1994-08-09 - GAK & RSA

Header Data

From: hughes@ah.com (Eric Hughes)
To: cypherpunks@toad.com
Message Hash: 63ca41ef51d1dc37aced1ffad1ef8f8add6a27565dff572bd0e3dcb45c047b9f
Message ID: <9408091547.AA22396@ah.com>
Reply To: <199408091553.AA28248@poboy.b17c.ingr.com>
UTC Datetime: 1994-08-09 16:16:15 UTC
Raw Date: Tue, 9 Aug 94 09:16:15 PDT

Raw message

From: hughes@ah.com (Eric Hughes)
Date: Tue, 9 Aug 94 09:16:15 PDT
To: cypherpunks@toad.com
Subject: GAK & RSA
In-Reply-To: <199408091553.AA28248@poboy.b17c.ingr.com>
Message-ID: <9408091547.AA22396@ah.com>
MIME-Version: 1.0
Content-Type: text/plain


   the path towards a surveillance state, is it possible that the
   software GAK (SGAK) scheme could easily incorporate RSA's technology?

That depends on what you consider "RSADSI's technology".

First, there are the direct claims of the patents.  RSA and
Diffie-Hellman primarily.  The "public key" pattent of Hellman,
Merkle, Diffie is the knapsack, which doesn't work.  The Hellman,
Pohlig patent is for a method of exponentiation as a secret key
cipher.  These claims are not very arguable if you believe the
patents.  (And there's an 'if' there, too.)

But there's also the matter of patent extensions, the minor
modifications to the actual patents that are also covered.  I have
heard that RSADSI claims that all use of modular exponentiation for
cryptography are covered under their patents, as well as any public
key type system.

I think those claims are full of shit, myself, but that wouldn't stop
RSADSI from suing for infringement and arguing the case and turning
the attack from merit to one of lawyerdom.

Eric





Thread