18.12.2012 Views

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

O'Reilly - Practical UNIX & Internet Sec... 7015KB

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

[Chapter 6] 6.7 Encryption and U.S. Law<br />

Department; publishing the same algorithm in a book or public paper is not controlled.<br />

To get a license to export a program, you disclose the program to DTC, which then makes an evaluation.<br />

(In practice, these decisions are actually made by the National <strong>Sec</strong>urity Agency.) Historically, programs<br />

that implement sufficiently weak cryptography are allowed to be exported; those with strong<br />

cryptography, such as DES, are denied export licenses.<br />

A 1993 survey by the Software Publisher's Association, a U.S.-based industry advocacy group, found<br />

that encryption is widely available in overseas computer products and that availability is growing. They<br />

noted the existence of more than 250 products distributed overseas containing cryptography. Many of<br />

these products use technologies that are patented in the U.S. (At the time, you could literally buy<br />

high-quality programs that implement RSA encryption on the streets of Moscow, although Russia has<br />

since enacted stringent restrictions on the sale of cryptographic programs.)<br />

Table 6.4: The Public Key Cryptography Patents<br />

Patent # Title Covers Inventors Assignee Date Date Date<br />

Invention<br />

Filed Granted Expires<br />

4,200,770 Cryptographic Diffie-Hellman Martin E. Stanford September April 29, April 29,<br />

Apparatus and key exchange Hellman, University 6, 1977 1980 1997<br />

Method<br />

Bailey W.<br />

Diffie,<br />

Ralph C.<br />

Merkle,<br />

4,218,582 Public Key Knapsack, and Martin E. Stanford October 6, August August<br />

Cryptographic possibly all of Hellman, University 1977 19, 1980 19, 1997<br />

Apparatus and public key Ralph C.<br />

Method cryptography Merkle<br />

4,424,414 Exponentiation<br />

Martin E. Stanford May 1, January 3, January 3,<br />

Cryptographic<br />

Hellman, University 1978 1984 2001<br />

Apparatus and<br />

Stephen<br />

Method<br />

C. Pohlig<br />

4,405,829 Cryptographic RSA Ronald L. Massachusetts December September September<br />

Communications encryption Rivest, Institute of 14, 1977 20, 1983 20, 2000<br />

System and<br />

Adi Technology<br />

Method<br />

Shamir,<br />

Leonard<br />

M.<br />

Adleman<br />

Most European countries used to have regulations regarding software similar to those in force in the U.S.<br />

Many were discarded in the early 1990s in favor of a more liberal policy, which allows mass-market<br />

software to be freely traded.<br />

In 1992, the Software Publishers Association and the State Department reached an agreement which<br />

allows the export of programs containing RSA Data <strong>Sec</strong>urity's RC2 and RC4 algorithms, but only when<br />

the key size is set to 40 bits or less. 40 bits is not very secure, and application of a distributed attack using<br />

file:///C|/Oreilly Unix etc/<strong>O'Reilly</strong> Reference Library/networking/puis/ch06_07.htm (2 of 3) [2002-04-12 10:45:23]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!