[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: the public key minefield
> [email protected] (Derek Zahn)
> >* in broad terms, what would I have to do to develop an
> > algorithm that works from a user's perspective like
> > p.k.c. (ie public/private keys, the central functional
> > point of all the wonderful schemes based on pkc) but
> > doesn't violate patents?
L. Detweiler writes:
> others have well addressed how patent issues are involved in this. b
ut
> this appears to be a simple technical question on one level. What do
es
> it take to come up with a good public key system?
How about a poor public key system? What is the simplest public key
system you can invent, if you didn't care that it is trivial to break?
If the NSA can crack RSA, does that change the fact that it is a pkc?
message=99
public_key= 1/3
private_key= 3
encrypted_message= message * public_key
message= encrypted_message * private_key
Would PKP reading of their patent claims cover this pkc? Seems overbr
oad!
No, because of the language in the patent which requires that it be
infeasible to find the deciphering key from the enciphering key. Here's
the claim, from patent 4218582, that covers all of public key cryptography:
1. In a method of communicating securely over an insecure communication
channel of the type which communicates a message from a transmitter to
a receiver, the improvement characterized by:
providing random numbers at the receiver;
generating from said random numbers a public enciphering key at the
receiver;
generating from said random numbers a secret deciphering key at the
receiver such that the secret deciphering key is directly related to
and computationally infeasible to generate from the public enciphering
key;
communicating the public enciphering key from the receiver to the
transmitter;
processing the message and the public enciphering key at the
transmitter and generating an enciphered message by an enciphering
transformation, such that the enciphering transformation is easy to
effect but computationally infeasible to invert without the secret
deciphering key;
transmitting the enciphered message from the transmitter to the
receiver; and
processing the enciphered message and the secret deciphering key at
the receiver to transform the enciphered message with the secret
deciphering key to generate the message.