Sunteți pe pagina 1din 44

CP PT

Copyright Ed Love 1995

Summary
A new group of computer-savvy privacy advocates is springing up, called the cypherpun s! "heir main tools are encryption and fast communication using cheap modern computers! Although once out of reach for most individuals, strong encryption is now availa#le for ne$t to nothing! %ith the help of a cheap porta#le computer, encryption can #e very useful for &"s loo ing for privacy today! Almost any ind of information can #e transferred to computer and then protected from the view of others! Even if an adversary manages to steal the computer, the information will still remain inaccessi#le! 'owever, #efore wading in, this paper will #riefly touch upon growing interconnection of computers around the world nown as the (nternet! "his increasingly popular resource allows people to store and e$change information with others internationally and almost instantly, without the usual interference #y national governments! "his allows power to move from such governments #ac into the hands of the people! "he following discussions specifically avoid too much )argon, leaving the details to the many e$cellent wor s listed in the reference section! "he intention is to alert people to the capa#ilities which e$ist today, and not to e$plain every last detail!

Table of Contents
*ummary!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1 "he (nternet!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+ Electronic ,ail!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+ -senet .ews!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!/ 0"&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!/ %orld %ide %e#!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!5 1ther -ses!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!5 0reedom of the &ress!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!2 Current &ro#lems!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!2 Cryptology!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3 "he 4asics!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!3 &age 1 of //

A *imple E$ample!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!5 6E*!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!5 &ro#lems with "raditional Encryption *ystems!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!9 &u#lic 7ey Cryptography!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!11 (ntroduction!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!11 8*A!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!19 &:&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!19 (ntroduction!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!19 -sing &:& for 6ocument *torage!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1+ "he Current *tate of &:&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1+ ,(" &:&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1/ "rou#les A#road!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!1/ ;ust how *trong is &:&<!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!15 "he Empire *tri es 4ac !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!12 .*A, ("A8, and more!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!12 Cypherpun s!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!15 Cryptoanarchy!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!15 Anonymous 8emailers!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!15 Anonymous &ools!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!19 6igital .yms!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!19 6igital *ignatures!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!9= 6igital cash!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!9= 0urther "opics!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!91 *teganography!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!91 *tealth &:&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!91 &E,!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!99 *ecure 0ilesystems!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!99 &:& >oice!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!9/ 0irst >irtual!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!9/ ?uantum Cryptography!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!95 %hat "o 6o .e$t!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!95 Ac@uire a copy of &:& and learn how to use it!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!95 :et connected to the (nternet!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!95 4uy the 4oo s and follow the .ewsgroups and ,ailing Lists!!!!!!!!!!!!!!!!!!!!!!!!!!92 *upport the cause of &rivacy in Cy#erspace!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!92 8elated 6ocuments!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!99 "he Crypto Anarchist ,anifesto!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!99 A Cypherpun As ,anifesto!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+1 A &ara#le!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+/ 8eferences!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+3 4oo s!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+3 -senet!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+5 ,ailing Lists!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+9 Anonymous 0"&!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!+9 %%%!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!/9 "-shirts!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!/+ Cy#erspace Consultancy!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!//

&age 9 of //

The Internet

%hat is the (nternet< (t seems to #e the latest #uBBword in the computer industry at the moment! 1ften discussed in the popular press, even the %all *treet ;ournal regularly prints articles on the su#)ect! "here is much tal of the .ational (nformation *uperhighway in America, which is to #e #uilt in the coming years! 'owever, the (nternet is out there today, availa#le to anyone with the price of entry! Luc ily, this price is not much at all, and is decreasing daily! (n a nutshell, the (nternet is a huge networ of networ s, connecting computers and people all over the world! Although it started out in America in the late 2=s, it now lin s computers everywhere, including 8ussia, China, Africa and Australasia! Anyone can )oin up, at prices which range from a few hundred dollars annually to thousands or more! 6ue to its sudden popularity in the -*, people are signing up at an increasing rate, and the (nternet is more than dou#ling in siBe each year! "he organisation is almost anarchic, as no#ody controls the whole networ ! &eople can add or remove lin s or machines, #ut overall, the (nternet seems to have a life of its own! *ome of the things people use it for include sending and receiving email messages, transferring files, chatting with people they may or may not have met, researching different su#)ects, and discussing every topic under the sun!

Electronic Mail
Electronic mail, or email, is perhaps the most widespread of services on the (nternet today! Computers connected to the (nternet allow people to e$change messages with people on the other side of the world in hours, sometimes even minutes or seconds! 1nce connected to the (nternet, there is usually no cost for sending or receiving any num#er or siBe of messages, unli e many commercial online services such as Compuserve! "hus, people can often use email to replace the &ostal *ervice, sending and receiving messages much faster and cheaper than ever #efore! 8ecent new standards allow the e$change of pictures, audio, video, spreadsheets and almost any other types of data across the (nternet! "he advent of Electronic 6ata (nterchange CE6(D has defined online versions of such documents as invoices and purchase orders,

&age + of //

allowing companies to conduct #usiness over the (nternet! "his has allowed faster and more efficient #usiness, resulting in lower costs and increased profits! Although not yet as widespread as the fa$ machine, email is more e$act, and allows e$change of data files which can #e read, edited, and #ounced #ac wards and forwards many times! "his is useful for colla#orative wor and has allowed people from different parts of the world to wor together @uic ly and efficiently! Email is also used for play-#y-mail games, such as chess, po er, #ac gammon and others! "o communicate with a group of users who are interested in the same su#)ect, electronic mailing lists can #e formed! "his allows users to easily send a message to everyone in the list! "hese mailing lists allow virtual communities to spring up, and are similar to -senet news!

Usenet News
-senet news is the worldAs largest #ulletin #oard system! (t has over 5=== different groups, discussing such things as various areas of computing, alternative medicine, li#ertarianism, nudism, music and )ust a#out anything else! Anyone can post an article, which gets replicated to millions of other machines around the world, often within minutes! -senet is a great resource for research, getting @uestions answered, offering information to the pu#lic, or )ust eeping up with latest developments in various fields!

FTP
Computer users all over the world can store and retrieve files from different machines #y using a program called ftp, for 0ile "ransfer &rotocol! "his allows people to @uic ly and ine$pensively distri#ute information to others without nowing them #eforehand! 6emonstrations of software, scientific papers, political analyses can all #e offered for people to access easily and @uic ly! Although 0"& as s for a user account at the start of a session, people are usually allowed to logon anonymously! "his allows anyone to access the information without prior registration!

&age / of //

World Wide Web


-ntil recently, one of the pro#lems on the (nternet was locating information! "here was so much out there, #ut it was difficult to find out where it was! *ometimes cryptic computer commands were useful, #ut most often information was notoriously difficult for users to find, especially if they were not computer e$perts! 0or this reason, several programs were created to allow people to interactively e$plore the (nternet using the concept of hyperte$t! *uch programs as ,osaic allowed people to start at a particular location on the (nternet, and follow numerous lin s to different machines and data#ases! ,osaic wor s with the %orld %ide %e# C%%%D, organising the (nternet as a we# of interconnected data! (t also facilitates access to other systems, such as gopher, which is a ind of glo#al search program! %ith a user-friendly graphical front end, ,osaic has #een descri#ed #y many as the killer app which has resulted in the (nternet almost catching fire in the last few years as droves of people who are not computer e$perts have )oined up!

Other Uses
"here are many other facilities on the (nternet, the a#ove are )ust the most commonly used! 1thers include (nternet 8elay Chat C(8CD which allows people to interactively tal with people over the net, usually via a simple te$t interface! A program called C-*ee,e allows remote videoconferencing over the net, as long as a video camera and software has #een installed on the local computer! ,uch of this software is availa#le free, via anonymous 0"&! ,any companies are now )oining, offering their products to the estimated 9=E million users who regularly surf the net! A popular strategy is to create a set of data which can #e accessed via ,osaic, and then pu#licise the location of the information! "his allows interested parties to access the information without overloading people who arenAt interested! &eople are putting together virtual shopping malls, where various companies offer goods and services which can #e ordered directly over the (nternet! &erhaps the most famous of these to sign up recently is &iBBa 'ut, which allows users to order &iBBas across the (nternet!

&age 5 of //

Freedom of the Press


1ne of the main advantages of the (nternet is that it allows anyone with a connection to #ecome a pu#lisher! Anyone can send email or post an article on -senet, or even setup their own %%% information! "hus, the monopoly of the traditional press is #ro en, allowing alternative views to #e heard! A -senet group has even #een setup to aid whistle #lowers, who might otherwise find it difficult to now who to contact! (t is e$tremely difficult to silence people on the net! *ometimes a userAs account is shutdown if they have #een particularly o#no$ious, #ut often they resurface later on with an account on a different system! A recent e$ample of a more serious nature was when the *oviets plotted a coup against ,i hail :or#achev! (nstant updates were posted to the (nternet so people overseas could eep a#reast of events! *hutting down the "> and radio stations didnAt wor when people could use fa$ and the (nternet!

Current Problems
As useful as the (nternet is, there are still many pro#lems which restrict even faster growth! ,any people waste #andwidth #y sending data to the wrong places, often deli#erately! .ewcomers often donAt follow the few guidelines which e$ist, and end up annoying old timers #y as ing the same old @uestions again and again! "his has lead to the regular posting of 0A?s, listing 0re@uently As ed ?uestions and their answers! .o#ody can #e forced to read these #efore using the (nternet, #ut 0A?s have succeeded in improving the signal to noise ration in many areas! Also, there is very little security on the (nternet! (t is easy to forge email messages and -senet postings, so a message may not #e from who it appears to #e! "his will slow down the acceptance of the (nternet as a medium for doing #usiness! A more relevant pro#lem, especially to &"s, is the fact that there is very little privacy on the (nternet! (tAs trivial to setup a program which intercepts email or -senet messages, searching for specific te$t, such as references to drugs, weapons, or other things which might not #e regarded as politically correct! (t has #een suggested that many government agencies lur on the many -senet groups related to illegal drugs, guns, cults and other areas! &rivate messages can #e read easily, with the sender and recipient #eing completely unaware of the interception! 0ar easier than monitoring traditional mail, &age 2 of //

such invasions of privacy have #ecome a real pro#lem as the (nternet e$pands! "his #rings us onto the topic of encryption, which allows people to reclaim their privacy, ma ing it impractical and e$tremely e$pensive to eep ta#s on more than a few messages out of the millions which are generated each day!

Cry tolo!y
The "asics
Cryptology is the study of altering messages so that anyone who intercepts the message cannot CeasilyD recover the original contents! "he method of altering the message must #e easily reversi#le, so that the intended recipient may read the original message! ,essages have #een encrypted for thousands of years, and there has #een a constant struggle #etween those who wish to preserve their privacy and those who try to destroy it! "here are a few simple terms which need to #e e$plained to ma e the following discussions easier! "he original message is often referred to as the plaintext, while the encrypted message is nown as cyphertext! -sually the plainte$t is encoded #y com#ining it with a key according to a well defined algorithm! (n a modern cryptosystem, the particular algorithm used to encrypt the message need not #e secret! As long as the eys used are ept secure, the method used to encrypt the message can #e pu#lic nowledge! "he study of encrypting messages is called cryptography, while the process of attac ing encrypted messages is nown as cryptoanalysis.

&age 3 of //

# Sim le E$am le
A very simple encryption scheme is to shift each letter of the alpha#et one character! e!g! the following messageF send guns, lawyers and money would #ecomeF tfoe hvot, m#$Bfst #oe npofB -nfortunately this system is very easy to #rea ! 1ne method might #e to collect a large amount of cypherte$t from this scheme, and calculate the fre@uencies of each letter used! "he resulting fre@uencies will in this case match those found in the English language, e$cept that the counts will #e one character off! %ith this information, it is easy to reconstruct the original message! (deally, an encrypted message will appear completely random, which ma es the a#ove techni@ue of cryptoanalysis useless! "hus, more and more comple$ methods of encryption have #een developed in an attempt to ma e #rea ing of such codes as difficult as possi#le!

%ES
1ne of the most used encryption schemes is 6E*, the 6ata Encryption *tandard introduced #y the -* government for civilian use in the mid 3=s! 6eveloped #y (4,, it was much more comple$ than most encryption schemes used #eforehand! Although it only used a 52 #it ey, which is relatively short, it is still strong enough for most civilian uses! -nfortunately, the design was influenced #y the .ational *ecurity Agency C.*AD which convinced (4, to use a shorter ey than they intended! "hus, it is speculated #y many that the .*A can #rea 6E*, although there is no method of doing so nown to the pu#lic!

&age 5 of //

Problems with Traditional Encry tion Systems


"here are several well nown methods of cryptoanalysis availa#le, and covering them all would re@uire several #oo s! (n general, the goal of using encryption is to ma e the tas of #rea ing the code more trou#le than it is worth! 1f course, the more important the data, the more trou#le and e$pense an adversary is willing to go through! (f the information is critically important, such as national secrets, even idnapping may#e resorted to! 1ften the people involved are the wea est lin , and this fact is used to good advantage #y intelligence agencies everywhere! 4lac mail, #ri#ery or attac ing wea nesses of the people involved often yields passwords or other information vital to decrypting important data! Although this is the stuff of spy movies and the li e, it does occur with alarming fre@uency! (n more mundane cases, often the passwords chosen are easy to guess, such as #irthdays, favourite places, names of spouses, etc! Entire dictionaries of various languages can often #e @uic ly tested to find a match for a password! As remem#ering comple$ passwords is more difficult than simple ones, these approaches can often produce good results! Another vulnera#ility is due to >an Ec radiation, which is electromagnetic radiation generated #y computer screens! (t is named after the 6utch scientist who pu#lished a report on the topic! A small receiver can #e setup in the ne$t #uilding which can easily reconstruct images from the computer #eing monitored! "his can #e done at distance of up to a#out 1 m! 1f course, using &:& or something similar isnAt very useful if the plainte$t can #e found #y monitoring >an Ec radiation! *trangely enough, the .*A were not particularly happy when this information #ecame pu#lic! "he -* govt has a standard called "E,&E*" which provides protection against >an Ec monitoring #y shielding the computer inside a special case! "his is much used within the military and other secret #ranches of govt! -nfortunately it is illegal in the -* to protect oneAs computer systems against "E,&E*" surveillance! 1ne wonders why people donAt trust their own government! *trangely enough, it is not illegal to use "E,&E*" to eavesdrop on other computer systems!

&age 9 of //

"raffic analysis is the process of collecting information a#out who is communicating with whom for intelligence purposes! Even if the information is encrypted and cannot #e read, useful information can still #e gained #y monitoring the patterns of communication! "his can often #uild up a list of people who are mem#ers of the same group which may #e under suspicion for some reason! %ays of com#ating this would #e to insert dummy messages andGor padding real messages, or rerouting messages through several intermediate nodes! Anything which helps hide the pattern is useful! "here are of course many other methods of attac ing computer privacy, most of which are covered #y the resources listed in the reference section! Protecting keys %ith the use of modern cryptosystems #ecoming common, the pro#lem of securing confidential information from unwelcome eyes has #een reduced to the pro#lem of ma ing sure that the eys used are not compromised! (f the eys are stolen, and the method of encryption is nown, then all is lost! "his presents a pro#lem when communicating with new parties! 'ow to e$change a set of eys< (n traditional cryptosystems such as 6E*, #oth the sender and the recipient have to have the same ey! "hus, a secured channel was used to e$change this ey! Choice of eys is critical as well, as certain eys which are often chosen are easy to guess! ,any times, names of spouses, #irthdays and other simple information is used as eys! "his can ma e it easy for an adversary to find the ey #y testing all the words in a dictionary, or a similar method! Although it sounds time consuming, personal computers can run through these dictionaries e$tremely @uic ly! 0or this reason, some encryption schemes distri#ute eys in tamperproof smart cards, so that people can use the eys, even if they do not see the eys themselves! "his removes the option of #ri#ing the operators! Even with the a#ove possi#ility, the pro#lem of using secure communications #etween tens, possi#ly hundreds of strangers remains! 6istri#uting secret eys to anyone who might #e a partner in communication #ecomes a difficult pro#lem at #est! "his has lead to much research in the area, and a #rea through which #ypasses the pro#lem completely! &age 1= of //

Public &ey Cry to!ra hy

Introduction
"he concept of pu#lic ey cryptography involves the use of 9 connected eys, instead of one! Each party generates a set of 9 eys, and pu#lishes one to the world! "his is the public key! ,eanwhile, the other ey, called the private key, is ept secret! ,essages to #e sent to another party are encrypted using that partyAs pu#lic ey, and then sent as normal! "he other party then decrypts the message using their private ey, producing the original te$t! "hus, anything encrypted #y the pu#lic ey can #e decrypted #y the private ey, and vice versa! 'owever, no#ody else can decrypt such a message unless they also have the private ey! As the private ey is generated locally and is never given to any#ody else, it is much more secure than traditional encryption using a single ey which needs to #e e$changed #etween communicating parties! "he private and pu#lic ey are related via some comple$ mathematics, which ma e it e$ceedingly difficult to produce one from the other! "hus, no e$change of eys are needed to communicate with any#ody! All parties pu#lish their pu#lic eys, which are used to encrypt messages to them! Another option is to use the reverse procedure! i!e! encrypt a message for some#ody using oneAs private ey! 1nce this is done, any#ody can recover the original message #y decrypting using the senderAs pu#lic ey! "hus, it can easily #e determined that the message was sent #y a particular user! "he message cannot #e decrypted #y any other ey - only the senderAs pu#lic ey! "his method of encoding messages can #e used as a form of digital signature, proving that a particular document was produced #y a particular user and no#ody else!

&age 11 of //

'S#
"he original concept of pu#lic ey encryption was devised #y 6iffee and 'ellman, and first implemented #y 8ivest, *hamir and Adelman from ,("! "hus, it is often nown as 8*A encryption! "he system #ecame the #asis for 8*A 6ata *ecurity, which has #een granted e$clusive use of the patents on the pu#lic ey encryption! "he company then proceeded to develop secure encryption products for industry, which are now used #y many of the leading software companies! 'owever, many people werenAt impressed with a single company having control over such a powerful technology! "hese privacy advocates didnAt li e the idea of strong cryptography #eing in the hands of only governments or companies!

P(P

Public Key Encryption for the Masses &hil Himmerman decided that for pu#lic ey encryption to #e availa#le to as many people as possi#le, it would #e #etter to produce a freely availa#le version! "his he did, and released the first version of &retty :ood &rivacy in 1991! As soon as it was availa#le, some#ody posted it on the (nternet, and within days it had #een copied and downloaded all over the world! "he genie in the #ottle had escaped, and no#ody could put it #ac again! Even though &:& used the patented algorithms from 8*A, it enormously e$panded the mar et for products from the same company #y introducing so many people to pu#lic ey encryption! &hil is now a fol hero to the computer privacy crowd, and has received grateful feed#ac from all over the world!

Introduction
*etting up &:& is reasona#ly straightforward! A pu#licGprivate ey pair is generated, and the pu#lic ey is then pu#lished, often via email, for others to use! *imilarly, the user collects pu#lic eys from other people, collected in a public key ring! "hen itAs a &age 19 of //

simple matter of encrypting a message #y specifying the message file and the user to whom the message is to #e sent! At the other end, the recipient )ust feeds the message to &:&, which automatically decrypts it using the recipientAs private ey! "here are many options availa#le for ey management, including certifying eys from other users! "his is a way of validating that a particular ey is from the person who pu#lishes it! 7eys can #e signed #y other users, all the way #ac to some#ody who the user trusts! e!g! 4ethAs ey can #e signed #y ;ohn, whose ey is signed #y 4ill, whose ey is signed #y the senderAs good friend ;ane! "his way, a distri#uted we# of trust is #uilt up! "his system fits well into the distri#uted philosophy of the (nternet, which isnAt controlled or run #y any#ody! 1ther options allow messages to #e signed #y the sender, so that the people can #e sure that it was sent #y the user, and not forged #y some#ody else! ,essages can of course #e #oth signed and encrypted for ma$imum privacy! 0or e$tra safety, there is a private passphrase which must #e entered whenever &:& is run! "his is used to protect the private ey ring, so that even if oneAs private ey is stolen, it cannot #e used without the passphrase! (t is highly recommended that the passphrase not #e stored on the computer, or written down at all!

Usin! P(P for %ocument Stora!e


&:& can also #e used for storing documents locally on a &C, even if they are never sent to any#ody else! "his allows almost any form of data to #e transferred to a &C and encrypted so strongly that even governments are una#le to recover the original information! Conversations and pictures can #e digitised and stored, and all printed information may #e scanned into a computer and similarly stored and encrypted! "hus, the &C can #e used to store almost all records a person might wish to eep, in encrypted format for a very small price!

The Current State of P(P


*everal versions of &:& have appeared after the initial release, usually fi$ing #ugs and adding features! "he program has also #een ported to other environments, such as &age 1+ of //

-ni$, the ,acintosh, and other systems! As &:& is only availa#le for personal use, a company called >iacrypt sells a licensed version at a low price for commercial users! All others who use the pu#lic domain &:& ris legal action from 8*A, although this hasnAt happened yet! 6ue to this patent infringement, a new version 9!2 was released earlier this year through ,(", which uses a licensed li#rary from 8*A! .on commercial users are now allowed to legally use this version of &:&, which has the #lessing of &hil Himmerman as well!

MIT P(P
"o complicate matters even further, a new release of &:& was developed via ,(", >ersion 9!5 replaced the allegedly patent infringing code from &hil Himmerman with a completely legal li#rary offered #y 8*A! "his version is now completely legal for use within the -* for non commercial use! A few initial #ugs were caught and a #ug fi$ was released as version 9!2! Although a couple of small patches have #een released since, this is the most up-to-date version of &:& for people in the -* to use! >iacrypt released 9!3 as a commercial version of 9!2, while overseas 9!2!i was released for non -* use! "he confusion goes on! Luc ily, most of the versions in use are compati#le!

Troubles #broad
'owever, due to some misguided -*A e$port laws, &:& is not allowed to #e e$ported to other countries! -nfortunately, as the original &:& @uic ly found itAs way onto the (nternet, &hil is now #eing investigated #y the -* Customs *ervice for allegedly #rea ing these e$port laws! 0or this reason, current and future releases of &:& for the rest of the world are #eing maintained and released from outside the -*! 4y organising it in this manner, &:& may #e legally imported into the -*, even though ,(" &:& 9!2 is availa#le within the country! A non trivial pro#lem now is eeping trac of all the versions of &:& which are out there, and which ones are legal for use in which countries! "his is complicated #y the fact that several countries such as 0rance #an the use of strong encryption #y the pu#lic! (n these cases, any use of any version of &:& would #e illegal!

&age 1/ of //

)ust how Stron! is P(P*


"he strength of &:& depends upon the siBe of eys used! "he current options are 519 #its, 325 #its and 1=9/ #its, so called military strength! A recent colla#orative effort on the (nternet using many hundreds of machines managed to do the e@uivalent of #rea ing a /95 #it ey using an enormous amount of computing power! e!g! if it had #een done #y a single machine, it would have ta en almost a thousand years! 6ou#ling the ey siBe increases the difficulty greatly, and some estimate that a 1=9/ #it ey could not #e #ro en in under 1==,=== years #y a single machine! After factoring the dou#ling of computer power every few years, such eys should still #e safe from attac for 9= years, hundreds according to some estimates! :iven the continual gains in performance and drops in price, the personal computer has #ecome an ideal engine on which to perform encryption! "he original computers were used to help crac encryption schemed such as Enigma, used #y the :ermans in %%9, while the current power of &Cs puts the advantage #ac in the hands of those desiring privacy! 0orthcoming versions of &:& will offer increased ey siBes, which swings the advantage even further to the individual using encryption! (n fact one nowledgea#le commentator suggests that soon it will #e practical to use eys so large that they will never #e #ro en #y all the computer power which will ever e$ist in the universe! Although perhaps difficult to #elieve, it demonstrates how powerful current encryption techni@ues are! .ow that &:& has #een distri#uted widely, the cat is out of the #ag, and its power is availa#le for all to use! 1f course, there are those who are not pleased with the new popularity of pu#lic ey encryption! :overnments around the world are fighting a losing #attle to eep control over encryption, so that they may continue to eavesdrop on people! Encryption follows the fa$ effect! i!e! the more people use it, the more useful it #ecomes! *ooner or later it will achieve a critical mass, and its use will #e no more unusual than sending letters in envelopes through the postal system!

&age 15 of //

The Em ire Stri+es "ac+

NS#, IT#', and more


As mentioned #efore, any product which uses encryption is restricted from e$port from the -* #y the (nternational "raffic in Arms 8egulations! "his is apparently a misguided attempt to stop such methods to #ecome nown to miscellaneous foreign #ad guys, such as drug traffic ers and smugglers! -nfortunately, there are literally hundreds of e@ually powerful software pac ages availa#le overseas, so this line of reasoning falls down! (t seems that the only plausi#le e$planation is that the -* :overnment and specifically the .*A doesnAt want -* citiBens using encryption which they canAt #rea ! "o this end, last year the :ovt introduced a so called voluntary encryption standard called the Clipper chip, which was to #e used in all federal #usiness! "he algorithm used was classified, #ut they assured everyone that it was strong! -nfortunately, all the eys for this encryption scheme were to #e held in escrow! (n other words, with a court order, the government could gain access to any#odyAs eys and then decrypt their communications! Also, the govt wanted to force all providers of computer communications to #uild in trapdoors for the govt to #e a#le to snoop on all the traffic passing through! .aturally, this didnAt gain much support pu#licly! :iven the past transgressions #y various govt agencies, people did not e$pect anything different in the future! A large num#er of civil rights and computer groups such as the Electronic 0rontier 0oundation vigorously opposed the Clipper proposal, and it was almost unanimously condemned! "he 0irst Amendment in the -* 4ill of 8ights guaranteed freedom of speech, and the pu#lic saw no reason why this should not e$tend to computer communications! -nconvinced #y arguments a#out terrorists and pornographers using encryption, the pu#lic united against the proposal! 0inally, the govt appeared to #ac down and remove the proposal from discussion, although how long for no#ody nows! -nfortunately, the recently passed 6igital "elephony 4ill mandated that all providers of voice communications e@uipment #uild in trapdoors for law enforcement! Although &age 12 of //

I5== million was #udgeted as su#sidies to cover the e$pense of doing this, most private estimates of the cost run at several times this amount! "hus, as one #attle was won, another was lost, and privacy is again gradually reduced! 1ne of the ne$t worries of computer privacy advocates is that the -* govt will #an the private use of powerful encryption such as &:&! Although it says it has no intention of doing so, no#ody has much trust in that declaration! "he cat is out of the #ag now, and it canAt #e put #ac in! "he techni@ues and methods of strong encryption are now well nown and widespread, and there isnAt anything which can #e done to reverse this! Even if the govt does #an its use, many will continue to use it, perhaps in con)unction with powerful anonymous remailers #ased offshore!

&age 13 of //

Cy her un+s

Cry toanarchy
"here is a small #ut vocal group of computer hac ers called cypherpun s, who have a mailing list on the (nternet! "hey are strongly in favour of privacy in all areas of life, and #elieve the computer to #e one of the #est tools availa#le to create that privacy, through encryption! As no#ody else is going to give them privacy, they write the tools themselves, and pu#lish them for others to test and improve! "hey study encryption systems, analyse them for wea nesses and pu#licise the results, so that more secure systems can #e developed and deployed! An even more radical su#group call themselves cryptoanarchists! "hey #elieve that the same techni@ues will lead to the collapse of governments everywhere, as more and more trade moves to cy#erspace! "a$ yields will fall as #usiness moves to the ether, with greater speed, efficiency and privacy! %hat follows are some of the most important concepts for understanding #oth groups! A little study will soon #ring one up to speed on most of these!

#nonymous 'emailers
&u#lic ey encryption and digital signatures allow messages to #e sent to and from anonymous people with complete confidence that they are only toGfrom that particular person! .o#ody can trace who sent such messages, nor who receives the replies! "his allows interactions to #e conducted on a totally voluntary #asis, as there is no means for physical force to #e used against any of the participants! Although simple anonymous remailers have e$isted on the (nternet for many years, these have mostly #een relatively easy to #rea ! 'owever, with the emergence of strong encryption, anonymous identities can now #e truly impenetra#le! 4y chaining, messages can #e fed through a se@uence of any num#er of such remailers, each of which is itself e$tremely hard to #rea ! 4y selecting remailers located all over the world, security is &age 15 of //

increased even further! "hese techni@ues can #e used to replace the traditional postal mail drops, and can reduce the time used for message delivery from days or wee s to hours or even minutes! "his casts a whole new light on the nature of how #usiness is conducted, and the value of online reputations will #ecome crucial in the future! Even though anonymous, reputations can #e #uilt and maintained, so that people can decide whether a particular entity is trustworthy enough to do #usiness with! Even though no force can #e used against transgressors, the ris of #eing shunned online can have a powerful affect! 0or an anonymous entity on the networ , reputation is all that one has, so e$communication would #e enough to render the use of that particular identity completely useless! Another identity would have to #e created, and a new reputation would need to #e slowly nurtured #efore the new identity would #e trusted #y others!

#nonymous Pools
8elated to anonymous remailers, anonymous pools can #e used to hide the sender and recipients of a particular message! 1ne format would #e to post an encrypted message to all the mem#ers of a mailing list setup for a specific purpose! "hen each mem#er of the list tries to decrypt the message with their own private ey! 1nly the intended recipient will #e a#le to do this! "hus, the message can #e sent anonymously, and no#ody will #e a#le to discover to whom the message was really sent! "his can also #e done #y posting messages to -senet news, or other similar pu#lic #ulletin #oards!

%i!ital Nyms
6igital pseudonyms allow people to create aliases for use in cy#erspace, and conduct all interactions under these nyms! *till, the true identity of this person can remain totally anonymous, and no#ody can lin such aliases with any#ody in the real world! .ot only that, #ut one person can maintain several aliases, sometimes even interacting with each other in pu#lic! "hus, one can never #e sure who is who! 1nline entities ta e on lives of their own, and it #ecomes difficult to discern whether multiple nyms are #eing used! 1n the (nternet, there are often arguments and rumours a#out several nyms actually #eing the same person!

&age 19 of //

%i!ital Si!natures
As mentioned in the section on &:&, digital signatures can #e created for documents #y using pu#lic ey encryption! A comple$ one way chec sum is created from the contents of the document, and then encoded using the creatorAs private ey! "he result is a digital signature which is even more difficult to forge than a traditional handwritten signature! Any#ody who wishes to validate the document can ta e the signature, and decrypt it with the creatorAs pu#lic ey! "hen the same chec sum is created from the document! (f the result matches the decrypted signature, then the document is proven to #e created #y whoever signed it!

%i!ital cash
0undamental to conducting #usiness in cy#erspace is the concept of digital cash! 4y com#ining digital signatures and other cryptographic ideas, anonymous digital to ens can #e created analogous to normal cash! "hese can #e e$changed completely anonymously over a networ , and finally returned to the issuing #an ! 4uyers and sellers of products donAt even need to meet, or now each otherAs identity! 4oth #uyer and seller have the corresponding amounts addedGremoved from their accounts, without #eing a#le to trace who the other party is! "here are two main ways of operating digital cash systemsF online and offline! 1nline systems re@uire each transaction to #e chec ed in real time, similar to the way that credit cards are chec ed #y phone #efore use! %hile reducing the chance for fraud, they tie up communication lines and re@uire a great deal of computing power to process many concurrent transactions! "he other option is an offline system, similar to the current che@ue system! "ransactions are accepted immediately and processed in #atches at the end of the #usiness day! Although this re@uires much less computer and communications capacity, it does increase the ris of fraud #y dou#le spending of digital cash! -se of strong encryption should reduce this ris greatly, while some systems are a#le to identify the party guilty of dou#le spending, while leaving all other valid transactions anonymous! An online system has #een in use in 6enmar instead of credit cards! 6ue to the fi$ed &age 9= of //

costs of each transaction, processing small sales ended up costing more than the items sold! "he government is now loo ing at moving to an offline system which should reduce costs! 6igital cash can also #e used in other areas! ;apan already has a huge mar et in a simple form of digital cashF phone cards! "hese are purchased with a fi$ed value, and replaced when it has #een used up! Again, complete anonymity! Companies li e these forms of credit, as they are #orrowing money cheaply, and can earn high interest on it #efore the #alance is spent! Also, large amounts of heavy coins are no longer accumulated at pu#lic phone #ooths! 1ther applications include pu#lic transport systems, as well as toll roads which can collect a toll without having to stop vehicles! A simple radio transmitter can #e used to de#it a smart card sitting inside each car, or perhaps an account at the toll gate!

Further To ics

Ste!ano!ra hy
*teganography is the art of hiding messages such that their very e$istence is un nown! 1ften this is done #y storing a message in a much larger file, using a simple algorithm which ensures that the message can #e e$tracted at the other end! Common carrier files include pictures and audio files, as the human eyeGear cannot tell the difference when a small message is hidden within! "o ma e crac ing even more difficult, the message to #e hidden can #e encrypted using &:& or a similar strong encryption scheme! "his will add orders of magnitude to the difficulty of finding and decrypting such messages!

Stealth P(P
*tealth &:& refers to the practice of removing all &:& headers from an encrypted message! "his ma es a message less suspicious to people or programs who are snooping for encrypted messages! "here are a few programs availa#le to do this, which ma es a message even more suita#le to #e hidden via steganography! &age 91 of //

PEM
&E, stands for &rivacy Enhanced ,ail, and is a proposed (nternet standard for email! Although it offers many of the same features as &:&, there are significant differences! 0irstly, itAs completely oriented to email, which means that it cannot #e used to encrypt files stored on a local &C! (t also re@uires eys to #e registered with a central authority, instead of #eing e$changed informally as with &:&! "his aspect alone has meant that &E, has not caught on as well as &:&! &eople tend to prefer a decentralised approach, and have little trust in central authorities! &E, is also more concerned with authentication than with encryption! i!e! ensuring that a message is from who is says it is from! All messages must #e signed, whereas with &:&, a message may #e only encrypted! "his leaves &E, messages more vulnera#le to traffic analysis! 0or the a#ove reasons and more, &E, )ust hasnAt achieved the popularity of &:&, and doesnAt seem li ely to in the future!

Secure Filesystems
"here are at least two encrypted file systems availa#le for &CsF *ecure6rive and *0*! "hese software products encrypt data at a low level on the computer, so that it is never left on the system in an unencrypted state! "his ensures that in the case of the computer #eing seiBed #y unfriendly forces, the information stored on it will not #e compromised! Although sometimes tric y to use, they are often worth installing! 'ere is some information from &eter :utmann, the author of *0*F *0* C*ecure 0ile*ystemD is a set of programs which create and manage a num#er of encrypted dis volumes, and runs under #oth 61* and %indows! Each volume appears as a normal 61* drive, #ut all data stored on it is encryped at the individualsector level! Encrypted volumes can #e loaded and unloaded as re@uired, and can #e @uic ly unloaded with a user-defined hot ey, or automatically unloaded after a period of inactivity! "hey can also #e converted #ac to normal 61* volumes, or have their contents destroyed! "he documentation includes an in-depth analysis of various security aspects of the software, as well as fairly complete design and programming details!

&age 99 of //

*0* has the following featuresF - "he current implementation runs as a standard 61* device driver, and therefore wor s with #oth plain ,*61* or 6861* as well as other software such as %indows, ?E,,, *hare, dis caching software, *tac er, ;A,, and so on! - -p to five encrypted volumes can #e accessed at any one time, chosen from a selection of as many volumes as there is storage for! - >olumes can #e @uic ly unmounted with a user-defined hot ey, or automatically unmounted after a certain amount of time! "hey can also #e converted #ac to unencrypted volumes or have their contents destroyed if re@uired! "he software contains various stealth features to minimise the possi#ility of other programs monitoring or altering its operation! - "he encryption algorithms used have #een selected to #e free from any patent restrictions, and the software itself is not covered #y -* e$port restrictions as it was developed entirely outside the -* Calthough once a copy is sent into the -* it canAt #e re-e$portedD! - *0* complies with a num#er of national and international data encryption standards, among them A.*( J+!1=2, 0ederal (nformation &rocessing *tandard C0(&*D 15=, Australian *tandard 95=5!5!9, (*1 1=112F1991 and (*1 1=192-9F1991, and is on nodding terms with several other relevant standards! - "he documentation includes fairly in-depth analyses of various security aspects of the software, as well as complete design and programming details necessary to #oth create *0*-compati#le software and to verify the algorithms used in *0*! - 8easona#le throughput and siBe! 1ne #eta-tester has reported a throughput of 95= 7Gs for the #asic version and 92= 7Gs for the /52E version on his /52 system when copying a file with the 61* copy command from one location on an *0* volume to another C( get a#out 12= 7Gs on my vanilla +52 #o$D! "he resident portion re@uires 3!57 of memory, and can #e loaded high if desired! - 6irect access to (6E and *C*( drives is availa#le for #etter performance and for &age 9+ of //

drives which arenAt normally accessi#le to 61* Cfor e$ample systems with more than 9 hard drivesD! *0* 1!1 is a maintenance release which fi$es a few minor pro#lems in 1!=, and adds a num#er of features suggested #y users! ,ore details on changes are given in in the 8EA6,E file!

P(P -oice
Currently in the planning stages, &:& >oice is a pro)ect to apply the strong encryption of &:& to voice communications! i!e! a secure phone system! "he plans are to create a system which runs on a normal &C e@uipped with a soundcard and microphone, and uses normal telephone circuits to carry encrypted voice #etween 9 or more parties! Although not yet implemented, such a system would render completely harmless any ind of government Clipper system! i!e! the communications would #e effectively impossi#le to #rea ! (f any#ody wishes to offer either time, money, or programming s ills to this pro)ect, they should get in touch with &hil Himmerman who is coordinating the pro)ect!

First -irtual
8ecently a new company was formed to offer electronic commerce on the (nternet! 0irst >irtual was formed #y several leading lights in the online community, and allows #uying and selling of information over the (nternet! .o special software or hardware is re@uired, and no credit card details or other such information is ever sent over the (nternet! As no complicated mechanism for encryption is needed, this system allows people to get up and running very @uic ly! "hus, a practical system for #uying and selling information online is now availa#le! (t will #e interesting to watch the progress of this and similar efforts in the coming years!

&age 9/ of //

.uantum Cry to!ra hy


*ome more theoretical wor has recently #een done on the possi#ility of using @uantum effects to create a cryptosystem! *uch a system would #e #ased upon the fact that at the su#atomic, or @uantum level, the o#server actually changes the system )ust #y the process of o#serving! "hus, a cryptosystem #ased upon such a concept could easily detect when it was #eing tapped #y others! Although prototypes have #een demonstrated, practical systems are still a long way off!

What To Do Next

#c/uire a co y of P(P and learn how to use it


&:& and most related software is free for private use, and availa#le all over the world on various computer systems! *ee the reference section for more details! Alternately, send K95 to the author for a set of dis s containing much of the software discussed! "he two manuals written #y &hil Himmerman are re@uired reading, the first especially! "here are also two #oo s #eing pu#lished in the ne$t few months on &:&, which are well recommended!

(et connected to the Internet


A simple connection to the (nternet can #e had for as little as tens of dollars a month! 1nce connected, there are an enormous num#er of online sources for learning more a#out how to use the (nternet, as well as cryptology! * ills in navigating the (nternet will #e highly sought after )o# s ills, as well as allowing for increased privacy in #oth personal and #usiness communications! As familiarity increases, the (nternet connection can #e upgraded, in terms of #oth speed and ease of use! At this stage, it would #e well worth encouraging friends and #usiness partners worldwide to connect to the (nternet so they may gain the same #enefits! *uddenly, communications to these people can #e conducted at a much more rapid rate, as well as employing almost &age 95 of //

un#rea a#le encryption! "he increases in efficiency and contacts should enhance many aspects of life!

"uy the "oo+s and follow the News!rou s and Mailin! 0ists
An initial step for learning a#out the (nternet is to purchase some of the increasing num#er of #oo s pu#lished on various aspects of the (nternet! Although many )ust repac age information freely availa#le on the net, others provide a detailed introduction to using the many tools availa#le! 0or a small price, a good #oo will repay for itself many times over! 1nce connected, )oining relevant mailing lists and su#scri#ing to -senet newsgroups will allow the user to remain up-to-date in as many areas as time permits! 'owever, care must #e ta en not to spend all oneAs time on the (nternet, as more and more are doing these days! :etting connected should #e a means to an end in most instances!

Su

ort the cause of Pri1acy in Cybers ace

0or the politically inclined, call up the various political representatives and urge them to protect individual privacy in cy#erspace! "he more times politicians here such concerns voiced, the more li ely they are to support them! "hose still living in the -*A should consider contacting the various organisations which have sprung up to defend the right to privacy, such as the Electronic 0rontier 0oundation! &etitions are availa#le to register opposition to the Clipper Chip and similar efforts #y the -* govt to eavesdrop on networ traffic! A small donation to the defense of &hil Himmerman would #e a practical step towards protecting privacy in the future! &erhaps more than any other single individual, &hil has #een responsi#le for getting useful tools into the hands of the pu#lic! A donation of 1=L of the funds received for this document will #e sent to his legal defense fund! 0rom 'ugh ,iller ChmillerMorion!it!luc!eduDF As you may already now, on *eptem#er 1/ LE,C1, *ystems C>iaCryptD in &hoeni$, AriBona was served with a su#poena issued #y the -* 6istrict Court of &age 92 of //

.orthern California to testify #efore a grand )ury and produce documents related to N>iaCrypt, &:&, &hilip Himmermann, and anyone or any entity acting on #ehalf of &hilip Himmermann for the time period ;une 1, 1991 to the present!N &hil Himmermann has #een e$plicitly told that he is the primary target of the investigation #eing mounted from the *an ;ose office of -!*! Customs! (t is not nown if there are other targets! %hether or not an indictment is returned in this case, the legal #ills will #e astronomical! (f this case comes to trial, it will #e one of the most important cases in recent times dealing with cryptography, effective communications privacy, and the free flow of information and ideas in cy#erspace in the post-Cold %ar political order! "he sta es are high, #oth for those of us who support the idea of effective personal communications privacy and for &hil, who ris s )ail for his selfless and successful effort to #ring to #irth Ncryptography for the masses,N a! !a! &:&! E$port controls are #eing used as a means to curtail domestic access to effective cryptographic toolsF Customs is ta ing the position that posting cryptographic code to the (nternet is e@uivalent to e$porting it! &hil has assumed the #urden and ris of #eing the first to develop truly effective tools with which we all might secure our communications against prying eyes, in a political environment increasingly hostile to such an idea -an environment in which Clipper chips and 6igital "elephony #ills are our own governmentAs answer to our concerns! .ow is the time for us all to step forward and help shoulder that #urden with him! &hil is assem#ling a legal defense team to prepare for the possi#ility of a trial, and he needs your help! "his will #e an e$pensive affair, and the meter is already tic ing! ( call on all of us, #oth here in the -!*! and a#road, to help defend &hil and perhaps esta#lish a ground#rea ing legal precedent! A legal trust fund has #een esta#lished with &hilAs attorney in 4oulder! 6onations will #e accepted in any relia#le form, chec , money order, or wire transfer, and in any currency! 'ere are the detailsF "o send a chec or money order #y mail, ma e it paya#le, .1" to &hil Himmermann, #ut to &hilAs attorney, &hilip 6u#ois! ,ail the chec or money order to the following addressF &hilip 6u#ois 9+=5 4roadway &age 93 of //

4oulder, C1 -*A 5=+=/ C&hone OF +=+-///-+555D

"o send a wire transfer, your #an will need the following informationF 4an F >ectra4an 8outing OF 1=3==/+25 Account OF =11+5+= Account .ameF N&hilip L! 6u#ois, Attorney "rust AccountN Any funds remaining after the end of legal action will #e returned to named donors in proportion to the siBe of their donations! Pou may give anonymously or not, #ut &LEA*E - give generously! (f you admire &:&, what it was intended to do and the ideals which animated its creation, e$press your support with a contri#ution to this fund! 'ugh ,iller Q Asst! &rof! of &hilosophy Q Loyola -niversity Chicago 0AJF +19-5=5-9999 Q >oiceF +19-5=5-9393 Q hmillerMlucpul!it!luc!edu &:& 9!+A 7ey fingerprintF 00 23 53 CC =C 91 19 36 59 91 C3 19 03 C0 C5 3E

&age 95 of //

'elated %ocuments

The Cry to #narchist Manifesto


Cypherpun s of the %orld, *everal of you at the Nphysical Cypherpun sN gathering yesterday in *ilicon >alley re@uested that more of the material passed out in meetings #e availa#le electronically to the entire readership of the Cypherpun s list, spoo s, eavesdroppers, and all! R:ulpS 'ereAs the NCrypto Anarchist ,anifestoN ( read at the *eptem#er 1999 founding meeting! (t dates #ac to mid-1955 and was distri#uted to some li e-minded technoanarchists at the NCrypto A55N conference and then again at the N'ac ers ConferenceN that year! ( later gave tal s at 'ac ers on this in 1959 and 199=! "here are a few things (Ad change, #ut for historical reasons (All )ust leave it as is! *ome of the terms may #e unfamiliar to you!!!( hope the Crypto :lossary ( )ust distri#uted will help! C"his should e$plain all those cryptic terms in my !signatureTD --"im ,ay

&age 99 of //

"he Crypto Anarchist ,anifesto "imothy C! ,ay tcmayMnetcom!com A specter is haunting the modern world, the specter of crypto anarchy! Computer technology is on the verge of providing the a#ility for individuals and groups to communicate and interact with each other in a totally anonymous manner! "wo persons may e$change messages, conduct #usiness, and negotiate electronic contracts without ever nowing the "rue .ame, or legal identity, of the other! (nteractions over networ s will #e untracea#le, via e$tensive rerouting of encrypted pac ets and tamper-proof #o$es which implement cryptographic protocols with nearly perfect assurance against any tampering! 8eputations will #e of central importance, far more important in dealings than even the credit ratings of today! "hese developments will alter completely the nature of government regulation, the a#ility to ta$ and control economic interactions, the a#ility to eep information secret, and will even alter the nature of trust and reputation! "he technology for this revolution - and it surely will #e #oth a social and economic revolution - has e$isted in theory for the past decade! "he methods are #ased upon pu#lic- ey encryption, Bero- nowledge interactive proof systems, and various software protocols for interaction, authentication, and verification! "he focus has until now #een on academic conferences in Europe and the -!*!, conferences monitored closely #y the .ational *ecurity Agency! 4ut only recently have computer networ s and personal computers attained sufficient speed to ma e the ideas practically realiBa#le! And the ne$t ten years will #ring enough additional speed to ma e the ideas economically feasi#le and essentially unstoppa#le! 'igh-speed networ s, (*6., tamper-proof #o$es, smart cards, satellites, 7u-#and transmitters, multi-,(&* personal computers, and encryption chips now under development will #e some of the ena#ling technologies!

&age += of //

"he *tate will of course try to slow or halt the spread of this technology, citing national security concerns, use of the technology #y drug dealers and ta$ evaders, and fears of societal disintegration! ,any of these concerns will #e validU crypto anarchy will allow national secrets to #e trade freely and will allow illicit and stolen materials to #e traded! An anonymous computeriBed mar et will even ma e possi#le a#horrent mar ets for assassinations and e$tortion! >arious criminal and foreign elements will #e active users of Crypto.et! 4ut this will not halt the spread of crypto anarchy! ;ust as the technology of printing altered and reduced the power of medieval guilds and the social power structure, so too will cryptologic methods fundamentally alter the nature of corporations and of government interference in economic transactions! Com#ined with emerging information mar ets, crypto anarchy will create a li@uid mar et for any and all material which can #e put into words and pictures! And )ust as a seemingly minor invention li e #ar#ed wire made possi#le the fencing-off of vast ranches and farms, thus altering forever the concepts of land and property rights in the frontier %est, so too will the seemingly minor discovery out of an arcane #ranch of mathematics come to #e the wire clippers which dismantle the #ar#ed wire around intellectual property! Arise, you have nothing to lose #ut your #ar#ed wire fencesT

# Cy her un+2s Manifesto


#y Eric 'ughes &rivacy is necessary for an open society in the electronic age! &rivacy is not secrecy! A private matter is something one doesnAt want the whole world to now, #ut a secret matter is something one doesnAt want any#ody to now! &rivacy is the power to selectively reveal oneself to the world! (f two parties have some sort of dealings, then each has a memory of their interaction! Each party can spea a#out their own memory of thisU how could anyone prevent it< 1ne could pass laws against it, #ut the freedom of speech, even more than privacy, is fundamental to an open societyU we see not to restrict any speech at all! (f many parties spea together in the same forum, each can spea to all the others and &age +1 of //

aggregate together nowledge a#out individuals and other parties! "he power of electronic communications has ena#led such group speech, and it will not go away merely #ecause we might want it to! *ince we desire privacy, we must ensure that each party to a transaction have nowledge only of that which is directly necessary for that transaction! *ince any information can #e spo en of, we must ensure that we reveal as little as possi#le! (n most cases personal identity is not salient! %hen ( purchase a magaBine at a store and hand cash to the cler , there is no need to now who ( am! %hen ( as my electronic mail provider to send and receive messages, my provider need not now to whom ( am spea ing or what ( am saying or what others are saying to meU my provider only need now how to get the message there and how much ( owe them in fees! %hen my identity is revealed #y the underlying mechanism of the transaction, ( have no privacy! ( cannot here selectively reveal myselfU ( must ValwaysV reveal myself! "herefore, privacy in an open society re@uires anonymous transaction systems! -ntil now, cash has #een the primary such system! An anonymous transaction system is not a secret transaction system! An anonymous system empowers individuals to reveal their identity when desired and only when desiredU this is the essence of privacy! &rivacy in an open society also re@uires cryptography! (f ( say something, ( want it heard only #y those for whom ( intend it! (f the content of my speech is availa#le to the world, ( have no privacy! "o encrypt is to indicate the desire for privacy, and to encrypt with wea cryptography is to indicate not too much desire for privacy! 0urthermore, to reveal oneAs identity with assurance when the default is anonymity re@uires the cryptographic signature! %e cannot e$pect governments, corporations, or other large, faceless organiBations to grant us privacy out of their #eneficence! (t is to their advantage to spea of us, and we should e$pect that they will spea ! "o try to prevent their speech is to fight against the realities of information! (nformation does not )ust want to #e free, it longs to #e free! (nformation e$pands to fill the availa#le storage space! (nformation is 8umorAs younger, stronger cousinU (nformation is fleeter of foot, has more eyes, nows more, and understands less than 8umor! %e must defend our own privacy if we e$pect to have any! %e must come together &age +9 of //

and create systems which allow anonymous transactions to ta e place! &eople have #een defending their own privacy for centuries with whispers, dar ness, envelopes, closed doors, secret handsha es, and couriers! "he technologies of the past did not allow for strong privacy, #ut electronic technologies do! %e the Cypherpun s are dedicated to #uilding anonymous systems! %e are defending our privacy with cryptography, with anonymous mail forwarding systems, with digital signatures, and with electronic money! Cypherpun s write code! %e now that someone has to write software to defend privacy, and since we canAt get privacy unless we all do, weAre going to write it! %e pu#lish our code so that our fellow Cypherpun s may practice and play with it! 1ur code is free for all to use, worldwide! %e donAt much care if you donAt approve of the software we write! %e now that software canAt #e destroyed and that a widely dispersed system canAt #e shut down! Cypherpun s deplore regulations on cryptography, for encryption is fundamentally a private act! "he act of encryption, in fact, removes information from the pu#lic realm! Even laws against cryptography reach only so far as a nationAs #order and the arm of its violence! Cryptography will inelucta#ly spread over the whole glo#e, and with it the anonymous transactions systems that it ma es possi#le! 0or privacy to #e widespread it must #e part of a social contract! &eople must come and together deploy these systems for the common good! &rivacy only e$tends so far as the cooperation of oneAs fellows in society! %e the Cypherpun s see your @uestions and your concerns and hope we may engage you so that we do not deceive ourselves! %e will not, however, #e moved out of our course #ecause some may disagree with our goals! "he Cypherpun s are actively engaged in ma ing the networ s safer for privacy! Let us proceed together apace! 1nward! Eric 'ughes RhughesMsoda!#er eley!eduS 9 ,arch 199+

&age ++ of //

# Parable
"he *acred 4oo of EverythingU chapter 1 #y *yed Pusuf Cyusuf991Mraven!csrv!uidaho!eduD (n the #eginning there was only chaos, and the Creator moved through the chaos unhindered #ut displeased, and 4eholdU the Creator said N(n the Chaos we shall hide, #ut we shall need a way that we not #e o#scured from each other when we so choose!N *o the Creator separated the Cypherte$t from the plainte$t and he saw that the cypherte$t was not good, and that the plainte$t was private, "herefore he decreedF %E need a way to ma e the Cypherte$t stronger, and a way that the common man shall have a simple way to convert #etween the two the same way matter and energy are interchangea#le! *o the Creator moved forth, and was threatened #y higher authority who were so foolish as to thin that you can patent a num#er! thought that you cannot! And the Creator triumphed, and he collected a following as he did so,and he told his followers #y way of instruction thuslyF N&rivacy is a good thing, and there shall #e more of the good things! &ay heedT for privacy is not ta en at the #enevolence of othersT (f we want privacy Cand 4E'1L6, we 61D, then we must create it for ourselvesT &ay attention to 'istoryT Pour ind has had a long history using whispers, sealed envelopes, closed doors, and secret cyphers, though these are li e dust compared to what ( now teach youN NAnd here is what ( teach youF CryptographyT learn it, implement it, my child, and "EAC' itTN and thusly were the laws of privacy rediscoveredF 1D "hou shalt learn cryptography learn to use it, and learn to defeat it, #ecause learning how to defeat it will teach you to ma e #etter cryptography! 9D "hou shalt love to practice privacy #ecause if you do not love to practice &age +/ of //

privacy, then you shall not #e considered one of us! +D "hou shalt learn to use and maintain anonymous and pseudonymous mailers to spea out when spea ing out will cost reprisals from among those who do not appreciate our art! And the community agreed that these laws were pure and )ust, and a consensus was formed as to what our community should #e called and that word #ecame Cypherpunk! "hen the Creator called the royal guard amongst the followers with further instructions, and the command that everyone from amongst the community should try to attain this status! And he told them #y way of instruction thuslyF /D "hou shalt %8("E code #ecause no one else will write it for us, and we must #e secure from #ac doors! 5D "hou shalt &u#lish your code that thou mayist contri#ute to the privacy of the community, and that the community mayist contri#ute to your code! 2D "hou shalt #e secure in the nowledge that *oftware, li e unto ideas cannot #e destroyed, and a widely dispersed system cannot #e shut down! And the royal guard swooned when they heard such wisdom whereupon he revealed the Cypherpun As creedF We shall will make the networks safe for privacy. "ime passed and the Creator moved from the &u#lic Eye and was chained hand and foot to a #oulder in the north east, and tormented #y an Evil :odless "roglodyte named &a7a& until he wrote a code which satisfied these 1gres! And the 1gres danced o#scenely #ecause they thought the Creator had destroyed the community #y creating a #ac door and one way compati#ility! 4ut the Creator was smarter then any 1gre Cas are all Cypherpun s superior to all 1gres, therefore we must step on one when we encounter themD

&age +5 of //

"he Creator had already passed his torch to anyone who would ta e it, whereupon it was ta en #y many, and thusly when the "roglodyte tried to disperse his poison, no one would drin from it, #ut a *hining &aladin from a far corner of the world produced a pure refreshment which is not only interopera#le #ut vastly superior! "he community continued to grow, and diversify and spread to every corner of the internet, and the Community collected the ancient scrolls of %isdom from anti@uity, such as 4ruce *chneiderAs Applied Cryptography, pu#lished #y %iley! And we practiced our art in a way which would please the Creator! "he Community formed an Archive, and formed several which therein to store what we have learned and to #e a #eacon of nowledge to the mere commoner and a 4astion from which to insult the "roglodytes and 1gres! Among the anonymous 0"& Archives is the ,ost 'onora#le ftp!csua!#er eley!eduFpu#Gcypherpun s And thus concludes the first chapter, with events to #e chronicled in the second chapter still unfolding #efore our very eyes!

&age +2 of //

'eferences

"oo+s
Applied Cryptography - &rotocols, Algorithms, and *ource Code in C 4ruce *chneider ;ohn %iley W *ons, (nc! &rofessional, 8eference and "rade :roup (*4. =-/31-59352-9 I//!95 &rotect Pour &rivacyF "he &:& -serAs :uide %illiam *tallings &rentice-'all (*4. =-1+-155592-/ I19!95 &:&F &retty :ood &rivacy *imon :arfin el 1A8eilly and Associates (*4.F 1-52599-=95-5 1st Edition 6ecem#er 199/ Cest!D /== pages Cest!D, , I9/!95 Cest!D .E"%187 A.6 (."E8.E"%187 *EC-8("P %illiam *tallings &rentice-'allG,acmillan (*4. =-=9-/15/5+-= 0irst &rinting I/1!95

&age +3 of //

the %hole (nternet Ed 7rol 1A8eilly and Associates (*4.F 1-52599-=2+-5 I9/!95 the (nternet Complete 8eference 'arley 'ahn and 8ic *tout 1s#orneG,c:raw-'ill (*4.F =-=3-559=9+-5 I93!95

Usenet
alt!privacy - general topics on privacy! alt!privacy!clipper - the -* govtAs proposed Clipper chip and related issues! alt!privacy!anon-server - use of anonymous remailers and similar systems! alt!security - general computer security issues! alt!security! eydist - worldwide distri#ution of peopleAs encryption eys, usually &:&! alt!security!pgp - &:& and related software! alt!security!ripem - ,ar 8iordanAs implementation of the &E, secure email standard! alt!society!civil-diso# - civil diso#edience! alt!society!civil-li#erties alt!society!civil-li#erty - civil li#erties in general! comp!org!eff!news - news a#out the Electronic 0rontier 0oundation

&age +5 of //

comp!org!eff!tal - discussion a#out the Electronic 0rontier 0oundation comp!patents - patents, usually computer related! comp!privacy - general privacy! comp!ris s - ris s of using computers in society! comp!society!cu-digest - computer underground digest! comp!society!privacy - issues of privacy in general society! misc!security - general security topics! sci!crypt - the scientific study of cryptosystems! sci!crypt!research - research into e$isting and new cryptosystems! tal !politics!crypto - discussion a#out the politics of cryptology!

Mailin! 0ists
"he #est list to )oin is the Cypherpun s list! Although often very technical, it is at the leading edge of the su#)ect today! ,uch useful info can #e gleaned from a regular reading of postings here! 'owever, it is high volume, with ten or messages coming on a typical day! "o )oin, send email toF cypherpun s-re@uestMtoad!com

#nonymous FTP
,(" is pleased to announce the availa#ility of &:& 9!2!9, a free pu#lic- ey encryption program for non-commercial use! &:& 9!2!9 provides for digital signatures and &age +9 of //

confidentiality of files and messages! &:& 9!2!9 is distri#uted in source form for 61*G-.(J platforms! 0or convenience, an ,*61* e$ecuta#le is also part of this release! 4ecause source is availa#le, anyone may e$amine it to verify the programAs integrity! 0or ,acintosh users ,(" is currently distri#uting ,ac&:& 9!2! An update to ,ac&:& 9!2 will occur at a later date! &:& 9!2!9 contains fi$es to many of the #ugs reported in &:& 9!2!1 and ,(" encourages all -!*! &:& users to upgrade! &:& 9!2!9 is availa#le from ,(" only over the (nternet! -se anonymous 0"& to login to net-dist!mit!edu! Login as anonymous! Loo in the directory Gpu#G&:&! (n this directory, availa#le to everyone, is a 8EA6,E file a copy of the 8*A8E0 license and a copy of a software license from ,("! &lease read the 8EA6,E file and these licenses carefully! "a e particular note of the provisions a#out e$port control! "he 8EA6,E file contains more detailed instructions on how to get &:& 9!2!9! Also in Gpu#G&:& is a copy of the &:& ,anual Cfiles pgpdoc1!t$t and pgpdoc9!t$tD and the file pgformat!doc that descri#es the &:& message, signature and ey formats, including the modifications for &:& 9!2!9! "hese are #eing made availa#le without the distri#ution restrictions that pertain to the &:& source and e$ecuta#le code! &:& 9!2!9 is also availa#le atF ftp!csua!#er eley!edu in Gpu#Gcypherpun sGpgpGpgp929 "he -nofficial (nternational release of &:& lives atF ftp!demon!co!u Fpu#Gpgp *ource code from Applied CryptographyF ftp!dsi!unimi!itFGpu#GsecurityGcryptGcode

&age /= of //

>arious encryption related filesF #lac !o$!ac!u FGsrcGsecurity ftp!uni- l!deFGpu#GaminetGutilGcrypt ftp!wimsey!#c!caFGpu#Gcrypto ftp!uni-stuttgart!deFGpu#Guni$GtoolsGcrypt gar#o!uwasa!fiFpcGcrypt ripem!msu!eduFpu#Gcrypt ftp!demon!co!u FGpu#Gpgp nic!funet!fiFGpu#Gcrypt ftp!ee!und!ac!BaFGpu#GcryptoGpgp &:& for the Amiga can #e found atF ftp!demon!co!u FGpu#GamigaGpgp &:& for the Amiga can #e found atF ftp!demon!co!u FGpu#GmacG,ac&:& &:& for the Amiga can #e found atF ftp!demon!co!u FGpu#Garchimedes "he Cypherpun s 0A?s live atF ftp!netcom!comFpu#Gtcmay 0iles from "im ,ay here include 8EA6,E, Contents-Long, 8elease-.otes, ,0A?, and the main C&-0A?. "he ,0A? is the ,ost 0re@uently As ed ?uestions and gives a good introduction to the cypherpun s, while the C&-0A? Cthe CP&'E8.1,(C1.D is the main collection of information! At over 1!+,4, it is very comprehensive, and cannot #e read at a single sitting! &apers on encryptionF ftp!informati !uni-ham#urg!deFGpu#GvirusGcrypt &age /1 of //

A 0A? on the "(* implementation of &E,F ftp!#elnet!#eFGpu#GsecurityGcryptGtispemGtispem!0A? (nformation on 0irst >irtual is availa#le atF ftp!fv!comFpu#Gdocs ,any other 0A?s live atF rtfm!mit!eduFpu#Gusenet-#y-groupGnewsgroup e!g! rtfm!mit!eduFpu#Gusenet-#y-groupGsci!crypt &remail, a program for using chained remailersF ftpFGGftp!csua!#er eley!eduGpu#Gcypherpun sGpremailGpremail-=!95!tar!gB "he &:&sendmailG-ni$ *uite is availa#le fromF ftp!atnf!csiro!auFpu#GpeopleGrgooch ftp!dhp!comFpu#GcryptoGpgpG&:&sendmail A guide to &:& for the ,acintoshF ftpFGGftp!netcom!comGpu#G@wertyG'ere!is!'ow!to!,ac&:&

WWW
-sers who have a %orld %ide %e# #rowser which supports forms can o#tain &:& 9!2!9 with the -8LF httpFGGwe#!mit!eduGnetwor Gpgp-form!html

&age /9 of //

"his mechanism of distri#uting &:& avoids the necessity of telneting to net-dist and answering the four @uestions Cyou answer the @uestions on the formD! 0or a list of sites which have &:&F httpFGGwww!mantis!co!u GpgpGpgp!html 0or information on steganographyF httpFGGwww!nitv!netGXmechG8omanaGstego!html 0or information a#out digital cash and 6avid ChaumAs digicashF httpFGGdigicash!support!nlG "he &:& 0A? and other related information is availa#le atF httpFGGdraco!centerline!comF5=5=GXfranlGcrypto!html httpFGGwww!pegasus!esprit!ec!orgGpeopleGarneGpgp!html (nformation on 0irst >irtual is availa#le atF httpFGGwww!fv!com A list of relia#le remailers is maintained atF httpFGGwww!cs!#er eley!eduGXraphGremailer-list!html A pointer to current ,icrosoft %indows front ends for &:& can #e found atF httpFGGwww!LC*!comGwinpgp!html

T3shirts
0rontF CP&'E8&-.7* &age /+ of //

&utting the .*A out of #usiness 4ac F Cwith permission from "C ,ayD Crypto Anarchy encryption, digital money, anonymous networ s, digital pseudonyms, Bero nowledge, reputations, information mar ets, #lac mar ets, collapse of governments! A %e# page with the front and #ac design is located atF httpFGGwww!umn!eduGnlhomeGg555Gniel==99Gtshirt *end email to prig==11Mgold!tc!umn!edu for ordering information!

Cybers ace Consultancy


0or answers to @uestions on any of the a#ove topics, send K1== along with a detailed letter toF Ed Love .ew "rade &laBa 4loc A, 2G0 *uite 3 2 1n &ing *treet *hatin, .!"! 'ong 7ong 'owever, it is advisa#le to learn as much as possi#le first #y following the resources listed! "his will turn out to #e much cheaper and result in a #etter nowledge of the su#)ect!

&age // of //

S-ar putea să vă placă și