From: derek@cs.wisc.edu (Derek Zahn)
To: cypherpunks@toad.com
Message Hash: 6df6a6cb00a1cc3a4d3839be881b2ea55413b9650ae46af0821fb6d40deba7cd
Message ID: <9309241847.AA28116@balder.cs.wisc.edu>
Reply To: N/A
UTC Datetime: 1993-09-24 18:50:39 UTC
Raw Date: Fri, 24 Sep 93 11:50:39 PDT
From: derek@cs.wisc.edu (Derek Zahn)
Date: Fri, 24 Sep 93 11:50:39 PDT
To: cypherpunks@toad.com
Subject: Patents
Message-ID: <9309241847.AA28116@balder.cs.wisc.edu>
MIME-Version: 1.0
Content-Type: text
Cypherpunks:
Too often in email fora, when a substantive discussion results
in the presentation of interesting material, no effort is made
to integrate the result into a form that will be useful beyond
the heat of the exchange. For this reason, I will impose once
more upon the bandwidth of Cypherpunks with a rewrite of my
previous mini-essay. Because of the effort and generosity of
many correspondents, I hope that some of the clueless parts
have had clues plugged in.
Rather than equivocating, which is my usual practice when not
entirely certain of what I'm saying, I state some "facts" quite
plainly here because equivocation is kind of annoying to everybody.
If anybody notices that I'm "full of it" in some way, please let
me know... I have no desire to mislead or cause confusion.
Special thanks to:
E. Carp
L. Detweiler
P. Metzger
smb@research.att.com
MOTIVATION:
Starting with a premise that widespread use of Public-Key
Cryptography (PKC) would be in some sense a Good Thing
(and for our purposes here ignoring the interesting and
spirited reasons for *why* PKC is so cool), newbie
Cypherpunks may well wonder how this can be achieved.
My purpose here is not to complain about restrictions
or wonder about alternate worlds without those
restrictions; rather it's an attempt to assess what
the restrictions are and what their practical
implications are.
The important fact of life in this area is that PKC has
been granted patent protection and is proprietary
technology. Exclusive licensing rights to PKC and
its dominant embodiment, the RSA algorithm, have been
assigned to Public Key Partners (PKP).
PATENT PROTECTION:
smb@research.att.com explained patents (only excerpts are quoted here):
> ... a patent is (theoretically) a contract between an inventor
> and society. In return for the inventor teaching everyone about the
> new idea, he or she gets a monopoly on use of that idea for a limited
> period (normally 17 years in the U.S.).
> Patents cover the right to build, make, import, or even *use* the
> protected idea. ... A patent is *not* a license to do something.
> Rather, it is the right to prevent others from doing it.
> For our purposes, a patent consists of two major parts. The first is
> more or less a technical paper; this is what you're supposed to learn
> from. ... The second part is the ``claims''; these are written in very dense
> legalese, and are supposed to delimit exactly what's new. You infringe
> a patent if your activity includes all of the elements of any one
> claim. ... you have to make sure that what your claim doesn't include
> prior art.
There are four patents of primary interest (I mention three because I'm
not certain what 4,424,414 [1984] is all about):
4,200,770, granted 1980. This patent (smb again:) " claims virtually all
mechanisms for public key distribution or exchange systems. Exponential
key exchange is the particular example given; it's claimed, too." This
patent has Diffie, Hellman, and Merkle as inventors. Diffie and Hellman
working together, and Merkle working independently, came up with the
ideas behind PKC. The patent was assigned to Stanford University.
Since with PKC keys can be broadcast without requiring a secure channel,
it offers obvious advantages for key distribution.
4,218,582, granted 1980. It (smb:) "claims all of public-key
cryptography. The knapsack system was the particular system given;
it was claimed, as well." Hellman and Merkle are the inventors
on this patent, also assigned to Stanford. From reading Diffie's
"The First Ten Years of Public Key Cryptography," I get the impression
that Diffie was not on this patent because Hellman and Merkle
together devised the "trapdoor knapsack" that was the particular
system illustrating PKC. At some financial cost to Merkle in lost
bets, that particular PKC system was broken, but that is only a
historical footnote.
4,405,829, granted 1983. This patent is for the RSA algorithm,
and has Rivest, Shamir, and Adleman as inventors. This patent
was assigned to MIT. Diffie calls RSA "the single most spectacular
contribution to public key cryptography" and it is an un-"broken"
complete public key cryptosystem. RSA is the overwhelmingly
dominant PKC system. The difficulty of breaking RSA has not
been proven equal to the difficulty of factoring the product
of two large prime numbers, which would be desirable because
it would preclude some cracking scheme coming in from nowhere
(we'll say that factoring is "somewhere" because it's commonly
studied). Rabin has come up with a RSA variant that is equivalent
to factoring, but has other technical problems.
IMPLICATIONS
Because PKP has been assigned all licensing rights to these
patents, which cover all of PKC to one extent or another,
we are not at present free to code up and sell PKC tools
without licensing the technology from PKP -- at least not
without risk of a lawsuit. Some people believe that
one or more of the patents are invalid in some way. A
patent must be for something new, useful, and non-obvious.
Given that PKC is useful, the other two criteria could
be challenged:
* perhaps the ideas could be described as obvious
* perhaps prior art could be demonstrated, so that the
patented inventions aren't really "new".
Such an effort would cost a great deal of money and is
uncertain of success.
Other efforts to get around the PKP monopoly are possible.
One idea would be to claim an "experimental use exemption",
an unclear way of legitimately ignoring a patent for personal
experimental use (see the comp.patents FAQ for more information
on this and other patent issues). Another idea is simply
to ignore the patent. PKP would have to sue the infringer,
an expensive and time-consuming process and probably not worthwhile
for some small infringements -- but it's probably very unwise
to try making any money this way! Another legal route would
be to claim that the assignment of rights by MIT and Stanford
to PKP violate anti-trust laws.
Users of the wonderful "underground" program PGP presumably
are doing so with the "experimental use" idea or the "ignore
the patent" idea in mind. While this has caused some friction,
it appears not to be very dangerous for individual users.
The final approach to an end-run around the patents is to wait.
The broad PKC patents expire in less than four years, which
should allow non-RSA PKC schemes to be developed and sold
without restriction. However, it is important not to
underestimate the difficulties of doing this. Solid efficient
PKC schemes are most definitely not trivial to devise, and
an extended period of evaluation by professional cryptologists
is probably required in order to convince users that the
scheme offers good security. The RSA patent expires in 2000.
The straightforward approach, and the only practical one for
small-time entrepreneurs wanting to develop PKC products now, is
to strike a deal with PKP for the use of RSA (as ViaCrypt has
done for the "legit" version of PGP).
It seems that the designers of Internet Privacy Enhanced Mail (PEM)
agreed with this assessment, as they took the unusual step of including
proprietary RSA in their standard. For their part, in RFC 1170, PKP
states:
"We assure the interested parties that Public Key Partners will comply
with all of the policies of ANSI and the IEEE concerning the availability
of licenses to practice this art. Specifically, in support of any RSA
signature standard which may be adopted, Public Key Partners hereby
gives its assurance that licenses to practice RSA signatures will be
available under reasonable terms and conditions on a non-discriminatory
basis."
The exact meaning of "reasonable terms and conditions" is not clear.
For evidence we can look at the ViaCrypt product, which is apparently
available for less than $50 in quantity. Since it includes the
extensive facilities of PGP, as well as support overhead, in addition
to the cost of the RSA license.
Standards (for example, PGP and PEM) are key to widespread use of PKC.
It appears unlikely that standards will go to something besides RSA
any time in the near future.
The final option is to invent some new revolutionary technique, to
amaze and delight Cypherpunks everywhere. Please do. Good luck.
REFERENCES
sci.crypt FAQ: information about PKC
comp.patents FAQ: information about patents
RIPEM FAQ: stuff about PKP stopping developement of an implementation
of Rabin's scheme
Diffie, W.: "The First Ten Years of Public Key Cryptography", chapter
3 of: G. Simmons (ed.), Contemporary Cryptology: the Science of
Information Integrity. IEEE press, 1991.
which might be the same as:
"The first ten years of public key cryptography", Diffie, W.,
Proceedings of the IEEE 76:5, 1988, pp 560-577.
Cypherpunks list archive (there is one, right?): many interesting
comments, often highly-clued.
derek
Return to September 1993
Return to “derek@cs.wisc.edu (Derek Zahn)”
1993-09-24 (Fri, 24 Sep 93 11:50:39 PDT) - Patents - derek@cs.wisc.edu (Derek Zahn)