[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::ibmpc-95

Title:IBM PCs, clones, DOS, etc.
Notice:Intro in 1-11, Windows stuff in NOTED::MSWINDOWS please
Moderator:TARKIN::LINND
Created:Tue Jan 03 1995
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:3023
Total number of notes:28404

1186.0. "Netscape ?" by SALEM::DEAN () Wed Mar 22 1995 11:19

T.RTitleUserPersonal
Name
DateLines
1186.1QUARK::LIONELFree advice is worth every centWed Mar 22 1995 12:235
1186.2More InfoMSDOA::MCCLOUDplug & prayWed Mar 22 1995 14:043
1186.3Ultranet is well pricedSTOWOA::BUFTON::NBUFTONWed Mar 22 1995 18:493
1186.4AKOCOA::DANEK::DANEKDick Danek, EMAIL=AKOCOA::DANEKWed Mar 22 1995 19:287
1186.5AXEL::FOLEYRebel without a ClueWed Mar 22 1995 20:1910
1186.6EEMELI::BACKSTROMbwk,pjp;SwTools;pg2;lines23-24Thu Mar 23 1995 07:166
1186.7How about ULIMITED hours for $19.95/month?ROWLET::AINSLEYLess than 150 kts. is TOO slow!Thu Mar 23 1995 12:384
1186.8Digital discount is 10% at UltranetUHUH::CARIGNANDon CarignanThu Mar 23 1995 16:307
1186.910% is what I was told - my entry of 20% was a typoSTOWOA::BUFTON::NBUFTONThu Mar 23 1995 18:121
1186.10LANDO::EIBENFri Mar 24 1995 11:399
1186.11SKYLAB::FISHERIndecision is the key to flexibility!Fri Mar 24 1995 15:473
1186.12QUARK::LIONELFree advice is worth every centFri Mar 24 1995 16:003
1186.13QUARK::LIONELFree advice is worth every centFri Mar 24 1995 16:003
1186.14AXEL::FOLEYRebel without a ClueFri Mar 24 1995 19:317
1186.15Netscape encryptionSLOAN::HOMMon May 19 1997 15:3710
I'm interested in learning more about the encrytion used
in Netscape. For example, I just viewed a document with
security: "... uses high-grade encryption key for US
domestic use only (RC4, 128 bit)."

Does anyone have anymore details?

Gim


1186.16TUXEDO::WRAYJohn Wray, Distributed Processing EngineeringMon May 19 1997 15:4812
>I'm interested in learning more about the encrytion used
>in Netscape. For example, I just viewed a document with
>security: "... uses high-grade encryption key for US
>domestic use only (RC4, 128 bit)."
    
    What do you want to know?  RC4 is a variable key-length symmetric
    cipher designed by Ron Rivest of RSA Data Security Inc (Rivest is the
    "R" in RSA).  The details of the algorithm are a trade secret of RSADSI
    (although code purporting to be an implementation of RC4 was posted in
    various crypto-related newsgroups last year).
    
    John
1186.17follow up questions ...SLOAN::HOMWed May 21 1997 12:5817
Thanks for the info.  

1.  IS RC4 based on the public-key cryptography?  Logically it would.
2.  I recall that the RSA factoring challenge was won in 1995 by
    a worldwide network of computers co-ordinated by some group at
    MIT. What was key length?
3.  How secure is RC4 Export?


A lot of personal information is being made available via the Web -
brokerage account, bank account info, etc...  I'd like to better
understand what risks I'm taking in accessing that information.

Gim



1186.18TUXEDO::WRAYJohn Wray, Distributed Processing EngineeringWed May 21 1997 15:0926
    >1.  IS RC4 based on the public-key cryptography?  Logically it would.
    
    No, it's a symmetric cipher.  
    
    >3.  How secure is RC4 Export?
    
    Not sure what you mean by "how secure".  It's generally easy to get 
    export approval for RC4 with a 40-bit key (it's one of the fast-tracked
    algorithms).  As far as I know, there aren't any major problems with
    RC4 that might make it weaker than you'd expect of an algorithm with a
    40 bit key.  
    
    There's a current RSA challenge, aimed at symmetric cipers, of which
    the first and easiest part was 40-bit RC5 (RC5 is a fully parameterized
    cipher: key-length, block-size and number of rounds are all variable. 
    It's widely believed that the "RC" designation stands for "Ron's
    Cipher").  It was broken in 3.5 hours.  The next level was 48-bit RC5,
    which fell after 313 hours.  These were both done by the now standard
    technique of dividing the key-space among a set of machines on the
    network - that way you can just keep throwing more CPUs at the problem. 
    Next comes 56-bit RC5 and DES, then longer key-length RC5.  You can
    find out more about the current challenge at RSA's challenge '97 web
    page (www.rsa.com/rsalabs/97challenge/), and if you poke around there
    you'll also find details of past challenges.
    
    John
1186.19SKYLAB::FISHERGravity: Not just a good idea. It's the law!Wed May 21 1997 17:5611
    >1.  IS RC4 based on the public-key cryptography?  Logically it would.
    
    No, it's a symmetric cipher.  

I might well be wrong, but I understood that there is some public key stuff
involved.  Essentially the RC4 key is sent between the two parties encrypted
with public key technology; after that the actual data is encrypted with RC4.

Do you agree?

Burns
1186.20TUXEDO::WRAYJohn Wray, Distributed Processing EngineeringWed May 21 1997 18:1610
>I might well be wrong, but I understood that there is some public key stuff
>involved.  Essentially the RC4 key is sent between the two parties encrypted
>with public key technology; after that the actual data is encrypted with RC4.
    
    You're talking about systems that use RC4 (presumably SSL), not RC4
    itself.  SSL does indeed use public-key encryption to authenticate one
    or both parties, and to establish an RC4 session key, but RC4 itself is
    symmetric.
    
    John
1186.21SKYLAB::FISHERGravity: Not just a good idea. It's the law!Wed May 21 1997 18:369
Yes, that's what I was trying to say (though I'm not up on all the TLAs...is
SSL the IP "secure sockets" protocol?

Anyway, I was trying to clarify since I think the original question was about
Netscape security, and that it was logical it security should involve public
key cryptography.  I was trying to say and have confirmed that Netscape DOES
use public keys, but only as a means to exchange RC4 symmetric keys.

Burns
1186.22SLOAN::HOMThu May 22 1997 02:2113
    Thanks to Burns for more clearly stating  my question and thanks to
    John for the technical answers.  With the pointer to the RSA site, I
    was able to get the information I was looking for.
    
    This string also explain the hole in  Netscape's encryption algorithm
    discovered few years ago.  It was linked to the time of day which in
    turn dramatically narrowed the search range in a brute forece attack.
    
    
    
    Gim