home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Internet Info 1997 December
/
Internet_Info_CD-ROM_Walnut_Creek_December_1997.iso
/
drafts
/
draft_s_z
/
draft-woodward-encryption-module-00.txt
< prev
next >
Wrap
Text File
|
1995-12-15
|
6KB
|
203 lines
Network Working Group Hal Woodward
Internet Draft Safe-Tech Systems
December 1995
PEM Compression Encryption Module
<draft-woodward-encryption-module-00.txt>
Status of this Memo
This document is a submission to the Privacy-Enhanced Electronic
Mail Working Group of the Internet Engineering Task Force (IETF).
Comments can be sent to the author at Safetech@access.digex.net
or in writing at his address on last page.
Distribution of this memo is unlimited.
This document is an Internet Draft. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its
Areas, and its Working Groups. Note that other groups may also
distribute working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of six
months, and may be updated, replaced, or obsoleted by other
documents at any time. It is not appropriate to use Internet
Drafts as reference material, or to cite them other than as a
''working draft'' or ''work in progress.''
To learn the current status of any Internet Draft, please check
the ''lid-abstracts.txt'' listing contained in the Internet-
Drafts Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net
(Europe), munnari.oz.au (Pacific Rim), ds.internic.net (US East
Coast), or ftp.isi.edu (US West Coast) to learn the current status
of any Internet Draft.
Woodward Expires in Six Months [Page i]
Internet Draft Compression Encryption Module December 1995
Abstract
The Privacy-Enhanced Electronic Mail system (PEM) [1] provides an
inclusive standard as adopted by the Internet Architecture Board
(IAB) to provide secure electronic mail over the Internet. The
PEM protocols [2] provide for encryption, authentication, message
integrity, and key management. PEM's encryption [3] accomplishes
privacy of messages using DES in CBC mode; Integrity [4] via a
cryptographic hash algorithm called a Message Integrity Check
(MIC)using either MD2 or MD5; Symmetric key management [5] using
DES in ECB mode or triple-DES using two keys (EDE mode); and
supports [6] public-key certificates for key management, using
the RSA algorithm and X.509 standard for certificate structure.
This document describes the use of a Spiral Network Algorithm
Compression routine integrated into the message-text encryption
routines to provide enhanced confidentiality and smaller message
size without impacting the throughput of the PEM system. It is
the intention of the author to seek guidance from the readers
on methods of testing and certification other than those listed
herein.
Woodward Expires in Six Months [Page ii]
Internet Draft Compression Encryption Module December 1995
In June of 1995, while preparing for the November Radiological
Conference in Chicago and working within the area of x-ray film
digitization and enhancement, the author developed a new form of
compression based upon spiral geometry. The compression achieved
compares very favorably with that achieved by commercial compression
packages, with the exception that it is as fast in software as CODAC
boards in performing compression and decompression and is Lossless
in nature.
Having just attended the annual security conference in Washington
DC, where we shared a booth with the TigerSafe folks, our thoughts
turned to a number of problems we discussed with IS and security
people from all over the world. The use by major corporations of
LANs, WAN's, and Internet access providing two-way communications
has given rise to many security problems from Internet hackers.
Being a regular reader of the computer underground articles posted
for hackers, I was already aware of many of the success stories from
computer freaks, concerning breaks into Internet sites and stealing
the "secured" messages stored there. As the Internet handles more
financial transactions the problems have continued to increase.
While considering the problems the author began a series of tests
and embedded his compression algorithm in-line within a software
package he has been developing called PEM+. Taking the message
text and compressing the memory buffer before encrypting it. The
result was a message block which successfully withstood some of
the best hacking and encodement breaking tools existing.
Following that test we experimented with triple CBC encryption,
following compression, of the message block and believe that we
may very well have a combination that will withstand NSA and an
N1 computer for a hundred years. The author plans to test the
compression algorithm using the Central Imaging Office (CIO-Pentagon)
test suite and the ARPA Internet images.
It is the author's intention to incorporate the results into
his PEM+ development. Any suggestions for further testing
would be gratefully accepted by the author.
Finally, for the developers out there, would there be any interest
in a Data Link Library (DLL) which could be integrated into Visual
Basic, Visual C, C++, or Delphi for compression and encryption.
Woodward Expires in Six Months [Page 1]
Internet Draft Compression Encryption Module December 1995
Chair's Address
The working group can be contacted via the current chair:
Stephen Kent
Email: kent@bbn.com
Author's Address
Questions and responses about this memo can be directed to:
Hal Woodward
Safe-Tech Systems, Inc.
45593 Shepard Drive
Suite 201
Sterling, VA 20164
Email: Safetech@access.digex.net
Woodward Expires in Six Months [Page 2]