[229] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re: Secure HTTP mailing list

daemon@ATHENA.MIT.EDU (hallam@dxal18.cern.ch)
Wed Nov 16 07:59:07 1994

From: hallam@dxal18.cern.ch
To: ams@eit.com (Allan M Schiffman)
Cc: hallam@dxal18.cern.ch, www-security@ns1.rutgers.edu
In-Reply-To: Your message of "Tue, 15 Nov 94 23:11:49 PST."
             <9411160711.AA22171@eitech.eit.com> 
Date: Wed, 16 Nov 94 10:39:29 +0900
Reply-To: hallam@dxal18.cern.ch

>>In the case
>> of any secure protocol there is the very good chance (and SHTTP is no
>> exception) that the protocol or specification will want to use the
>> _patented_ RSA algorithims (Public Key Partners effectively has a what
>> appears to be a patent on any public key scheme).
>Largely correct, but what that means, I suppose (at least in this
>regard), is that you might compare such protcols to PEM rather than TCP
>or DNS.

Just to emphasise Alan's point. Shen and SSL (the MCom system) also both use
patented technology. I can't see any real way out. The Diffie Helleman patent
is so broad as top cover almost anything useful. However it does expire in 1997. 

Expect the whole patent thing to get much less fraught after that date. RSA 
while being more technically elegant will probably get swamped.as El-Gamal will
be avaliable freely and can be used for both signatures and key exchange.

There are advantages to the RSA system which Rivest originally brought up as a
potential security flaw, It is possible to blind a signature by multiplying the 
text for signature by a pseudo random number then factor it out. This means that 
one should never sign a key one did not create oneself. Chaum patented the use 
of this idea for certain purposes so you end up having to pay for patents 
anyway.


One solution to this problem of course is simply to move to a free country.


Phill Hallam-Baker

home help back first fref pref prev next nref lref last post