throbber
COMPUTER SCIENCE & TECHNOLOGY
`
`A 11 10 3 0fi1bt,3
`
`COMPUTER SECURITY
`AND THE DATA
`ENCRYPTION STANDARD
`
`NBS Special Publication 500-27
`U.S. DEPARTMENT OF COMMERCE
`National Bureau of Standards
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 1
`
`

`
`NATIONAL BUREAU OF STANDARDS
`
`The National Bureau of Standards 1 was established by an act of Congress March 3, 1901. The Bureau's overall goal is to
`strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this
`end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and
`technological servicesjor industry and government, (3) a technical basis for equity in trade, and (4) technical services to pro-
`mote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute
`for Applied Technology, the Institute for Computer Sciences and Technology, the Office for Information Programs, and the
`Office of Experimental Technology Incentives Program.
`
`THE INSTITUTE FOR BASIC STANDARDS provides the central basis within the United States of a complete and consist-
`ent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essen-
`tial services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry,
`and commerce. The Institute consists of the Office of Measurement Services, and the following center and divisions:
`Applied Mathematics — Electricity — Mechanics — Heat — Optical Physics — Center for Radiation Research — Lab-
`oratory Astrophysics 2 — Cryogenics 2 — Electromagnetics 2 — Time and Frequency'.
`THE INSTITUTE FOR MATERIALS RESEARCH conducts materials research leading to improved methods of measure-
`ment, standards, and data on the properties of well-characterized materials needed by industry, commerce, educational insti-
`tutions, and Government; provides advisory and research services to other Government agencies; and develops, produces, and
`distributes standard reference materials. The Institute consists of the Office of Standard Reference Materials, the Office of Air
`and Water Measurement, and the following divisions:
`
`Analytical Chemistry — Polymers — Metallurgy — Inorganic Materials — Reactor Radiation — Physical Chemistry.
`THE INSTITUTE FOR APPLIED TECHNOLOGY provides technical services developing and promoting the use of avail-
`able technology; cooperates with public and private organizations in developing technological standards, codes, and test meth-
`ods; and provides technical advice services, and information to Government agencies and the public. The Institute consists of
`the following divisions and centers:
`
`Standards Application and Analysis — Electronic Technology — Center for Consumer Product Technology: Product
`Systems Analysis; Product Engineering — Center for Building Technology: Structures, Materials, and Safety; Building
`Environment; Technical Evaluation and Application — Center for Fire Research: Fire Science; Fire Safety Engineering.
`THE INSTITUTE FOR COMPUTER SCIENCES AND TECHNOLOGY conducts research and provides technical services
`designed to aid Government agencies in improving cost effectiveness in the conduct of their programs through the selection,
`acquisition, and effective utilization of automatic data processing equipment; and serves as the principal focus wthin the exec-
`utive branch for the development of Federal standards for automatic data processing equipment, techniques, and computer
`languages. The Institute consist of the following divisions:
`Computer Services — Systems and Software — Computer Systems Engineering — Information Technology.
`THE OFFICE OF EXPERIMENTAL TECHNOLOGY INCENTIVES PROGRAM seeks to affect public policy and process
`to facilitate technological change in the private sector by examining and experimenting with Government policies and prac-
`tices in order to identify and remove Government-related barriers and to correct inherent market imperfections that impede
`the innovation process.
`
`THE OFFICE FOR INFORMATION PROGRAMS promotes optimum dissemination and accessibility of scientific informa-
`tion generated within NBS; promotes the development of the National Standard Reference Data System and a system of in-
`formation analysis centers dealing with the broader aspects of the National Measurement System; provides appropriate services
`to ensure that the NBS staff has optimum accessibility to the scientific information of the world. The Office consists of the
`following organizational units:
`
`Office of Standard Reference Data — Office of Information Activities — Office of Technical Publications — Library —
`Office of International Standards — Office of International Relations.
`
`1 Headquarters and Laboratories at Gaithersburg, Maryland, unless otherwise noted; mailing address Washington, D.C. 20234.
`2 Located at Boulder, Colorado 80302.
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 2
`
`

`
`COMPUTER SCIENCE & TECHNOLOGY:
`
`national mrwAv
`OF STANDARDS
`LIBRA HY
`
`MAR 8
`
`1978
`
`Computer Security and the
`Data Encryption Standard
`
`Special PubuCLdV^o
`
`Proceedings of the Conference on Computer Security
`and the Data Encryption Standard Held at the
`National Bureau of Standards in Gaithersburg,
`Maryland on February 15, 1977
`
`Dennis K. Branstad, Editor
`
`Systems and Software Division
`Institute for Computer Sciences and Technology
`National Bureau of Standards
`Washington, D.C. 20234
`
`Sponsored by the
`
`National Bureau of Standards
`
`and the
`
`U.S. Civil Service Commission
`
`U.S. DEPARTMENT OF COMMERCE, Juanita M. Kreps, Secretary
`
`Dr. Sidney Harman, Under Secretary
`
`Jordan J. Baruch, Assistant Secretary for Science and Technology
`
`U S NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Acting Director
`
`Issued February 1978
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 3
`
`

`
`Reports on Computer Science and Technology
`
`The National Bureau of Standards has a special responsibility within the Federal
`Government for computer science and technology activities. The programs of the
`NBS Institute for Computer Sciences and Technology are designed to provide ADP
`standards, guidelines, and technical advisory services to improve the effectiveness of
`computer utilization in the Federal sector, and to perform appropriate research and
`development efforts as foundation for such activities and programs. This publication
`series will report these NBS efforts to the Federal computer community as well as to
`interested specialists in the academic and private sectors. Those wishing to receive
`notices of publications in this series should complete and return the form at the end
`of this publication.
`
`National Bureau of Standards Special Publication 500-27
`Nat. Bur. Stand. (U.S.) Spec. Publ. 500-27,135 pages (Feb. 1978)
`CODEN: XNBSAV
`
`Library of Congress Cataloging in Publication Data
`
`Conference on Computer Security and the Data Encryption Standard,
`Gaithersburg, Md., 1977.
`
`Computer security and the data encryption standard.
`(Computer science & technology) (NBS special publication ; 500-27)
`1. Computers—Access control—Passwords. 1. United States.
`National Bureau of Standards. II. United States. Civil Service Com-
`V. Series: United States. National
`IV. Series.
`mission.
`III. Title.
`Bureau of Standards. Special publication ; 500-27
`QC100.U57 no. 500-27 [QA76.9.A25] 602Ms [658.47] 78-1403
`
`U.S. GOVERNMENT PRINTING OFFICE
`WASHINGTON: 1978
`
`For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C 20402
`Stock No. 003-003-01891-1 Price $3
`(Add 25 percent additional for other than U.S. mailing).
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 4
`
`

`
`FOREWORD
`
`The need for standards in computer security has risen along with
`the need for improved record keeping practices throughout the Federal
`The increasing use of computers by Government and private
`Government.
`industry for the processing, storing and communication of sensitive
`as well as valuable data has focused this need and has resulted in an
`extensive standards development program in this area.
`The development
`of the Data Encryption Standard is the first major result of this
`program.
`
`The Conference on Computer Security and the Data Encryption
`Standard was organized to disseminate information about the computer
`security technology available, undergoing development or identified as
`The Conference was jointly sponsored by
`needing additional effort.
`the National Bureau of'Standards and the Civil Service Commission to
`provide this information to Federal supervisors, managers, computer
`specialists, communication specialists, standards personnel and others
`The main objective of the
`with an interest in computer security.
`Conference was to present a perspective of the use of data encryption
`as a computer security measure.
`
`The proceedings of this Conference, held at NBS on February 15, 1977,
`are intended for use by all Federal and private organizations seeking
`The views expressed
`to improve the security of their computer systems.
`in the papers do not necessarily reflect those of the National Bureau
`The material presents
`of Standards or the Civil Service Commission.
`the present state-of-the-art technology for encrypting data and
`introduces many applications of encryption either implemented or
`contemplated.
`
`M. Zane Thornton
`Acting Director
`Institute for Computer
`Sciences and Technology
`
`iii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 5
`
`

`
`PREFACE
`
`The National Bureau of Standards (NBS) initiated a project in 1972
`to develop standards in Computer Systems Security.
`Among the needs for
`physical, administrative and technical security measures and procedures,
`the need for a method of protecting computer data during transmission
`and storage was identified.
`As a result of this initial evaluation of
`security requirements, a project was initiated that led to the
`publication of the Data Encryption Standard.
`
`The Data Encryption Standard was published on January 15, 1977 and
`The Standard specifies an algorithm
`became effective on July 15, 1977.
`for use by Federal Departments and Agencies in the cryptographic pro-
`tection of unclassified computer data during transmission or in storage.
`The algorithm, developed by the International Business Machines
`Corporation, was one of several algorithms submitted to NBS for consid-
`The algorithm and the proposed standard containing
`eration as a standard.
`the algorithm were reviewed and coordinated within the standards-making
`The publication of the Standard culminated this process.
`process.
`
`The Conference on Computer Security and the Data Encryption Standard
`was structured to answer many of the questions typically raised concerning
`computer security and data encryption.
`Nearly 500 people participated
`Experts from industry and government were invited to
`in the Conference.
`present their views and recommendations on when, where and how to apply
`encryption to a computer system or network.
`The presentations were
`organized to give full coverage to the applications as well as the
`implementations of the Data Encryption Standard.
`
`These proceedings are structured along the same lines as the
`Conference.
`Pictures of the speakers as well as their submitted papers
`The Appendix
`or an edited version of their presentations are included.
`contains the questions that were raised at the conclusion of the
`Conference as well as the answers prepared by the speakers.
`
`The National Bureau of Standards wishes to thank all who participated
`in the Conference and helped to make it a success.
`
`S. Jeffery
`Conference Chairman
`
`Dennis K. Branstad
`Program Chairman
`
`iv
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 6
`
`

`
`ABSTRACT
`
`These proceedings include papers or summaries of present-
`ations of the fifteen speakers who participated in the
`Conference on Computer Security and the Data Encryption
`Standard held at the National Bureau of Standards on
`Representatives from Federal agencies
`February 15, 1977.
`and private industry presented technical information
`and guidance with respect to computer security and
`the Data Encryption Standard.
`Subjects of the papers
`and presentations include physical security, risk
`assessment, software security, computer network security,
`applications and implementation of the Data Encryption
`The questions raised at the conference and
`Standard.
`their answers are included in the proceedings.
`
`Key words:
`
`Computer security, cryptography; Data
`Encryption Standard; encryption; key
`management; network security.
`
`v
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 7
`
`

`
`ACKNOWLEDGEMENTS
`
`The following individuals made significant contributions to the success
`of the conference and to the publication of these proceedings:
`
`Mrs. Anne Shreve, NBS (Conference Manager)
`
`Mrs. Sara Torrence, NBS (Arrangements Chairman)
`
`Mr. Fred Rao, CSC (Nominations Chairman)
`
`Mrs. Grace Burns, NBS (Institute Liaison)
`
`Mrs. Mary Ellen Crane, NBS (Proceedings Typist)
`
`EDITOR'S COMMENT
`
`All but five of the published papers were received directly from the
`The other five papers (Courtney, Rallapalli, Crumb,
`author(s).
`McDonnell and Tuchman) were edited from the taped presentations made
`None of the slides shown during these presentations
`at the Conference.
`were available for publication in these proceedings.
`
`Certain commercial products are identified in these proceedings in order
`to specify adequately experimental procedures.
`In no case does such
`identification imply recommendation or endorsement by the National Bureau
`of Standards, nor does it imply that the products or equipment identified
`are necessarily the best available for the purpose.
`
`vi
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 8
`
`

`
`CONFERENCE ON COMPUTER SECURITY
`
`AND THE
`
`DATA ENCRYPTION STANDARD
`
`PROGRAM AND INDEX
`
`1.
`
`WELCOME AND INTRODUCTION
`
`Mr. S. Jeffery, National Bureau of Standards
`
`2.
`
`The Data Encryption Standard in Perspective
`
`Dr. Ruth M. Davis, National Bureau of Standards
`
`3.
`
`Major Computer Security Aspects Related to the Data
`Encryption Standard (Picture of Participants)
`
`3.1
`
`Computer Security Risk Assessment
`
`Mr. Robert H. Courtney, IBM Corporation
`
`3.2
`
`Data Encryption and its Relationship to Physical
`Security Planning
`
`Mr. Robert V. Jacobson, Chemical Bank
`
`3.3
`
`Computer Systems Security and the NBS-DES
`(Beyond Line Encryption)
`
`Mr. Clark Weissman, System Development Corporation
`
`4.
`
`Considerations in Procurement and Use of Data
`Encryption Devices (Picture of Participants)
`
`4.1
`
`Considerations in Applying an Encryption Device
`to a Communications Network
`
`Mr. Barrie Morgan, Datotek, Inc.
`
`4.2
`
`The Management of Encryption Keys
`
`Page
`
`2
`
`4
`
`14
`
`15
`
`13
`
`25
`
`37
`
`38
`
`46
`
`Mr. David J. Sykes, Honeywell Information Systems, Inc.
`
`4.3
`
`Design and Specification of Cryptographic Capabilities
`
`54
`
`Mr. Carl M. Campbell, Jr. (Consultant) Interbank
`Card Association
`
`vii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 9
`
`

`
`4.4
`
`A Bit-Slice, 4-Chip Implementation of the Data
`Encryption Standard
`
`Kris Rallapalli, Fairchild Semi -Conductor
`
`5.
`
`Applications of the Data Encryption Standard (Picture of
`Participants)
`
`5.1
`
`Federal Reserve Communications Security Project
`
`Mr. Howard Crumb, Federal Reserve Bank
`
`5.2
`
`ARPA Network Security Project
`
`Mr. Stephen T. Walker, Defense Advanced Research
`Projects Agency
`
`5.3
`
`Electronic Funds Transfer Application
`
`Mr. Jack McDonnell, EFT Commission
`
`6.
`
`Implementation and Use of the Data Encryption Standard
`(Picture of Participants)
`
`6.1
`
`Implementation & Use of The Data Encryption
`Standard within The Data Communications
`Environment
`
`Mr. Ed. Lohse, Burroughs Corporation
`
`6.2
`
`Integrated System Design
`
`Page
`
`67
`
`69
`
`70
`
`74
`
`80
`
`83
`
`84
`
`94
`
`Dr. Walter Tuchman, International Business Machines
`Corporation
`
`6.3
`
`An LSI Implementation of the Data Encryption Standard
`
`97
`
`Mr. Howard 0. Wright, Rockwell International
`
`6.4
`
`A Microprocessor Controlled LSI Implementation of the
`Data Encryption Standard
`
`Mr. Keith Warble, Motorola Inc.
`
`7.
`
`Appendix:
`
`Question and Answer Session
`
`107
`
`116
`
`viii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 10
`
`

`
`S. Jeffery, Conference Chairman;
`D. Branstad, Program Chairman.
`
`1
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 11
`
`

`
`WELCOME AND INTRODUCTION
`
`S. Jeff ery
`Conference Chairman
`Systems and Software Division
`National Bureau of Standards
`Washington, D.C.
`20234
`
`On behalf of the National Bureau of Standards, I would like to
`welcome each of you to the Conference on Computer Security and the
`The Conference is being sponsored by the
`Data Encryption Standard.
`National Bureau of Standards and the Civil Service Commission.
`The
`program that we have organized for you today has been structured to
`place the new Data Encryption Standard as published in Federal Infor-
`mation Processing Standard 46 into perspective with other measures
`that can be used to provide computer and data security.
`
`The Conference has been organized into four sessions.
`The first
`addresses the major computer security aspects related to the DES.
`These include risk analysis, physical security and computer systems
`The second session involves those topics that should be
`security.
`considered in the use of data encryption.
`These include communications
`security devices, key management and system design.
`The third session
`covers the applications of the Data Encryption Standard that are
`These include security projects involving en-
`presently identified.
`cryption at the Federal Reserve network, the ARPA network and in
`electronic funds transfer.
`The final session will cover various imple-
`These will be discussed by members of
`mentations and uses of the DES.
`various companies that are interested in implementing and using the
`DES.
`
`In order to cover a very large subject in one day, we request that
`all questions be written and they will be responded to following the
`Whenever possible, the question should be addressed to a
`last session.
`Each speaker will prepare short written answers to
`specific speaker.
`During the question and answer period at the conclusion
`the questions.
`of the Conference, the four session chairmen will take turns reading
`a question and the speaker's response.
`The questions and answers will
`be published in the proceedings.
`
`We hope that today will be beneficial to each of you and that you
`will find the program enjoyable.
`
`2
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 12
`
`

`
`3.!J
`
`...n._
`
`
`
`
`
`gficmam30.33.m._>wo.25.3.
`
`35
`
`3
`
`PMC Exhibit 2017
`Apple v PMC
`IPRZO16-00754
`Page 13
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 13
`
`

`
`The Data Encryption Standard in Perspective
`
`Ruth M. Davis, Director
`Institute for Computer Sciences and Technology
`National Bureau of Standards
`Washington, D.C. 20234
`
`The Data Encryption Standard was approved as a
`Federal Information Processing Standard by the Secre-
`This Standard
`tary of Commerce on November 23, 1976.
`was developed as a part of the Computer Security Pro-
`gram within the Institute for Computer Sciences and
`Technology at the National Bureau of Standards.
`This
`paper places this standard in perspective with other
`computer security measures that can and should be
`applied to Federal computer systems either before
`or coincident to using the Data Encryption Standard.
`
`NBS initiated the standards development effort
`During this
`leading to adoption of the DES in 1972.
`period, NBS solicited for algorithms and information
`upon which a standard could be based, published for
`comment the algorithm which best satisfied the re-
`quirements of an encryption standard, and coordinated
`the effort with both the potential using communities
`and supplying communities.
`
`This paper outlines the environment surrounding
`and the history of the Data Encryption Standard and
`discusses the objectives of additional standards to
`be developed within the computer security program.
`
`Key words:
`
`Computer security; encryption; standard.
`
`1.
`
`Introduction
`
`There are very few of us today whether we are computer scientists,
`managers, ADP facility personnel or communications specialists who have
`experience with encrypting and decrypting information in any operational
`environment.
`Therefore, there are very few of us who know what to ex-
`pect when we first begin to use data encryption procedures.
`As we en-
`counter problems or unexpected happenings there will be very few pre-
`cedents we can draw upon for guidance.
`We should, therefore, try to
`
`4
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 14
`
`

`
`get the most from those individuals and organizations who have already
`stumbled and learned from their experiences.
`We will need to know who
`they are, whether they are in industry, Government or academia.
`
`First, however, we need to remind ourselves as to why there are so
`many of us now concerned with data encryption when there were so few in
`As might be anticipated, since we are still at the beginning
`the past.
`of the first real sign of general or public interest in encryption, it is
`difficult to pull apart the underbrush and identify any real pathway.
`But let us try.
`
`2.
`
`Who Has Been Using Encryption?
`
`Prior to the mid-to-late 1960's almost the only use of encryption
`National security is still the
`was for national security purposes.
`predominant motive for data encryption.
`Other long-established uses
`of data encryption have been principally in foreign countries by inter-
`ministry networks, police and gendarmeries and embassy communications
`How do we ascertain these other principal users of data en-
`systems.
`Not surprisingly, we used the traditional market indicator--
`cryption?
`namely, who are the buyers of data encryption equipment sold by vendors.
`Here, even for U.S. vendors of cryptographic equi pment, the market is
`principally foreign buyers.
`
`In the United States at the present time, a very small percentage
`of companies use cryptographic equipment and encryption procedures.
`Hence, it is quite apparent that if we are to find and use available
`expertise and experience in cryptographic application, it will be from
`within the U.S. national security community, foreign organizations and
`governments and a very few U.S. companies.
`
`3.
`
`Why Is Encryption More in Demand Now?
`
`Since the late 1 960 ' s there have been a few newly emerging but
`important motivations other than national security for employing crypto-
`Categorized in terms of technological-
`graphic equipment and procedures.
`ly-induced changes they are simply that:
`
`o
`
`o
`
`o
`
`Computer and communications technology have combined to
`encourage dramatic increases in the volume and speed of
`information collection and distribution.
`
`The principal mode for distribution of time-sensitive
`data is now electronic.
`
`Advances in electronic technology have made electronic
`surveillance and interception inexpensive and available
`to individual buyers.
`
`5
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 15
`
`

`
`.
`
`o
`
`Computer, communication and transportation technology
`have combined to make the geographically dispersed
`company or government the more common organizational
`entity with its management almost totally dependent
`on electronic means of information transmission.
`Cat-
`egorized in terms of real or perceived threats, these
`new motivations for employing encryption can be put in
`different terms--namely , in a rough chronological order
`of emergent threat as follows:
`
`Organized and intentional attempts to
`obtain economic or market information
`from competitive organizations in the
`private sector.
`
`Organized and intentional attempts to
`obtain economic information from govern-
`ment agencies.
`
`Inadvertent acquisition of economic or
`market information.
`
`Inadvertent acquisition of information
`about individuals.
`
`Intentional fraud through illegal access
`to computer data banks with emphasis in
`decreasing order of importance on acquisi-
`tion of funding data, economic data, law
`enforcement data and data about individuals.
`
`Governmental intrusion on the rights of
`indi vi duals
`
`Invasion of individual rights by the
`Intelligence Community.
`
`4.
`
`What Is The "Cryptographic Marketplace?"
`
`Faced with this sporadic but increasing demand for cryptographic
`equipment, what kind of cryptographic marketplace exists?
`Obviously,
`the cryptographic marketplace has a very long history since equipment
`and procedures for transforming data into unintelligible form and then
`transforming it back into intelligible form have been used for thousands
`of years.
`
`However, looking just at the 1970' s, before the advent of the NBS
`data encryption standard, the cryptographic marketplace was and is
`large, competitive and one in which caveat emptor or "buyer beware"
`There are about 150 manufacturers of discrete
`was the prevalent theme.
`
`6
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 16
`
`

`
`cryptographic devices world-wide of which somewhat less than 100 are
`American companies.
`Most cryptographic equipment is now electronic
`where just a few years ago it was either mechanical or electro-mechanical.
`There are also a very few--probably less than fi ve--compani es world-wide
`that sell software encryption packages.
`
`If you really dig in and read company brochures, you will find about
`a dozen major manufacturers with what we would call a full line of cryp-
`tographic equipment, e.g., equipment for data with different trans-
`mission speeds, for different types of channels and transmission methods,
`for off-line and on-line use, etc.
`My estimate is that more than 75% of
`these dozen companies are foreign manufacturers.
`
`The commercial equipment is generally described in the above term-
`inology, with additional descriptors of allowable key variations and in
`"working principles."
`We can refer to the working principle as the en-
`cryption algorithm.
`
`As you may recall, the marketplace was described earlier as one of
`"buyer beware."
`This is because the intricacies of relating key varia-
`tions and working principles to the real strength of the encryption/
`decryption equipment were and are virtually unknown to almost all buyers,
`and informed decisions as to the right type of on-line, off-line, key
`generation etc., which will meet buyers' security needs have been most
`difficult to make.
`
`It was into this arena that the National Bureau of Standards en-
`tered in 1972.
`
`5.
`
`Legislative And Governmental Responsibilities
`
`Responsibilities for design, use and applications of cryptographic
`equipment were not clearly defined in 1972 ; they are still not clearly
`defined in 1977.
`
`NBS , under its Brooks Act (P.L. 89-306) responsibility for setting
`Federal standards for effective and efficient uses of computer systems,
`initiated a much needed program in computer security in 1971.
`It pur-
`sued as an essential part of computer security the development of data
`The purpose of the NBS data encryption standards
`encryption standards.
`development effort was to protect computer data in transit or resident
`in computer systems and networks.
`
`The primary constituency under the Brooks Act for NBS' data en-
`cryption standards were Federal agencies; the secondary constituency
`deriving from NBS' responsibilities as a member of the Department of
`Commerce was the general buyer not operating under national security
`provisions and directives.
`
`7
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 17
`
`

`
`Responsibilities for cryptographic R&D and use in national security
`activities are fairly well defined under the National Security Act of
`1947 and under the amending Executive Order 11905 of February 18, 1976.
`Under this Executive Order, the National Security Agency serves "under
`the Secretary of Defense as the central communications security authority
`of the United States Government" and is responsible for the "conduct of
`research and development to meet the needs of the United States for sig-
`nals intelligence and communications security."
`NBS has asked for and
`received the unique and very valuable assistance of NSA since 1972 in
`NBS 1 effort to provide data encryption standards for its constituencies.
`
`The only recent relevant Congressional legislation is the Privacy
`Act of 1974, under which 0MB assigned NBS responsibilities for the de-
`velopment of computer and data standards to meet the needs of the Act.
`Data security is not a requirement of the Privacy Act of 1974.
`However,
`data security is one of the means best suited for meeting requirements
`of the Act.
`
`As of 1977, NBS 1 data encryption program and its recently issued
`Data Encryption Standard (DES) have not, to the best of our knowledge,
`decreased existing competition in the cryptographic marketplace.
`In-
`deed, at least five new hardware and/or software encryption products
`have entered the marketplace as a direct result of the DES.
`
`Probably the principal change in the marketplace that can be
`attributed to NBS' DES is the lessening of the "buyer beware" character-
`Anyone buying cryptographic equipment which has been validated
`istic.
`against the DES can be assured of a specific level of data security:
`namely that 2^5 attempts and the use of the method of exhaustion are
`required to obtain any one key for the encryption algorithm used in the
`DES.
`
`6.
`
`History Of The Data Encryption Standard
`
`As I remarked earlier, the development and history of the DES have
`NBS has been directly involved for more than
`been most interesting.
`The active standards development effort, beginning with
`five years.
`We solicited
`collection of relevant information, was initiated in 1973.
`for information that was available in the field of cryptography that
`We were looking for the techni-
`could be used in guiding our efforts.
`cal specifications of a method of encryption which could be economically
`employed in a variety of computer security applications typical of our
`We wanted this information to be publicly avail-
`assigned constituency.
`able so that anyone desiring to adopt the standard could do so.
`We
`wanted the method of encryption selected as a standard to be amenable
`to various types of equipment built by the many vendors of computer and
`We wanted the specifications of encryption to be
`terminal equipment.
`unambiguous so that anyone would be able to decrypt the data encrypted
`by anyone who also adopted the standard if he had the "key" or secret
`variable that had been used.
`
`8
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 18
`
`

`
`.
`
`Our first solicitation, in May 1973, produced nothing that satis-
`This solicitation requested "proposals for information
`fied these wants.
`and algorithms" that could be used in developing a standard and we got a
`lot of unsolicited proposals to develop encryption algorithms.
`It seemed
`that a lot of mathematicians had ideas they wished to pursue.
`Develop-
`ment of encryption algorithms is not something you do overnight, however.
`The algorithm that we received which had the best theoretical foundation
`was received scratched in pencil on a sheet of paper.
`It was suggested
`that a random stream of characters be written onto two infinite length
`tapes which are sent to the parties wishing to communicate.
`The sender
`should add the random stream to the message and the receiver should sub-
`tract the random stream from the message.
`This turns out to be the only
`perfect security system, but we've had difficulty finding suppliers of
`In addition, this system has other practical
`infinite length tapes.
`problems
`
`Even though we received no useful algorithms from the first solici-
`tation, a positive step was made.
`Interest was shown in cryptography
`and a need for an encryption standard was demonstrated.
`In addition,
`when a second solicitation was made in August 1974, several algorithms
`were submitted.
`Some were too specialized:
`some were ineffective.
`One
`was received that showed great merit as an encryption algorithm.
`
`7.
`
`Review Of The Data Encryption Standard
`
`This algorithm was published for public comment in March 1975, after
`undergoing Government review for acceptability as a Federal standard.
`coordination
`This is the third phase of a standards development effort:
`However, even before this was done, procedures were worked
`and review.
`out between NBS and IBM, the developer of the algorithm, for having the
`rights for making, using and selling apparatus implementing the algorithm
`available to interested parties under the claims of certain patents held
`The terms and conditions of the agreement by IBM to grant non-
`by IBM.
`exclusive, royalty free licenses under these patents are spelled out in
`the May 13, 1975 and August 31, 1976 issues of the Official Gazette of
`the United States Patent and Trademark Office.
`
`The comments received concerning the algorithm were most interesting.
`The most prevalent need that was apparent from the comments was for a
`Commentors eit

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket