[Cryptography] Possible reason why password usage rules are such a mess

iang iang at iang.org
Fri Nov 13 20:16:24 EST 2020


On 04/03/2020 13:16, Peter Gutmann wrote:
> There has been some speculation in the past over why we have so many cargo-
> cult password security rules that make no sense in any modern context, the
> prime example being the need to change passwords periodically.  I've found one
> possible explanation, the Ware Report, which talks about authentication words
> more than passwords, and in a manner in which they resemble military
> countersigns rather than what we'd think of today as passwords:
>
>    Authentication words or techniques must be obtained from an approved source,
>    or, alternatively, must be generated and distributed under the cognizance of
>    the System Security Officer by approved techniques. Specifically, a user
>    cannot generate his own passwords [...] Authentication words must be changed
>    as frequently as prescribed by the approved issuing source.
>
> Looking at a WWII-era field manual, that looks very similar to the
> requirements for countersigns given in that.  Perhaps this could be the source
> of so much of the historical baggage of unknown origin that's attached to
> passwords, they came from military countersigns that were repurposed for use
> with computers.


Military crypto is very different to civilian crypto.  In the latter, 
there is a sense that some random Alice has to talk to some random Bob, 
and they don't know each other and can't trust each other so have to go 
through some form of ceremony before they can be permitted to know and 
trust each other.

In the military it's the other way around. Every soldier needs to know 
and trust all other soldiers in the same military. For example (and this 
applies to my time many decades ago) it is the case that any soldier on 
the ground should be able to call in indirect fire support from any 
assets in the area - which includes aircraft and ships.

In order to enable this, the crypto system had to be centralised. 
Recalling that (a) until recently it wasn't likely that soldiers could 
carry sophisticated tools that could do things like public key 
encryption and (b) security at the sharp end was tactical, which meant 
you only had to keep the secrets for O(day). Especially, any battle info 
was already compromised because the enemy was on the receiving and and 
knew what you were likely sending.

The answer then was a very large centralised distribution of books, 
which changed over like daily or every 6 hours. Everyone had the same 
books, and everyone had to synchronise changeover at the same time (and 
same zone) as stated in Zulu time (GMT).

The same thing is seen at the unit level - the CO sends out a patrol 
from one squad, and it has to come back in through another squad. Ofc 
they both have to have the same code words. Which means codewords need 
to be rotated daily as everyone has them, if anyone gets captured he 
only needs to hold out for a day.

Bear in mind that military crypto has a much longer history, numbering 
in centuries. Whereas civilian crypto up-ticked in the 80s (Unix 
delivered DES as an early mistake) and only became really important in 
the 90s. All the expertise was initially military - even the guys who 
were involved in Unix security eg Morris were connected to military and IC.

So assumptions were picked up and not questioned. The Internet had to 
find out the hard way that we had to discard the received wisdom and 
rebuilt it from 1st principles.

iang



More information about the cryptography mailing list