Internationally Available Strong Crypto Products

By Seán Boran

September 6, 1999. This is the first in a series of three articles devoted to Persons needing strong crypto Internationally. Most books, magazines and websites cover U.S. products, but these are not much use to International users who are penalised by the U.S. export restrictions.

The discussion is separated into three articles:
1. This Article:
           Introduction : What is strong cryptography?
           What are the International restrictions?
           Secured telnet/remote UNIX connections
           File encryption
2. Second Article (September 13):
           Secure Email
           Virtual Private Networks (VPNs)
3. Third Article (September 20):
           Development Libraries
           Secured web services

If we missed out on one of your favourite international products below, or you like to submit corrections/feedback contact us.


Introduction

There are several mechanisms which can be used to reduce security risks to data and IT systems, ranging from policies, physical protection,   firewalls, hardened operating systems, access control, authentication and encryption.   Encryption functions are used in many technical security mechanisms, but very few products containing "strong" encryption are available  Internationally.

This article discusses what strong cryptography is, what the restrictions are and give a brief overview of strong products in the following categories.

What is strong cryptography?
Cryptography is the translation of information (known as plaintext) into a coded form (known as cypertext) using a key.  In a strong cryptosystem, the plaintext can only be recovered by the use of the decryption key.
There are several possible weaknesses in a crypto system, and the strength of the system is the strength of the weakest link.
The definition of "strong" concentrates on the issue of key lengths, but strong keys are useless if the above issues are not addressed. Other weakness that can render strong cryptography useless are: not protecting keys physically, not using strong passphrases or social engineering attacks.
Here we define strong encryption as that which uses key sizes greater than or equal to 1568 bits for Public Keys (RSA, DH and ElGamal) and 90 bits for Shared (symmetric) keys. This is probably enough to protect against large organisations for the next decade. Many people refer to strong cryptography as "128 bit", but this only refers to share key (or symmetric) algorithms. 128 bit symmetric keys should be safe for 50 years at least.

"Strong" for new encryption systems such as Elliptical curve or Quantum cryptography is not included in this definition.


What are the International restrictions?

The U.S. and certain other countries consider encryption to be a weapon and strictly control exports. This is basically crippling the efforts to include standard encryption in Applications, Internet services, and Operating systems.

In general the U.S. allows export of 56 bit shared key systems (DES, 56-bit RC-2/4/5, 56-bit CAST) and 1024 bit public key systems, except to "terrorist countries". The last key relaxation of the export rules was in December 1998.

Some countries forbid encryption except when a key has been deposit in an escrow (so the legal authorities can listen to all communications if they need).  Other countries allied to the U.S.  also enforce the U.S. restrictions by allowing strong encryption domestically, but restricting exports. Germany has lifted export restrictions from 1st September 1999.

References


Secured telnet/remote UNIX connections

Secure Shell (SSH) is authored by Tatu Yionen, Espoo, Finland and is a secure replacement for Telnet, rlogin, rcp, rsh and provides secured TCP tunnels. Optional compression of traffic is provided and can also be used together with many authentication schemes such as SecurID, Kerberos, S/KEY to provide a highly secure remote access point to UNIX servers.

It is very well designed, supports numerous encryption algorithms (RSA, Triple DES, IDEA, Blowfish, ... ), is backward compatible with the Berkeley "r" commands and supports automatic encryption of X sessions.

Efforts are underway to make SSH an official Internet Standard, see www.ietf.org/html.charters/secsh-charter.html .


File encryption

There are no standards for file encryption, with the possible exception of PGP which has become a defacto standard. The PKCS#7 standard used in S/MIME could be used for file encryption, but no vendor seems have to implemented it.

PGP

PGP5 (www.pgpi.com or www.nai.com ) is principally an email encryption program, but also very interesting for file encryption. The Windows version has an excellent GUI, the UNIX version has only a command line interface. Network Associates support the commercial version.
  1. Symmetric or Asymmetric encryption of files (local or on a network server) on a file-by-file  or directory basis, to protect the privacy of files.
  2. Signing of files (local or on a network server) on a file-by-file basis, to verify who files belong to and confirm that they have not changed.
  3. Secure deletion (overwriting) of files.
  4. PGPdisk offers encrypted logical drives (using symmetric keys)
  5. The fact that secure email is possible means that one set of keys is used for both functions and the user only has to learn how to use one program.

F-Secure

F-Secure Desktop V2.0, from Finland allows symmetric encryption of files on Windows systems with a GUI.  www.datafellows.com/f-secure . F-secure Desktop is interesting for:
  1. Protecting files for long term storage or transport: Taking a bundle of files, creating an "encrypted package", sending this package (via email or diskette) to someone else anywhere in the world and allowing them to securely decrypt the files, without having F-Secure desktop themselves.

  2. Of course the encryption key must be shared "out of band".
  3. Protect files from an attacker who has physical access: Encryption of files (local or on a network server) on a file-by-file basis, to protect the privacy of files.
  4. Automatic encryption of a list of confidential files when you log out and decryption when you login in. This mode is only recommended for local files, NOT files on network servers.
  5. Secure deletion of confidential files.
FileCrypto 3 is an extension of the F-Desktop product discussed above, with automatic "on the fly" encryption and decryption of "secret files". Files are only decrypted into memory when loaded from disk, so files are always encrypted on disk and so there is no (long) decryption on login and encryption on logout as with F-Desktop.

Others

Sentry 2020: Softwinter, an Israeli company, produce a strong encryption tool for NT and Windows CE!. It sets up a "virtual encrypted drive" that is in fact a file on the system. This file is encrypted and can only be mounted as a standard drive using Sentry and enter a password. This drive can then be used as a normal drive, except that it is encrypted.

Sapher Server Ltd., from England produce a software called Secrets for Windows which supports symmetric and asymmetric algorithms and includes macros for easy usage within Microsoft Office Applications.

Cryptext: How about a free NT/Win95 file encryption program? Nick Payne www.pcug.org.au/~njpayne has produced a file encryption tool for Win95/98 & NT called Cryptext, that uses RC4 and SHA-1. It is available in the English, French, German, Portuguese and Spanish languages. V3.2 can be downloaded from ftp.funet.fi/pub/crypt/utilities/file

CodedDrag V2.1 is a extended Shareware encryption tool for Win95/NT. See www.fim.uni-linz.ac.at/codeddrag/codedrag.htm

RITS Private file: A 16bit Windows product which uses DES to encrypt files is Private File . www.rits.ie/products/pf.htm

FLYCRYPT for Windows'95 is a shareware "Transparent" encryption program capable of encrypting files in a selected folder using two strong ciphering algorithms: BLOWFISH (key of length 448 bit, 32 rounds) and GOST 28147-89 (key of length 256 bit, 32 rounds). www.softclub.net/~mahabit/

Ironware (Czech republic) produce the Ironware Folder  PC encryption tool . IDEA or Blowfish algorithms are used to encrypt "marked" folders on shutdown and decrypt them on startup (like F-Secure Desktop above). Several users with different passwords can use the same PC.

Deutsche Telekom TELESEC offer Sfile, for signing and encryption of files, with a chipcard interface.

Enigma98 is a product of Cryptosoft GmbH, Germany which offers symmetric encryption (many ciphers) for 16 and 32bit Windows users.


Sean Boran is an IT security consultant based in Switzerland and the author of the online IT Security Cookbook.