olice gathering
evidence from wiretaps;
2. its secondary role is to ensure that messages are authentic, and here it pro-
vides a useful (if not the only) means of making electronic evidence accept-
able to a court. It is thus indispensible to the future development of electronic
commerce.

2 Euop ean Law and Policy on Cryptography
Some Europ ean countries, including Switzerland, Belgium and Germany,used to
supply considerable quantities of cryptographic equipmentto developing coun-
tries. This trade appears to have been tightened up recently as a result of Amer-
ican pressure, and now all Europ ean countries app ear to enforce exp ort controls
on cryptographic hardware. Some even control its use domestically.
The country taking the hardest line is France. There, the "decret 73-364
du 12 mars 1973" put cryptographic equipment in the second most dangerous
category of munitions (out of eight); any use required authorization from the
Prime Minister, which could not be given to criminals or alcoholics. The "de-
cret 86-250 du 18 fevrier 1986" extended the denition to include software, and
specied that all requests be sent to the minister of the PTT with a complete
description of the "cryptologic pro cess" and two samples of the equipment. The
"loi 90-1170 du 29 decembre 1990" states that export or use must be authorized
by the Prime Minister unless used only for authentication [Gai92].
Few people in Franceseemtobeaware of these laws, which are widely ig-
nored. A hard line is still taken by SCSSI, the lo cal signals agency, according to
whom the use of PGP even for signatures will never b e permitted [Bor95]; but
when one looks at the actual text of the Loi No 90-1170 as it appeared in the
Journal Ociel on 30th December 1990
1
, it is unclear that digital signatures are
covered at all.
Germany has no legal restraints on the domestic use of cryptography [Heu95];
indeed, Dirk Henze, the chief of the BSI (the information security agency), rec-
ommended that companies which cannot avoid sending data over the Internet
should encrypt it, and the interior minister sees encryption as a precondition for
the acceptance of electronic communication. However, Henze's predecessor Otto
Leibrich took the view that security should rather b e provided as a service by
network operators in order to stop crypto equipment b eing available to villains
[CZ95]; and a number of p oliticians, such as Erwin Marschewksi (home aairs
spokesman of the CDU), argue for an outright ban [Moe95]. Meanwhile a law
has just been passed forcing all telecomms companies to provide wiretap access
to government agenices, including various call tracing services [Eis95].
Denmark, Finland, Sweden and Latvia have no domestic restrictions at present
[Bor95] and no particular controversy which has come to our attention. But not
all northern European countries are so relaxed; the Norwegian governmentis
introducing its own encryption standard called NSK, which will b e tightly li-
censed; Norwegian Telecom will manage the keys of line encryptors which use
these chips and will be able to provide access to the intelligence services [Mad94].
Russia seems to b e reverting to the policing traditions established under the
Tsars and continued under the Soviets; a recent decree by PresidentYeltsin has
1
Art 28. - On entend par prestations de cryptologie toutes prestations visant a trans-
former a l'aide de conventions secretes des informations ou signaux clairs en infor-
mations ou signaux inintellig ibles pour des tiers, ou a realiser l'operation inverse,
grace a des moyens, materiels ou logiciels concus a cet eet.

made cryptography illegal without a licence from the local signals agency [Yel95].
At the other extreme, the traditionally liberal Dutchgovernment tried to imp ose
a ban on civilian crypto in 1994 but was forced to backdown at once by banks,
petrol companies and other business interests.
The UK is mildly liberal at present. Prime Minister John Major stated in
a 1994 parliamentary written reply to David Shaw, the member for Dover and
Deal, that the government do es not intend to legislate on data encryption. How-
ever, a spokesman for the opposition Labour party|which app ears likely to
form the next government | said that encryption should only be allowed if the
government could break it [Art95]. This caused a storm on the Internet, and a
subsequent policy document backed down on this issue; it did however propose
to makewarrants for the interception of communications muchmoreeasytoget.
At present, these are only available to investigate serious arrestable oences; a
future labour governmentwould makethem available for all oences, for `racism'
and for the `protection of minors' [Lab95].
Even without a change in government, there is still occasional confusion in
governmentpolicy. On the one hand, GCHQ p ermitted the export of over $35m
worth of tactical radios to Iraq, which used them against allied forces in the Gulf
War; on the other, it has made eorts to suppress academic research in cryptog-
raphy.Interference with research is also common with the EU in Brussels, whose
crypto policy is driven by SOGIS, the Senior Ocials' Group (Information Se-
curity), which consists of signals intelligence managers. A typical EU project
was Sesame, a Kerberos clone supp osed to provide authenticity but not secrecy,
and to b e adopted by European equipmentmanufacturers. However its many
aws make this unlikely [ano95]: at the insistence of SOGIS, DES was replaced
with xor, but the implementers did not even get a 64-bit xor right. Sesame also
generates keys by repeated calls to the compiler's random number generator.
Another pro ject was RIPE (the RACE integrity primitives pro ject), whose re-
searchers were paid to devise a hash function (since attacked) but forbidden to
do work on encryption. Close observers say that defective pro jects are approved
deliberately to provide an excuse to refuse funding for more worthy prop osals.
So the overall picture in Europe is one of confusion. Governments, and in
particular by their signals intelligence agencies, claim to b e concerned that the
growth of commercial and academic cryptography might threaten intelligence
and law enforcement capabilities. These fears are rarely articulated coherently;
in addition to the contradictory behaviour of GCHQ, wewould note that the
current conference's paper from the Australian attorney general (cited ab ove)
says on the one hand that the use of encryption by criminals is not seen as a
threat, but on the other hand that controls on crypto should be imp osed.
Is there a real case here, or are we just seeing a panicky defensive reaction
from bureaucratic establishments for whom the end of the Cold War means the
loss of jobs and budgets, and who are looking for something to do? In order to
assess the threat to law enforcement op erations, we shall have to look rst at
what cryptography is actually used for.

3 Europ ean Applications of Cryptography
Many research pap ers on cryptography assume that two parties, traditionally
called Alice and Bob, are sending valuable messages over an untrusted network.
The idea is usually to stop an intruder, Charlie, from nding out the contentof
these messages. This application, message condentiality, has historically gener-
ated perhaps 85% of research pap ers in the eld.
Condentiality has indeed b een importantin the government sector. The
available information suggests that the NATO countries' military communica-
tions systems have about a million nodes, with the USA accounting for over
half of this. This would appear to makegovernments the main users of cryptol-
ogy, and they conduct the debate in these terms: for example, a recent report
on crypto p olicy, one of whose authors is Assistant to the Director of the NSA
[LKB+94], says `
cryptography remains a niche market in which (with the excep-
tion of several hundred mil lion dollars a year in governmental sales by a few
major corporations) a handful of companies gross only a few tens of mil lions of
dol lars annual ly
'.
This assessment is just plain wrong. The great ma jority of elded crypto
applications are not concerned with message secrecy but with authenticityand
integrity; their goal is essentially to assure Bob that Alice is who she says she
is, that the message he has received from her is the one she sent, or both. Here
Charlie may try to imp ersonate Alice, or Alice might try to avoid paying for
services rendered.
The main commercial cryptographic applications include the following.
Satellite TV deco ders:
There are tens of millions of these worldwide, with
BSkyB having elded 3.45 million in the UK alone by mid 1994 [Ran94]; they
may be the largest single installed base of cryptographic terminal equipment.
They are also the one nonmilitary application of cryptography whichhas
attracted sophisticated and sustained technical attacks.
Automatic teller machines:
ATMs have been around since 1968, and world-
wide there are somewhere between 300,000 and 500,000 of them; over 100,000
are installed in Japan and 70,000 in the USA [AP94]. ManyATMs are net-
worked together, and cryptography is used to manage personal identication
numbers (PINs) | in fact this was the rst large scale commercial applica-
tion of cryptography [MM82]. The Europ ean ATM p opulation is of the order
of 100,000 [CI94].
Electronic funds transfer at point of sale (eftp os)
. There is a lot of over-
lap b etween ATM, eftp os and credit card systems. In some countries (such
as France and Australia) the ATM and eftpos networks are well integrated,
with customers using PINs rather than signatures in shops; in others (like
Britain), signatures are used to authorise retail transactions, but cryptogra-
phy is still used to make the cards themselves harder to forge. The installed
base of eftpos terminals has overtaken that of ATMs in most countries.

SWIFT:
Based in Belgium, this is probably the oldest high security commercial
computer network. For the last twentyyears, it has transmitted paymentin-
structions b etween the several thousand banks whichown it, and its primary
use of cryptography is to calculate a message authentication co de (MAC) on
eachpayment message [DP84]. The MACkeys used to b e exchanged manu-
ally, but are now managed using public key protocols [ISO11166].
Telephone cards:
These range from prepaid cards for public telephones to the
much more sophisticated `subscrib er identity mo dules' (SIMs) used in GSM
digital mobile phones. The SIMs are smartcards which identify the user of
a telephone to the network for billing purposes, manage keys for encrypting
the conversation [Rac88], and mayeven let the subscriber perform banking
functions [Rob93] and place bets on horse races [Llo94]. Although only 4
million GSM phones are in use | mostly in Europe | the market is growing
at 70% per annum, and 61% of new mobile phone subscrib ers in the UK now
opt for GSM rather than the analogue alternatives [New94]. The market
should groweven more quickly once GSM is elded in countries suchas
China and India whose land based telephone systems are inadequate.
Utilitytokens:
The UK has ab out 1.5 million prepayment electricity meters,
using two proprietary cryptographic schemes, and 600,000 gas meters us-
ing DES in smartcards. They are mainly issued to bankrupts and welfare
claimants. Other European countries have smaller installations; France, for
example, has about 20,000. However, prepayment meters are a growth in-
dustry in developing countries; technical information on such systems can
be found in [AB94].
Computer access tokens:
The market leading supplier of software protection
dongles, RainbowTechnologies, has sold seven million units since 1984; from
this business base, it took over Mykotronx, the manufacturer of the Clipp er
chip [Rai95]. There are also several vendors of one-time password generators.
Wehavenooverall gures for the total Europ ean sales of dongles and other
access tokens, but they must be in the millions of units.
Building access control tokens:
Although many early devices (from metal
keys to magnetic cards) do not use cryptography, smartcard vendors are
starting to make inroads in this market [Gir93].
Burglar alarms:
Under draft CENELEC standards, class 3 and 4 alarm sys-
tems must provide protection against attacks on their signaling systems
[Ban93], and some manufacturers are already taking steps in this direction.
The market leading burglar alarm pro duct in the UK claims to use `high-level
encrypted signalling' [BT93].
Remote lo cking devices for cars:
These are starting to incorporate crypto-
graphic techniques to thwart the `sniers' whichcanintercept and mimic
the signals of rst generation lo cking devices [Gor93].
Road toll and parking garage tokens:
Some countries may issue these to-
kens to all their motorists [Sin95]; others mayuse multipurpose tokens, as
with a German scheme to enable road tolls to be paid using the subscriber
identity modules of car telephones [SCN94]. As well as a number of pilot

Citations
More filters
Book
01 Jan 2001
TL;DR: In almost 600 pages of riveting detail, Ross Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables.
Abstract: Gigantically comprehensive and carefully researched, Security Engineering makes it clear just how difficult it is to protect information systems from corruption, eavesdropping, unauthorized use, and general malice. Better, Ross Anderson offers a lot of thoughts on how information can be made more secure (though probably not absolutely secure, at least not forever) with the help of both technologies and management strategies. His work makes fascinating reading and will no doubt inspire considerable doubt--fear is probably a better choice of words--in anyone with information to gather, protect, or make decisions about. Be aware: This is absolutely not a book solely about computers, with yet another explanation of Alice and Bob and how they exchange public keys in order to exchange messages in secret. Anderson explores, for example, the ingenious ways in which European truck drivers defeat their vehicles' speed-logging equipment. In another section, he shows how the end of the cold war brought on a decline in defenses against radio-frequency monitoring (radio frequencies can be used to determine, at a distance, what's going on in systems--bank teller machines, say), and how similar technology can be used to reverse-engineer the calculations that go on inside smart cards. In almost 600 pages of riveting detail, Anderson warns us not to be seduced by the latest defensive technologies, never to underestimate human ingenuity, and always use common sense in defending valuables. A terrific read for security professionals and general readers alike. --David Wall Topics covered: How some people go about protecting valuable things (particularly, but not exclusively, information) and how other people go about getting it anyway. Mostly, this takes the form of essays (about, for example, how the U.S. Air Force keeps its nukes out of the wrong hands) and stories (one of which tells of an art thief who defeated the latest technology by hiding in a closet). Sections deal with technologies, policies, psychology, and legal matters.

1,852 citations

18 Nov 1996
TL;DR: It is concluded that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable.
Abstract: An increasing number of systems from pay-TV to electronic purses, rely on the tamper resistance of smartcards and other security processors. We describe a number of attacks on such systems -- some old, some new and some that are simply little known outside the chip testing community. We conclude that trusting tamper resistance is problematic; smartcards are broken routinely, and even a device that was described by a government signals agency as 'the most secure processor generally available' turns out to be vulnerable. Designers of secure systems should consider the consequences with care.

1,133 citations


Cites background from "Crypto in Europe - Markets, Law and..."

  • ...This is the case that most interests us: it includes pay-TV smartcards, prepayment meter tokens, remote locking devices for cars and SIM cards for GSM mobile phones [ 4 ]....

    [...]

01 Jan 2005
TL;DR: It is crucial for the design engineer to have a convenient and reliable method of testing secure chips and to ensure the proper design and testing of protection mechanisms.
Abstract: Semiconductor chips are used today not only to control systems, but also to protect them against security threats. A continuous battle is waged between manufacturers who invent new security solutions, learning their lessons from previous mistakes, and the hacker community, constantly trying to break implemented protections. Some chip manufacturers do not pay enough attention to the proper design and testing of protection mechanisms. Even where they claim their products are highly secure, they do not guarantee this and do not take any responsibility if a device is compromised. In this situation, it is crucial for the design engineer to have a convenient and reliable method of testing secure chips.

378 citations


Cites background from "Crypto in Europe - Markets, Law and..."

  • ...This is the case that most interests us: it includes microcontrollers for industrial applications, pay-TV smartcards, prepayment meter tokens, protection dongles for software, hardware identification tags, remote locking devices for cars and SIM cards for GSM mobile phones [73]....

    [...]

Journal ArticleDOI
TL;DR: The authors investigate systematic approaches to low-cost low-latency CED techniques for symmetric encryption algorithms based on inverse relationships that exist between encryption and decryption at algorithm level, round level, and operation level and develop CED architectures that explore tradeoffs among area overhead, performance penalty, and fault detection latency.
Abstract: Fault-based side-channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy-based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overheads (either area or performance). The authors investigate systematic approaches to low-cost low-latency CED techniques for symmetric encryption algorithms based on inverse relationships that exist between encryption and decryption at algorithm level, round level, and operation level and develop CED architectures that explore tradeoffs among area overhead, performance penalty, and fault detection latency. The proposed techniques have been validated on FPGA implementations of Advanced Encryption Standard (AES) finalist 128-bit symmetric encryption algorithms.

210 citations

Proceedings ArticleDOI
22 Jun 2001
TL;DR: In this paper, the authors investigate systematic approaches to low-cost, low-latency concurrent error detection (CED) for symmetric encryption algorithms based on the inverse relationship that exists between encryption and decryption at algorithm level, round level and operation level.
Abstract: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concurrent error detection (CED) architectures can be used to thwart such attacks, they entail significant overhead (either area or performance). In this paper we investigate systematic approaches to low-cost, low-latency CED for symmetric encryption algorithms based on the inverse relationship that exists between encryption and decryption at algorithm level, round level and operation level and develop CED architectures that explore the trade-off between area overhead, performance penalty and error detection latency. The proposed techniques have been validated on FPGA implementations of AES finalist 128-bit symmetric encryption algorithms.

83 citations

References
More filters
Book
01 Jan 1975
TL;DR: The Mythical Man-Month, Addison-Wesley, 1975 (excerpted in Datamation, December 1974), gathers some of the published data about software engineering and mixes it with the assertion of a lot of personal opinions.
Abstract: The book, The Mythical Man-Month, Addison-Wesley, 1975 (excerpted in Datamation, December 1974), gathers some of the published data about software engineering and mixes it with the assertion of a lot of personal opinions. In this presentation, the author will list some of the assertions and invite dispute or support from the audience. This is intended as a public discussion of the published book, not a regular paper.

3,875 citations

Book
01 Jan 1995
TL;DR: This book discusses Aristocracy, Democracy, and System Design, and the Mythical Man-Month after 20 years, which aims to answer the questions of why the Tower of Babel failed and how to prevent future collapses.
Abstract: 1. The Tar Pit. 2. The Mythical Man-Month. 3. The Surgical Team. 4. Aristocracy, Democracy, and System Design. 5. The Second-System Effect. 6. Passing the Word. 7. Why Did the Tower of Babel Fail? 8. Calling the Shot. 9. Ten Pounds in a Five-Pound Sack. 10. The Documentary Hypothesis. 11. Plan to Throw One Away. 12. Sharp Tools. 13. The Whole and the Parts. 14. Hatching a Castrophe. 15. The Other Face. 16. No Silver Bullet -- Essence and Accident. 17. "No Silver Bullet" ReFired. 18. Propositions of The Mythical Man-Month: True or False? 19. The Mythical Man-Month After 20 Years. Epilogue. Notes and references. Index. 0201835959T04062001

2,042 citations

Journal ArticleDOI
TL;DR: The Rapid Selector, a bibliographic machine and a close cousin of the Memex of faddish fame, and the Comparator, a cryptanalytic device-provide the stuff to fill in the holes in the history of the computer.
Abstract: Like Bahbage, he lobbied for mathematical reform, stumped for the centrality of science in cultural advancement, argued that government support was crucial, and proved a stubborn and crotchety opponent when crossed. And, as Colin Burke reminds us in this fine and fresh new look at Bush, Bush envisioned machines relevant to the history of computing that never lived up to their promise. I doubt that Burke would agree with my description of Bush as a latter-day Babbage; nevertheless, this detailed study makes the comparison almost inevitable. Burke helps us appreciate how Bush's fascination with the mechanization of calculation and comparison caused his inventive work to swirl around problems relevant to the emergence of the modern computer. Moreover, Burke suggests that two of Bush's less familiar engines-one, the Rapid Selector, a bibliographic machine and a close cousin of the Memex of faddish fame; and the other, the Comparator, a cryptanalytic device-provide the stuff to fill in the holes in the history of the computer [p. ix). It is never very clear just what these holes are; this reader, at least, was not convinced that the careers of these two machines were anything but eddies along the shore of the main currents of computer evolution. They were decisive failures, as Burke admits, rooted in a stubborn commitment to intractdbk and ultimately unfashion-able if not outdated technologies. The strengths of this book indeed lie elsewhere. These exotic devices are of interest in themselves and deserve their biographer's attention. Burke details the labors of Bush and friends to use microfilm, electronics, and photoelectricity to mechanize the library-hereby resolving a putative information overload (it turns out that there wasn't one)-and help the U.S. Navy's cryptographers break enemy codes during World War 11. Burke is best, however, when discussing not machines themselves but when individuals and bureaucracies are at loggerheads. Ego, ambition, and organizational and technological vision were at stake. On the military side, and against much intcrnal resistance , Bush allies such as Stanford C. Hooper and Joseph Wenger dreamed of building the next generation of rapid analytic machines and, in doing so, dreamed of upgrading the scientific navy by forging alliances with \" college professors \" like Bush; on the civilian side, Bush and his \" boys \" worked to maneuver the navy into a project that promised much in the way of personal and institutional prestige, income for research, and opportunities for graduate …

1,605 citations

Book
01 Apr 1978

486 citations

Journal ArticleDOI
TL;DR: It turns out that the threat model commonly used by cryptosystem designers was wrong: most frauds were not caused by cryptanalysis or other technical attacks, but by implementation errors and management failures, suggesting that a paradigm shift is overdue in computer security.
Abstract: Designers of cryptographic systems are at a disadvantage to most other engineers, in that information on how their systems fail is hard to get: their major users have traditionally been government agencies, which are very secretive about their mistakes.In this article, we present the results of a survey of the failure modes of retail banking systems, which constitute the next largest application of cryptology. It turns out that the threat model commonly used by cryptosystem designers was wrong: most frauds were not caused by cryptanalysis or other technical attacks, but by implementation errors and management failures. This suggests that a paradigm shift is overdue in computer security; we look at some of the alternatives, and see some signs that this shift may be getting under way.

447 citations

Frequently Asked Questions (10)
Q1. What are the contributions in "Crypto in europe | markets, law and policy" ?

The authors show that this is misguided. The authors start o by examining the state of current and proposed legislation in Europe, most of which is concerned with preserving national intelligence capabilities by restricting the export, and in cases even the domestic use, of cryptography, on the pretext that it may be used to hide information from law o cers. The authors describe a number of cases in which such evidence has been excluded or discredited, and with a growing proportion of the world economy based on transactions protected by cryptography, this is likely to be a much more serious problem for law enforcement than occasional use of cryptography by criminals. 

It is the challenge of adapting to a major paradigm shift: from intelligence to evidence, from protecting lives to protecting money, from secrecy to authenticity, from classi ed to published designs, from tamper-proof hardware to freely distributed software, from closed to open systems, and from cosseted suppliers to the rough and tumble of the marketplace. 

Some European countries, including Switzerland, Belgium and Germany, used to supply considerable quantities of cryptographic equipment to developing countries. 

For the last twenty years, it has transmitted payment instructions between the several thousand banks which own it, and its primary use of cryptography is to calculate a message authentication code (MAC) on each payment message [DP84]. 

These range from prepaid cards for public telephones to the much more sophisticated `subscriber identity modules' (SIMs) used in GSM digital mobile phones. 

The market leading supplier of software protection dongles, Rainbow Technologies, has sold seven million units since 1984; from this business base, it took over Mykotronx, the manufacturer of the Clipper chip [Rai95]. 

It is very expensive to provide a wiretap capability in a modern digital network; if it is mandated in the USA, phone companies say it could cost $5bn in the rst four years alone. 

These microprocessor cards are more expensive than simple memory cards, and are typically used when some kind of crypto protocol needs to be supported. 

These are starting to incorporate cryptographic techniques to thwart the `sni ers' which can intercept and mimic the signals of rst generation locking devices [Gor93]. 

4. The real threats to individual privacy have little to do with crypto but are rather concerned with the abuse of authorised access to data.{