7 January 2002


Electronic Frontier Foundation Media Advisory

For Immediate Release: January 7, 2002

Contact:

Daniel Bernstein
   Associate Professor
   Department of Mathematics, Statistics, and Computer Science
   University of Illinois at Chicago
   press-20020107@cr.yp.to
   +1 312 413-9322

Rich Winter
   McBride Baker & Coles
   winter@mbc.com
   +1 312 715-5796

Professor Pushes for Revised Encryption Regulations

Govt. Censorship of Cryptography Research Unconstitutional

San Francisco - Professor Daniel J. Bernstein today renews his court battle against U.S. government obstructions to Internet security research.

Bernstein's court complaint, to be filed today by Rich Winter and Sarah Pace of the Chicago-based firm McBride Baker & Coles, challenges the constitutionality of the government's regulations on cryptography. Internet software uses cryptography to keep passwords and credit-card numbers safe from attackers.

"I'm trying to help protect computer systems against terrorists and other criminals," said Bernstein, who first filed legal action against the regulations as a Berkeley graduate student in 1995. "It's inexcusable that the government is continuing to interfere with my research in cryptography and computer security."

The U.S. government has imposed unilateral "national security" controls on encryption research and software for decades. Although strong cryptographic software has been available in Europe for many years, the U.S. government changed its cryptography regulations only two years ago in response to increased frustration by U.S. businesses and Professor Bernstein's successful legal case. However, current U.S. cryptography regulations are more complicated and obscure, restricting the flow of scientific information.

"The regulations require, for example, that whenever scientists disclose something new to a foreign colleague they simultaneously send it to the government," Winter said. "This makes in-person collaboration practically impossible."

Attorney Cindy Cohn of McGlashan and Sarrail led the case through a series of victories. In 1999, the Ninth Circuit Court of Appeals affirmed that earlier regulations violated the First Amendment. After the government changed the regulations in response, the appellate court sent the case back to the U.S. District Court. Cohn subsequently joined EFF as Legal Director and transferred the lead position on the case to McBride, Baker & Coles. The case will continue to challenge these regulations until they offer full protection for academic freedom and the Constitutional rights of researchers and programmers.

The government is scheduled to respond to Professor Bernstein's complaint by February 4, 2002, in the Federal District Court for the Northern District of California.

For the recent court complaint in the Bernstein case:

http://www.eff.org/bernstein/20020107_amended_complaint.html

For additional information about the Bernstein case:

http://www.eff.org/bernstein/

About McBride Baker & Coles:

McBride Baker & Coles is a dynamic, client-focused law firm helping businesses compete and grow in a technology-driven world. The firm provides legal services in nearly every area of the law to businesses, organizations, government entities, and individuals. The firm's website is at

http://www.mbc.com

                            -end-


For background here are the Export Administration Regulations (EAR) governing encryption exports.

Commerecial Encryption Export Controls

http://www.bxa.doc.gov/Encryption/Default.htm

Export Administration Regulations Web Sites

http://207.96.11.93/Regulations/Default.htm

http://w3.access.gpo.gov/bxa/

Export Administration Regulations Database

http://w3.access.gpo.gov/bxa/ear/ear_data.html

______________________________________

Source: http://w3.access.gpo.gov/bxa/ear/txt/ccl5-pt2.txt

Category 5 (Part 2) - Information Security (last revised 4 January 2001)


Commerce Control List Supplement No. 1 to Part 774
Category 5 - Info. Security--page
Export Administration Regulations

CATEGORY 5 - TELECOMMUNICATIONS AND "INFORMATION SECURITY"


II. "Information Security"


	Note 1:  The control status of "information security"
	equipment, "software", systems, application specific
	"electronic assemblies", modules, integrated circuits,
	components, or functions is determined in Category 5,
	part 2 even if they are components or "electronic
	assemblies" of other equipment.

	Note 2:  Category 5 - part 2 encryption products, when
	accompanying their user for the user's personal use, are
	eligible for License Exceptions TMP or BAG.

	Note 3:  Cryptography Note:  ECCNs 5A002 and 5D002 do not
	control items that meet all of the following:

	a.  Generally available to the public by being sold,
	without restriction, from stock at retail selling points
	by means of any of the following:
		1.  Over-the-counter transactions;
		2.  Mail order transactions;
		3.  Electronic transactions; or
		4.  Telephone call transactions;
	b.  The cryptographic functionality cannot be easily
	changed by the user;
	c.  Designed for installation by the user without further
	substantial support by the supplier;
	d.  Does not contain a "symmetric algorithm" employing a
	key length exceeding 64-bits; and
	e.  When necessary, details of the items are accessible
	and will be provided, upon request, to the appropriate
	authority in the exporter's country in order to ascertain
	compliance with conditions described in paragraphs (a)
	through (d) of this note.  See §742.15(b)(1) of the EAR.


A.  SYSTEMS, EQUIPMENT AND COMPONENTS


5A002 Systems, equipment, application specific "electronic
assemblies", modules and integrated circuits for "information
security", and other specially designed components therefor.

License Requirements

	Reason for Control:   NS, AT, EI

Control(s)						Country
Chart

NS applies to entire entry 		NS Column 1

AT applies to entire entry 		AT Column 1

EI applies to encryption items transferred from the U.S.
Munitions List to the Commerce Control List consistent with E.O.
13026 of November 15, 1996 (61 FR 58767) and pursuant to the
Presidential Memorandum of that date.  Refer to §742.15 of this
subchapter.

License Exceptions

  LVS:	Yes: $500 for components and spare
          parts only.  N/A for equipment.
	GBS:	N/A
	CIV:	N/A

 List of Items Controlled

	Unit: $ value
  Related Controls: See also 5A992.  This
  entry does not control:

  (a)  "Personalized smart cards" where
  the cryptographic capability is restricted
  for use in equipment or systems excluded
  from control paragraphs (b) through (f) of
  this note.  Note that if a "personalized
  smart card" has multiple functions, the
  control status of each function is
  assessed individually;
  (b) Receiving equipment for radio
  broadcast, pay television or similar
  restricted audience broadcast of the
  consumer type, without digital encryption
  except that exclusively used for sending
  the billing or program-related information
  back to the broadcast providers; (c)
  Portable or mobile radiotelephones for
  civil use (e.g., for use with commercial
  civil cellular radio communications
  systems) that are not capable of
  end-to-end encryption;
  (d) Equipment where the cryptographic
  capability is not user-accessible and
  which is specially designed and limited to
  allow any of the following:
     (1) Execution of copy-protected
     "software";
     (2) access to any of the following:
       (a)  Copy-protected read-only media;
        or
       (b)  Information stored in
       encrypted form on media (e.g., in
       connection with the protection of
       intellectual property rights) where the
       media is offered for sale in identical
       sets to the public; or
     (3) one-time encryption of copyright
     protected audio/video data;
  (e) Cryptographic equipment specially
  designed and limited for banking use or
  money transactions;
  (f) Cordless telephone equipment not
  capable of end-to-end encryption where the
  maximum effective range of unboosted
  cordless operation (e.g., a single,
  unrelayed hop between terminal and home
  basestation) is less than 400 meters
  according to the manufacturer's
  specifications.
  These items are controlled under ECCN
  5A992.
  Related Definitions: (1)  The term
  "money transactions" in paragraph (e) of
  Related Controls includes the collection
  and settlement of fares or credit
  functions.  (2)  For the control of global
  navigation satellite systems receiving
  equipment containing or employing decrypti
  on (e.g., GPS or GLONASS) see 7A005.
	Items:

	Technical Note:  Parity bits are not included in the key
	length.

a.  Systems, equipment, application specific "electronic
assemblies", modules and integrated circuits for "information
security", and other specially designed components therefor:

	a.1.  Designed or modified to use "cryptography"
	employing digital techniques performing any cryptographic
	function other than authentication or digital signature
	having any of the following:

	Technical Notes:

	1.  Authentication and digital signature functions
	include their associated key management function.

	2.  Authentication includes all aspects of access control
	where there is no encryption of files or text except as
	directly related to the protection of passwords, Personal
	Identification Numbers (PINs) or similar data to prevent
	unauthorized access.

	3.  "Cryptography" does not include "fixed" data
	compression or coding techniques.

	Note:  5A002.a.1 includes equipment designed or modified
	to use "cryptography" employing analog principles when
	implemented with digital techniques.

		a.1.a.  A "symmetric algorithm" employing a key
		length in excess of 56-bits; or

		a.1.b.  An "asymmetric algorithm" where the
		security of the algorithm is based on any of the
		following:
			a.1.b.1.  Factorization of integers in
			excess of 512 bits (e.g., RSA);
			a.1.b.2.  Computation of discrete
			logarithms in a multiplicative group of a
			finite field of size greater than 512
			bits (e.g., Diffie-Hellman over Z/pZ); or

			a.1.b.3.  Discrete logarithms in a group
			other than mentioned in 5A002.a.1.b.2 in
			excess of 112 bits (e.g., Diffie-Hellman
			over an elliptic curve);

	a.2.  Designed or modified to perform cryptanalytic
	functions;

	a.3. [Reserved]

	a.4.  Specially designed or modified to reduce the
	compromising emanations of information-bearing signals
	beyond what is necessary for health, safety or
	electromagnetic interference standards;

	a.5.  Designed or modified to use cryptographic
	techniques to generate the spreading code for "spread
	spectrum" systems, including the hopping code for
	"frequency hopping" systems;

	a.6.  Designed or modified to provide certified or
	certifiable "multilevel security" or user isolation at a
	level exceeding Class B2 of the Trusted Computer System
	Evaluation Criteria (TCSEC) or equivalent;

	a.7.  Communications cable systems designed or modified
	using mechanical, electrical or electronic means to
	detect surreptitious intrusion.




5A992  Equipment not controlled by 5A002.

License Requirements

	Reason for Control:   AT

Control(s)						Country
Chart

AT applies to 5A992.a			AT Column 1

AT applies to 5A992.b			AT Column 2

License Exceptions

	LVS:	N/A
	GBS:	N/A
	CIV:	N/A

List of Items Controlled

	Unit: $ value
	Related Controls: N/A
	Related Definitions: N/A
	Items:

a.  Telecommunications and other information security equipment
containing encryption.

b.  "Information security" equipment, n.e.s., (e.g.,
cryptographic, cryptanalytic, and cryptologic equipment, n.e.s.)
and components therefor.


B. TEST, INSPECTION AND PRODUCTION EQUIPMENT


5B002  Information Security - test, inspection and "production"
equipment.

License Requirements

	Reason for Control:   NS, AT

Control(s)						Country
Chart

NS applies to entire entry 		NS Column 1

AT applies to entire entry 		AT Column 1

	License Requirement Notes:  See §743.1 of the EAR for
	reporting requirements for exports under License
	Exceptions.

License Exceptions

	LVS:	N/A
	GBS:	N/A
	CIV:	N/A

List of Items Controlled

	Unit: $ value
	Related Controls: N/A
	Related Definitions: N/A
	Items:

a.	Equipment specially designed for:

	a.1.  The "development" of equipment or functions
	controlled by 5A002, 5B002, 5D002 or 5E002, including
	measuring or test equipment;

	a.2. The "production" of equipment or functions
	controlled by 5A002, 5B002, 5D002, or 5E002, including
	measuring, test, repair or production equipment;

b.  Measuring equipment specially designed to evaluate and
validate the "information security" functions controlled by 5A002
or 5D002.


C.  Materials [Reserved]







D.   Software


5D002  Information Security - "Software".

License Requirements

	Reason for Control:   NS, AT, EI

Control(s)						Country
Chart

NS applies to entire entry 		NS Column 1

AT applies to entire entry 		AT Column 1

EI applies to encryption items transferred from the U.S.
Munitions List to the Commerce Control List consistent with E.O.
13026 of November 15, 1996 (61 FR 58767) and pursuant to the
Presidential Memorandum of that date.  Refer to §742.15 of the
EAR.

     Note:  Encryption software is
     controlled because of its functional
     capacity, and not because of any
     informational value of such software; such
     software is not accorded the same
     treatment under the EAR as other
     "software"; and for export licensing
     purposes, encryption software is treated
     under the EAR in the same manner as a
     commodity included in ECCN 5A002.

     Note: Encryption software controlled
     for "EI" reasons under this entry remains
     subject to the EAR even when made publicly
     available in accordance with part 734 of
     the EAR.  See §§740.13(e) and 740.17(5)(i)
     of the EAR for information on releasing
     certain source code which may be
     considered publicly available from "EI"
     controls.

     Note: After a technical review,
     56-bit items, key management products not
     exceeding 512 bits and mass market
     encryption commodities and software
     eligible for the Cryptography Note (see
     §742.15(b)(1) of the EAR) may be released
     from "EI" and "NS" controls.

License Exceptions

	CIV:	N/A
	TSR:	N/A

List of Items Controlled

	Unit: $ value
  Related Controls:  See also 5D992.  This
  entry does not control "software"
  "required" for the "use" of equipment
  excluded from control under to 5A002 or
  "software" providing any of the functions
  of equipment excluded from control under
  5A002.
  Related Definitions: 5D002.a controls
  "software" designed or modified to use
  "cryptography" employing digital or analog
  techniques to ensure "information
  security".
	Items:

a.  "Software" specially designed or modified for the
"development", "production" or "use" of equipment or "software"
controlled by 5A002, 5B002 or 5D002.

b.  "Software" specially designed or modified to support
"technology" controlled by 5E002.

c.	Specific "software" as follows:

	c.1.  "Software" having the characteristics, or
	performing or simulating the functions of the equipment
	controlled by 5A002 or 5B002;

	c.2.  "Software" to certify "software" controlled by
	5D002.c.1.



5D992 "Information Security" "software" not controlled by 5D002.

License Requirements

	Reason for Control:   AT

Control(s)						Country
Chart

AT applies to 5D992.a.1		AT Column 1
and .b.1
AT applies to 5D992.a.2,		AT Column 2
b.2 and c

License Exceptions

	CIV:	N/A
	TSR:	N/A

List of Items Controlled

	Unit: $ value
	Related Controls: N/A
	Related Definitions: N/A
	Items:

a.  "Software", as follows:

	a.1  "Software" specially designed or modified for the
	"development", "production", or "use" of
	telecommunications  and other information security
	equipment containing encryption (e.g., equipment
	controlled by 5A992.a);

	a.2.  "Software" specially designed or modified for the
	"development", "production:, or "use" of information
	security or cryptologic equipment (e.g., equipment
	controlled by 5A992.b).

b.  "Software", as follows:

	b.1.  "Software" having the characteristics, or
	performing or simulating the functions of the equipment
	controlled by 5A992.a.

	b.2.  "Software having the characteristics, or performing
	or simulating the functions of the equipment controlled
	by 5A992.b.

c.  "Software" designed or modified to protect against malicious
computer damage, e.g., viruses.



E.  TECHNOLOGY


5E002  "Technology" according to the General Technology Note for
the "development", "production" or "use" of equipment controlled
by 5A002 or 5B002 or "software" controlled by 5D002.

License Requirements

	Reason for Control:   NS, AT, EI

Control(s)						Country
Chart

NS applies to entire entry 		NS Column 1

AT applies to entire entry 		AT Column 1

EI applies to encryption items transferred from the U.S.
Munitions List to the Commerce Control List consistent with E.O.
13026 of November 15, 1996 (61 FR 58767) and pursuant to the
Presidential Memorandum of that date.  Refer to §742.15 of the
EAR.

	License Requirement Notes:  See §743.1 of the EAR for
	reporting requirements for exports under License
	Exceptions.

License Exceptions

	CIV:	N/A
	TSR:	N/A

List of Items Controlled

	Unit: N/A
	Related Controls: See also 5E992
	Related Definitions: N/A
	Items:

The list of items controlled is contained in the ECCN heading.


5E992 "Information Security" "technology", not controlled by
5E002.

License Requirements

	Reason for Control:   AT

Control(s)						Country
Chart

AT applies to 5E992.a		 	AT Column 1

AT applies to 5E992.b			AT Column 2


License Exceptions

	CIV:	N/A
	TSR:	N/A

List of Items Controlled

	Unit:  N/A
	Related Controls: N/A
	Related Definitions: N/A
	Items:

a.  "Technology" n.e.s., for the "development", "production" or
"use" of telecommunications equipment and other information
security and containing encryption (e.g., equipment controlled by
5A992.a) or "software" controlled by 5D992.a.1 or b.1.

b.  "Technology", n.e.s., for the "development", "production" or
"use" of "information security" or cryptologic equipment (e.g.,
equipment controlled by 5A992.b), or "software" controlled by
5D992.a.2, b.2, or c.

EAR99  Items subject to the EAR that are not elsewhere specified
in this CCL Category or in any other category in the CCL are
designated by the number EAR99.