Sorry, no point to this question, just idle curiousity.
--
Eric Lee Green er...@badtux.org http://www.badtux.org
GnuPG public key at http://badtux.org/eric/eric.gpg
BadTux: Linux Penguin Gone Bad
First time I saw it was here on this newsgroup several years ago. I
had the impression that it was something the poster had just made up
in the context of that particular post. Followups to that post also
used it and the term stuck around. Google doesn't include the
earliest references but Marcus Ranum may have been the culprit.
In article <slrna4bra...@ehome.inhouse>, Eric Lee Green
<er...@badtux.org> wrote:
> I am curious about the origins of the term "rubber hose
> cryptanalysis". Does anybody know who coined that term in reference
> to use of coercion to extract encryption keys from suspects? Any idea
> where and when it was first referred to as such in the cryptographic
> literature?
>
> Sorry, no point to this question, just idle curiousity.
The phrase first hit Usenet near the end of May 1992:
--------------------------------------------------------------------
Newsgroups: sci.crypt
From: m...@hussar.dco.dec.com (Marcus J. Ranum)
Subject: Re: yet another old bad code
Message-ID: <1992Mar29.0...@decuac.dec.com>
Sender: ne...@decuac.dec.com (USENET News System)
Nntp-Posting-Host: hussar.dco.dec.com
Organization: Digital Equipment Corporation, Washington ULTRIX Resource
Center
References: <1992Mar27.0...@cs.cmu.edu>
<LAMBAST.92...@buengf.bu.edu>
<1992Mar28.2...@cs.cmu.edu>
Distribution: na
Date: Sun, 29 Mar 1992 01:18:18 GMT
as...@cs.cmu.edu (James Aspnes) writes:
>If the key stream is a genuinely random sequence of characters this
>sort of code can be made unbreakable-- if you do the addition right
>you get a one-time pad. If the key sequence is just English text,
>even with spaces deleted, what you do is look for sums of common words
>in the ciphertext.
No. You don't get it. You don't use linear sequences of text.
Suppose I want to encode the message "foo", I open the book at a random
spot and find the first 'f' - page 44, line 3, word 3. Then I flip a
few pages at random and find an 'o' - page 89 line 12, word 6 and my
last 'o' is page 3, line 5, word 1.
My ciphertext is now: 44 3 3 89 12 6 3 5 1
This is actually rather hard to break without resorting to
rubber hose cryptanalysis, or wading through my entire library (which
is large) - though I could be using byte offsets into particular
postings from talk.bizarre, for all you know...
mjr.
--
"Sometimes if you have a cappuccino and then try again it will work OK."
- Dr. Brian Reid, 1992
"Sometimes one cappucino isn't enough."
- Me
--------------------------------------------------------------------
I found this article from October 1990 in the groups.google.com archive, again
by Marcus J. Ranum:
rom: m...@hussar.dco.dec.com (Marcus J. Ranum)
Newsgroups: sci.crypt
Subject: Re: Cryptography and the Law...
Keywords: Search Warrants and Encryption
Message-ID: <1990Oct16....@decuac.dec.com>
Date: 16 Oct 90 05:00:00 GMT
References: <47...@cornell.UUCP> <14...@smoke.BRL.MIL> <47...@cornell.UUCP>
Sender: ne...@decuac.dec.com (Network News)
Reply-To: m...@hussar.dco.dec.com (Marcus J. Ranum)
Organization: Digital Equipment Corp., Washington Ultrix Resource Center
Lines: 60
Posted: Tue Oct 16 06:00:00 1990
[...]
Problem #2: is that white noise, or is it a one-time pad ? I
dunno. Awfully hard to prove, isn't it ? Unless, of course, I left
my radioactive source and oscillators lying around. Big deal, you
zap me for a misdemeanor. You still don't get The Master Plan, unless
you resort to the rubber-hose technique of cryptanalysis. (in which
a rubber hose is applied forcefully and frequently to the soles of
the feet until the key to the cryptosystem is discovered, a process
that can take a surprisingly short time and is quite computationally
inexpensive)
[...]
================
So it appears that Marcus is the first to bring it to USENET, at least
insofar as the Google archives are concerned. He's still around. I guess
I can send him EMAIL asking him if he'd seen the term before he (apparently)
coined it in the above message.
Eric Lee Green wrote:
>
> I found this article from October 1990 in the groups.google.com archive, again
> by Marcus J. Ranum:
> Problem #2: is that white noise, or is it a one-time pad ? I
> dunno. Awfully hard to prove, isn't it ? Unless, of course, I left
> my radioactive source and oscillators lying around. Big deal, you
> zap me for a misdemeanor. You still don't get The Master Plan, unless
> you resort to the rubber-hose technique of cryptanalysis. (in which
> a rubber hose is applied forcefully and frequently to the soles of
> the feet until the key to the cryptosystem is discovered, a process
> that can take a surprisingly short time and is quite computationally
> inexpensive)
> [...]
Very interesting to know that certain techniques of the
Middle Age (to be seen in a few special museums) have
evolved quite a bit.
M. K. Shen
:-) I hate it when that happens.
Paul
>
>
> From: m...@hussar.dco.dec.com (Marcus J. Ranum)
> Newsgroups: sci.crypt
> Subject: Re: Cryptography and the Law...
> Keywords: Search Warrants and Encryption
> Message-ID: <1990Oct16....@decuac.dec.com>
> Date: 16 Oct 90 05:00:00 GMT
> References: <47...@cornell.UUCP> <14...@smoke.BRL.MIL> <47...@cornell.UUCP>
> Sender: ne...@decuac.dec.com (Network News)
> Reply-To: m...@hussar.dco.dec.com (Marcus J. Ranum)
> Organization: Digital Equipment Corp., Washington Ultrix Resource Center
> Lines: 60
> Posted: Tue Oct 16 06:00:00 1990
>
> [...]
> Problem #2: is that white noise, or is it a one-time pad ? I
> dunno. Awfully hard to prove, isn't it ? Unless, of course, I left
> my radioactive source and oscillators lying around. Big deal, you
> zap me for a misdemeanor. You still don't get The Master Plan, unless
> you resort to the rubber-hose technique of cryptanalysis. (in which
> a rubber hose is applied forcefully and frequently to the soles of
> the feet until the key to the cryptosystem is discovered, a process
> that can take a surprisingly short time and is quite computationally
> inexpensive)
> [...]
So now you can astound and amaze all your friends and relatives by
answering the question, "who originated the term 'rubber-hose
cryptanalysis'?". What the hey, it's useless trivia, but no more
useless than any other trivia, and it was a distraction from trying to
beat sense into yet another twirp proposing a broken PRNG that lacks
any qualities needed for cryptographic work. (Or writing documentation,
which was my chore the day that I went on my trivia hunt :-).
--
Eric Lee Green er...@badtux.org http://badtux.org/eric
GnuPG public key at http://badtux.org/eric/eric.gpg
BadTux: Linux Penguin Gone Bad ( http://badtux.org )