[Previous] [Next] [Index] [Thread]

RE: Internet Tunnel Question



Additionally, Motorola's Network Encryption System (NES) offers Type I IP 
datagram (as well as other options) encryption.  The Isolation Systems 
Packet Encryptor (ISPE) is another very good option where Type I 
cryptography is not required; Cylink also has a product.  NSC's security 
router line offers mature datagram encryption with a great filtering 
capability in a pricey router, and cisco/others are beginning to offer 
h/w-based cryptographic solutions as well.  Using NT?  Blue Ridge Software 
sells TNT, which will do IP datagram encryption in s/w on each NT host (as 
well as offering other CIPSO-like, i.e., DNSIX/MAXXSIX, functionality).

----------
From: 	Mike Muuss[SMTP:mike@arl.mil]
Sent: 	Friday, December 08, 1995 12:07 PM
To: 	Brian W. Spolarich
Cc: 	Prince, Cheryl; www-security@ns2.rutgers.edu
Subject: 	Re: Internet Tunnel Question


> Digital recently released a new (?) way of using the public Internet to 
create -
> -or replace--private local or wide area networks. All sensitive data is
> encrypted with RSA tech, private key/public key cryptography on either 
end of
> communication as well as authentication so the parties can accurately 
identify
> each other. It's called the Digital Internet Tunnel.

While the use of RSA public keys to handle session key management is a
nice addition, the basic idea of an encrypted tunnel has been around for
a long time. We have been using this type of technology in production
for more than 5 years now.

The following units are NSA approved for encryption and transmission of
classified military data over the open InterNet, when used with
appropriate keying materials:

	Wang TIU (Trusted Interface Unit)
	Xerox XEU (Xerox Encryption Unit)

There are a number of newer devices on the market, but I have no
experience with them.

Is the Digital InterNet Tunnel NSA approved for classified information?
If not, I would place a limited amount of trust in it, even in a
corporate setting.  Some careful study would seem to be warranted.

	Best,
	 -Mike Muuss

	  Chief Computer Scientist
	  Ballistic Vulnerability/Lethality Division
	  Survivability and Lethality Analysis Directorate
	  The U.S. Army Research Laboratory
	  Attn: AMSRL-SL-BV
	  APG, MD  21005-5068  USA

	  410-278-5058 FAX



begin 600 WINMAIL.DAT
M>)\^(@<"`0:0" `$```````!``$``0>0!@`(````Y 0```````#H``$%@ ,`
M#@```,L'# `2`!4`. `X``$`=@$!"8 !`"$```!%.$4S135",D$V,SE#1C$Q
M.#E&0C P-C X0S8X13<W10!1!P$@@ ,`#@```,L'# `2`!4`.0`%``$`1 $!
M"( '`!@```!)4$TN36EC<F]S;V9T($UA:6PN3F]T90`Q" $$@ $`'0```%)%
M.B!);G1E<FYE="!4=6YN96P@475E<W1I;VX`2 H!#8 $``(````"``(``0.0
M!@`0"0``$@````L`(P``````"P`I```````#`"8```````,`-@``````'@!P
M``$````9````26YT97)N970@5'5N;F5L(%%U97-T:6]N``````(!<0`!````
M&P````&ZS;=G/K+EX]4YIA'/B?L`8(QHYWX``/'8,@`#``80F.Z+'P,`!Q I
M!P``'@`($ $```!E````041$251)3TY!3$Q9+$U/5$]23TQ!4TY%5%=/4DM%
M3D-265!424].4UE35$5-*$Y%4RE/1D9%4E-465!%24E01$%404=204TH05-7
M14Q,05-/5$A%4D]05$E/3E,I14Y#4EE05 `````#`! 0``````,`$1 `````
M`@$)$ $```!G!P``8P<``*0,``!,6D9UVC4"@_\`"@$/`A4"J 7K`H,`4 +R
M"0(`8V@*P'-E=#(W!@`&PP*#,@/%`@!P<D)Q$>)S=&5M`H,SMP+D!Q,"@S0#
MQA3(-1+,713%?0J ",\)V3L8SS(\-34"@ J!#;$+8&YGN#$P,Q10"PH6DC(2
ML 9C`$ 4L&1D:71I(P(@!T!L>2P%T&]TDP6P!O!A)P>B='<%L-!K($5N!0!Y
M!3 >`0$3E2 H3D53*2 N;PW0!) $(%0@`&4@PDDA\% @9&$!D G 2F$@P6$$
M('=E'D @NR+Q'J!H!) A," 3<R$@<PGP'^8N("&@(\ A\'/7'N$@*00@4 #0
M:Q' '[;!!;$H25-012$@! `5(V!N(Z1V!)!Y(&?^;P1P(_4C$"/!(> AM2=4
MN2*1<&@I("A!*($@&- (<75I&-$[($-YWFP+@!^@!T EL" 1@"A11B 34 1P
M=6-T)3%.K%-#'Q$1L&,(<70I(/T#8'43T 7 +-$AX"%%`,!^= AP(> B5R28
M(Q =X&CG+:$)P2)@(&8#$"^1"X#^9RK *U !H ,0+R(+@"VC>&EC92]&'G `
M<"EP8SL$``6@+R.C*%$J,6)E?F<+@ ,`,X$>L"$T+6 O^'<M8B+P"8 JRC30
M+L"_!O O@"0R(V(C(B4Q50"0T3.!3E0_)4!""D$'\.AI9&<AX%,A0!]@-K+_
M$; >0"&1.T ><"H`-- R<'L#\"-!9"U0(BHQF31A<W\X,"$P`Z RT#VQ.T M
M8&]?$\ BW"%2,W(CI$,B(%,<3RTLT";P'G!I+F4*+AYP1"YP25@O39A!6%A$
M,1YP9G4?T'L=]"\A*24Q"H4*BRS0,00X, +1:2TQ-#3/#? ,T$?S"UDQ-@J@
M`V#S$] N(" M2A<*ATC+###U299&`V$Z2QY)E@R"!= 30V$%T'5U!!!;4TW0
M5% Z;4-A0 K .J#Y3]!L74J_2\T&8 (P3/_73@M,L#OP81YA1 60$^ 3-O %
MP# X'G Q.3E"-58`,CHP-R:P3;-0KTO-5&]2[TX+0@<A90.@5R4P4W >X33!
M:+-6[TO-0V-9#TX+4#-ANS3@'G!#(\$LP"R0=V$`BBTNUD `@#(N<B^ /SP0
M$:!#P"X`7 ]1OG5B3FI)T5XO3@M2964P27<", 21)P%411 O\ ,@49\*4!/ 
M'@%&'T<C,S9(EZ\58@P!298*A3Y$`&DW$'\!D ,@&- TX (P'E L`6R?,M X
M@BVP+_ 'X"@_(2!W/( I("% ($] -U,E<7#_9- LT#F 9U<WD04`,M$AX/M*
MIFQ +06Q&- +433@2A#]-+%V<1(88#.P`R %L0/P_PVP-J)N`A]C8G 4L"-!
M$;#_`($=\"CP(D,H,FO7))4XD;$R0U)303> !9!H'G#S<L8F\'DO;[5Y$2K,
M0$)_,E$CT0GP*7%N\&O7!:!MWFU%$#30)>0B^6$O@"/ _P(P?-8M06]S"L =
M\ >1,[!]-'%C+O%Q$6U!<^%^46:?*2!V>$""(Z,E,$ET'Q'_<V%MD"EP;W)L
M9F==)3!HW/Y7.6!MD&]C3T P`G?C>5C_!" WD1& -;"&41&P!! @,O]YP@.!
M(H 3X%*Q*#,*A7S!_W0!'<4><&]R.&$Y<7/A+;#_;N$#D7<(,+!H`RUR-O )
M\.\VH0A@-;$"$'(*A2VP&&#W-V('<24P5R'@$8!UP8Z#_V\6*$$O,"'1;N%X
M,BB &&#^9S1#+=5HJ(]!,( %L(9B.P.15D!Y,M A@2B =RY_:-PE8@(0'D"6
M$#-R?+%T_S:4+G!X$"M0+=$H\(\C,8K]-:)T(J `@$_0B/0A0 J%_F,+8(CQ
M,Q XD5!A;)$I$?]U\YDA!<!O<B0`CJ%G4Q]!_SUBD5-W=8]VF/(TL7C5,W*W
M,)$&<2TA.FC=3I)7&\'I(:!)52#05&(0$\$I<%UG4V9R<3K0F!$IHJI8Z020
M;WBF($6CT:8T'\G?I2J6N"HQ-K)N`755@V[A]VXA(]$-L'8TT2.!`Z!O<O<`
MP!^0GM)B+X A\9#C*(#Y"H5E>"'0"(%@,3(T(['^;98]):"#;YZR9]:8KYP)
M[PN CT$PD1X!/Z]6JF$>H.<><"(`'W!U;"EP<E./TO\'<!W@;=($8$40!4"2
M@J02_S12'> ><*KPCJ$T8IN6!;#_6X" 8B[!`D S<24Q/$ '@-\SH1C010!U
M,3"P9"D@M43?$; @L3>1-O!ND7*:L7=A]Y8]6I1H<2RBJDH`3MB]/]^_46!Q
M")!N\ A0;6^P+Y+>4S7@?D(3P,"L0AXQPM$].7%6M6 O\"*@,_0O3/\1P!& 
M-!-L8*L`B0+ K&3 OG*K`'+P,_4UHL5H01XA_Q.P*$%L8&SA'K%Q$<"L)6+X
M52Y3=/&SL"D@9Q 1L+L*P#VQ3 &@N5(%L'G K"I!`D!N93!!!>!23"0M4\[0
M0E;-75!'%1YQ1"5 ,AOP,#4M\#4P-C@ZP7@`P#_!0D(T&_ M,C<XT0$U_=% 
M1D2 :4](EQT%:UT7\0(`US `0 `Y`"# .:B]S;H!`@%'``$````R````8SU5
M4SMA/2 [<#U396-U<F5#,CML/5!R:79A=&4@341"+3DU,3(Q.3 R-38U-EHM
M- ```$ `!S#@)BU_O,VZ`4 `"# 0FA^NO<VZ`1X`/0`!````!0```%)%.B `
A`````@$4- $````0````5)2AP"E_$!NEAP@`*RHE%\,7
`
end