`
`A 11 10 3 0fi1bt,3
`
`COMPUTER SECURITY
`AND THE DATA
`ENCRYPTION STANDARD
`
`NBS Special Publication 500-27
`U.S. DEPARTMENT OF COMMERCE
`National Bureau of Standards
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 1
`
`
`
`NATIONAL BUREAU OF STANDARDS
`
`The National Bureau of Standards 1 was established by an act of Congress March 3, 1901. The Bureau's overall goal is to
`strengthen and advance the Nation's science and technology and facilitate their effective application for public benefit. To this
`end, the Bureau conducts research and provides: (1) a basis for the Nation's physical measurement system, (2) scientific and
`technological servicesjor industry and government, (3) a technical basis for equity in trade, and (4) technical services to pro-
`mote public safety. The Bureau consists of the Institute for Basic Standards, the Institute for Materials Research, the Institute
`for Applied Technology, the Institute for Computer Sciences and Technology, the Office for Information Programs, and the
`Office of Experimental Technology Incentives Program.
`
`THE INSTITUTE FOR BASIC STANDARDS provides the central basis within the United States of a complete and consist-
`ent system of physical measurement; coordinates that system with measurement systems of other nations; and furnishes essen-
`tial services leading to accurate and uniform physical measurements throughout the Nation's scientific community, industry,
`and commerce. The Institute consists of the Office of Measurement Services, and the following center and divisions:
`Applied Mathematics — Electricity — Mechanics — Heat — Optical Physics — Center for Radiation Research — Lab-
`oratory Astrophysics 2 — Cryogenics 2 — Electromagnetics 2 — Time and Frequency'.
`THE INSTITUTE FOR MATERIALS RESEARCH conducts materials research leading to improved methods of measure-
`ment, standards, and data on the properties of well-characterized materials needed by industry, commerce, educational insti-
`tutions, and Government; provides advisory and research services to other Government agencies; and develops, produces, and
`distributes standard reference materials. The Institute consists of the Office of Standard Reference Materials, the Office of Air
`and Water Measurement, and the following divisions:
`
`Analytical Chemistry — Polymers — Metallurgy — Inorganic Materials — Reactor Radiation — Physical Chemistry.
`THE INSTITUTE FOR APPLIED TECHNOLOGY provides technical services developing and promoting the use of avail-
`able technology; cooperates with public and private organizations in developing technological standards, codes, and test meth-
`ods; and provides technical advice services, and information to Government agencies and the public. The Institute consists of
`the following divisions and centers:
`
`Standards Application and Analysis — Electronic Technology — Center for Consumer Product Technology: Product
`Systems Analysis; Product Engineering — Center for Building Technology: Structures, Materials, and Safety; Building
`Environment; Technical Evaluation and Application — Center for Fire Research: Fire Science; Fire Safety Engineering.
`THE INSTITUTE FOR COMPUTER SCIENCES AND TECHNOLOGY conducts research and provides technical services
`designed to aid Government agencies in improving cost effectiveness in the conduct of their programs through the selection,
`acquisition, and effective utilization of automatic data processing equipment; and serves as the principal focus wthin the exec-
`utive branch for the development of Federal standards for automatic data processing equipment, techniques, and computer
`languages. The Institute consist of the following divisions:
`Computer Services — Systems and Software — Computer Systems Engineering — Information Technology.
`THE OFFICE OF EXPERIMENTAL TECHNOLOGY INCENTIVES PROGRAM seeks to affect public policy and process
`to facilitate technological change in the private sector by examining and experimenting with Government policies and prac-
`tices in order to identify and remove Government-related barriers and to correct inherent market imperfections that impede
`the innovation process.
`
`THE OFFICE FOR INFORMATION PROGRAMS promotes optimum dissemination and accessibility of scientific informa-
`tion generated within NBS; promotes the development of the National Standard Reference Data System and a system of in-
`formation analysis centers dealing with the broader aspects of the National Measurement System; provides appropriate services
`to ensure that the NBS staff has optimum accessibility to the scientific information of the world. The Office consists of the
`following organizational units:
`
`Office of Standard Reference Data — Office of Information Activities — Office of Technical Publications — Library —
`Office of International Standards — Office of International Relations.
`
`1 Headquarters and Laboratories at Gaithersburg, Maryland, unless otherwise noted; mailing address Washington, D.C. 20234.
`2 Located at Boulder, Colorado 80302.
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 2
`
`
`
`COMPUTER SCIENCE & TECHNOLOGY:
`
`national mrwAv
`OF STANDARDS
`LIBRA HY
`
`MAR 8
`
`1978
`
`Computer Security and the
`Data Encryption Standard
`
`Special PubuCLdV^o
`
`Proceedings of the Conference on Computer Security
`and the Data Encryption Standard Held at the
`National Bureau of Standards in Gaithersburg,
`Maryland on February 15, 1977
`
`Dennis K. Branstad, Editor
`
`Systems and Software Division
`Institute for Computer Sciences and Technology
`National Bureau of Standards
`Washington, D.C. 20234
`
`Sponsored by the
`
`National Bureau of Standards
`
`and the
`
`U.S. Civil Service Commission
`
`U.S. DEPARTMENT OF COMMERCE, Juanita M. Kreps, Secretary
`
`Dr. Sidney Harman, Under Secretary
`
`Jordan J. Baruch, Assistant Secretary for Science and Technology
`
`U S NATIONAL BUREAU OF STANDARDS, Ernest Ambler, Acting Director
`
`Issued February 1978
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 3
`
`
`
`Reports on Computer Science and Technology
`
`The National Bureau of Standards has a special responsibility within the Federal
`Government for computer science and technology activities. The programs of the
`NBS Institute for Computer Sciences and Technology are designed to provide ADP
`standards, guidelines, and technical advisory services to improve the effectiveness of
`computer utilization in the Federal sector, and to perform appropriate research and
`development efforts as foundation for such activities and programs. This publication
`series will report these NBS efforts to the Federal computer community as well as to
`interested specialists in the academic and private sectors. Those wishing to receive
`notices of publications in this series should complete and return the form at the end
`of this publication.
`
`National Bureau of Standards Special Publication 500-27
`Nat. Bur. Stand. (U.S.) Spec. Publ. 500-27,135 pages (Feb. 1978)
`CODEN: XNBSAV
`
`Library of Congress Cataloging in Publication Data
`
`Conference on Computer Security and the Data Encryption Standard,
`Gaithersburg, Md., 1977.
`
`Computer security and the data encryption standard.
`(Computer science & technology) (NBS special publication ; 500-27)
`1. Computers—Access control—Passwords. 1. United States.
`National Bureau of Standards. II. United States. Civil Service Com-
`V. Series: United States. National
`IV. Series.
`mission.
`III. Title.
`Bureau of Standards. Special publication ; 500-27
`QC100.U57 no. 500-27 [QA76.9.A25] 602Ms [658.47] 78-1403
`
`U.S. GOVERNMENT PRINTING OFFICE
`WASHINGTON: 1978
`
`For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C 20402
`Stock No. 003-003-01891-1 Price $3
`(Add 25 percent additional for other than U.S. mailing).
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 4
`
`
`
`FOREWORD
`
`The need for standards in computer security has risen along with
`the need for improved record keeping practices throughout the Federal
`The increasing use of computers by Government and private
`Government.
`industry for the processing, storing and communication of sensitive
`as well as valuable data has focused this need and has resulted in an
`extensive standards development program in this area.
`The development
`of the Data Encryption Standard is the first major result of this
`program.
`
`The Conference on Computer Security and the Data Encryption
`Standard was organized to disseminate information about the computer
`security technology available, undergoing development or identified as
`The Conference was jointly sponsored by
`needing additional effort.
`the National Bureau of'Standards and the Civil Service Commission to
`provide this information to Federal supervisors, managers, computer
`specialists, communication specialists, standards personnel and others
`The main objective of the
`with an interest in computer security.
`Conference was to present a perspective of the use of data encryption
`as a computer security measure.
`
`The proceedings of this Conference, held at NBS on February 15, 1977,
`are intended for use by all Federal and private organizations seeking
`The views expressed
`to improve the security of their computer systems.
`in the papers do not necessarily reflect those of the National Bureau
`The material presents
`of Standards or the Civil Service Commission.
`the present state-of-the-art technology for encrypting data and
`introduces many applications of encryption either implemented or
`contemplated.
`
`M. Zane Thornton
`Acting Director
`Institute for Computer
`Sciences and Technology
`
`iii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 5
`
`
`
`PREFACE
`
`The National Bureau of Standards (NBS) initiated a project in 1972
`to develop standards in Computer Systems Security.
`Among the needs for
`physical, administrative and technical security measures and procedures,
`the need for a method of protecting computer data during transmission
`and storage was identified.
`As a result of this initial evaluation of
`security requirements, a project was initiated that led to the
`publication of the Data Encryption Standard.
`
`The Data Encryption Standard was published on January 15, 1977 and
`The Standard specifies an algorithm
`became effective on July 15, 1977.
`for use by Federal Departments and Agencies in the cryptographic pro-
`tection of unclassified computer data during transmission or in storage.
`The algorithm, developed by the International Business Machines
`Corporation, was one of several algorithms submitted to NBS for consid-
`The algorithm and the proposed standard containing
`eration as a standard.
`the algorithm were reviewed and coordinated within the standards-making
`The publication of the Standard culminated this process.
`process.
`
`The Conference on Computer Security and the Data Encryption Standard
`was structured to answer many of the questions typically raised concerning
`computer security and data encryption.
`Nearly 500 people participated
`Experts from industry and government were invited to
`in the Conference.
`present their views and recommendations on when, where and how to apply
`encryption to a computer system or network.
`The presentations were
`organized to give full coverage to the applications as well as the
`implementations of the Data Encryption Standard.
`
`These proceedings are structured along the same lines as the
`Conference.
`Pictures of the speakers as well as their submitted papers
`The Appendix
`or an edited version of their presentations are included.
`contains the questions that were raised at the conclusion of the
`Conference as well as the answers prepared by the speakers.
`
`The National Bureau of Standards wishes to thank all who participated
`in the Conference and helped to make it a success.
`
`S. Jeffery
`Conference Chairman
`
`Dennis K. Branstad
`Program Chairman
`
`iv
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 6
`
`
`
`ABSTRACT
`
`These proceedings include papers or summaries of present-
`ations of the fifteen speakers who participated in the
`Conference on Computer Security and the Data Encryption
`Standard held at the National Bureau of Standards on
`Representatives from Federal agencies
`February 15, 1977.
`and private industry presented technical information
`and guidance with respect to computer security and
`the Data Encryption Standard.
`Subjects of the papers
`and presentations include physical security, risk
`assessment, software security, computer network security,
`applications and implementation of the Data Encryption
`The questions raised at the conference and
`Standard.
`their answers are included in the proceedings.
`
`Key words:
`
`Computer security, cryptography; Data
`Encryption Standard; encryption; key
`management; network security.
`
`v
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 7
`
`
`
`ACKNOWLEDGEMENTS
`
`The following individuals made significant contributions to the success
`of the conference and to the publication of these proceedings:
`
`Mrs. Anne Shreve, NBS (Conference Manager)
`
`Mrs. Sara Torrence, NBS (Arrangements Chairman)
`
`Mr. Fred Rao, CSC (Nominations Chairman)
`
`Mrs. Grace Burns, NBS (Institute Liaison)
`
`Mrs. Mary Ellen Crane, NBS (Proceedings Typist)
`
`EDITOR'S COMMENT
`
`All but five of the published papers were received directly from the
`The other five papers (Courtney, Rallapalli, Crumb,
`author(s).
`McDonnell and Tuchman) were edited from the taped presentations made
`None of the slides shown during these presentations
`at the Conference.
`were available for publication in these proceedings.
`
`Certain commercial products are identified in these proceedings in order
`to specify adequately experimental procedures.
`In no case does such
`identification imply recommendation or endorsement by the National Bureau
`of Standards, nor does it imply that the products or equipment identified
`are necessarily the best available for the purpose.
`
`vi
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 8
`
`
`
`CONFERENCE ON COMPUTER SECURITY
`
`AND THE
`
`DATA ENCRYPTION STANDARD
`
`PROGRAM AND INDEX
`
`1.
`
`WELCOME AND INTRODUCTION
`
`Mr. S. Jeffery, National Bureau of Standards
`
`2.
`
`The Data Encryption Standard in Perspective
`
`Dr. Ruth M. Davis, National Bureau of Standards
`
`3.
`
`Major Computer Security Aspects Related to the Data
`Encryption Standard (Picture of Participants)
`
`3.1
`
`Computer Security Risk Assessment
`
`Mr. Robert H. Courtney, IBM Corporation
`
`3.2
`
`Data Encryption and its Relationship to Physical
`Security Planning
`
`Mr. Robert V. Jacobson, Chemical Bank
`
`3.3
`
`Computer Systems Security and the NBS-DES
`(Beyond Line Encryption)
`
`Mr. Clark Weissman, System Development Corporation
`
`4.
`
`Considerations in Procurement and Use of Data
`Encryption Devices (Picture of Participants)
`
`4.1
`
`Considerations in Applying an Encryption Device
`to a Communications Network
`
`Mr. Barrie Morgan, Datotek, Inc.
`
`4.2
`
`The Management of Encryption Keys
`
`Page
`
`2
`
`4
`
`14
`
`15
`
`13
`
`25
`
`37
`
`38
`
`46
`
`Mr. David J. Sykes, Honeywell Information Systems, Inc.
`
`4.3
`
`Design and Specification of Cryptographic Capabilities
`
`54
`
`Mr. Carl M. Campbell, Jr. (Consultant) Interbank
`Card Association
`
`vii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 9
`
`
`
`4.4
`
`A Bit-Slice, 4-Chip Implementation of the Data
`Encryption Standard
`
`Kris Rallapalli, Fairchild Semi -Conductor
`
`5.
`
`Applications of the Data Encryption Standard (Picture of
`Participants)
`
`5.1
`
`Federal Reserve Communications Security Project
`
`Mr. Howard Crumb, Federal Reserve Bank
`
`5.2
`
`ARPA Network Security Project
`
`Mr. Stephen T. Walker, Defense Advanced Research
`Projects Agency
`
`5.3
`
`Electronic Funds Transfer Application
`
`Mr. Jack McDonnell, EFT Commission
`
`6.
`
`Implementation and Use of the Data Encryption Standard
`(Picture of Participants)
`
`6.1
`
`Implementation & Use of The Data Encryption
`Standard within The Data Communications
`Environment
`
`Mr. Ed. Lohse, Burroughs Corporation
`
`6.2
`
`Integrated System Design
`
`Page
`
`67
`
`69
`
`70
`
`74
`
`80
`
`83
`
`84
`
`94
`
`Dr. Walter Tuchman, International Business Machines
`Corporation
`
`6.3
`
`An LSI Implementation of the Data Encryption Standard
`
`97
`
`Mr. Howard 0. Wright, Rockwell International
`
`6.4
`
`A Microprocessor Controlled LSI Implementation of the
`Data Encryption Standard
`
`Mr. Keith Warble, Motorola Inc.
`
`7.
`
`Appendix:
`
`Question and Answer Session
`
`107
`
`116
`
`viii
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 10
`
`
`
`S. Jeffery, Conference Chairman;
`D. Branstad, Program Chairman.
`
`1
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 11
`
`
`
`WELCOME AND INTRODUCTION
`
`S. Jeff ery
`Conference Chairman
`Systems and Software Division
`National Bureau of Standards
`Washington, D.C.
`20234
`
`On behalf of the National Bureau of Standards, I would like to
`welcome each of you to the Conference on Computer Security and the
`The Conference is being sponsored by the
`Data Encryption Standard.
`National Bureau of Standards and the Civil Service Commission.
`The
`program that we have organized for you today has been structured to
`place the new Data Encryption Standard as published in Federal Infor-
`mation Processing Standard 46 into perspective with other measures
`that can be used to provide computer and data security.
`
`The Conference has been organized into four sessions.
`The first
`addresses the major computer security aspects related to the DES.
`These include risk analysis, physical security and computer systems
`The second session involves those topics that should be
`security.
`considered in the use of data encryption.
`These include communications
`security devices, key management and system design.
`The third session
`covers the applications of the Data Encryption Standard that are
`These include security projects involving en-
`presently identified.
`cryption at the Federal Reserve network, the ARPA network and in
`electronic funds transfer.
`The final session will cover various imple-
`These will be discussed by members of
`mentations and uses of the DES.
`various companies that are interested in implementing and using the
`DES.
`
`In order to cover a very large subject in one day, we request that
`all questions be written and they will be responded to following the
`Whenever possible, the question should be addressed to a
`last session.
`Each speaker will prepare short written answers to
`specific speaker.
`During the question and answer period at the conclusion
`the questions.
`of the Conference, the four session chairmen will take turns reading
`a question and the speaker's response.
`The questions and answers will
`be published in the proceedings.
`
`We hope that today will be beneficial to each of you and that you
`will find the program enjoyable.
`
`2
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 12
`
`
`
`3.!J
`
`...n._
`
`
`
`
`
`gficmam30.33.m._>wo.25.3.
`
`35
`
`3
`
`PMC Exhibit 2017
`Apple v PMC
`IPRZO16-00754
`Page 13
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 13
`
`
`
`The Data Encryption Standard in Perspective
`
`Ruth M. Davis, Director
`Institute for Computer Sciences and Technology
`National Bureau of Standards
`Washington, D.C. 20234
`
`The Data Encryption Standard was approved as a
`Federal Information Processing Standard by the Secre-
`This Standard
`tary of Commerce on November 23, 1976.
`was developed as a part of the Computer Security Pro-
`gram within the Institute for Computer Sciences and
`Technology at the National Bureau of Standards.
`This
`paper places this standard in perspective with other
`computer security measures that can and should be
`applied to Federal computer systems either before
`or coincident to using the Data Encryption Standard.
`
`NBS initiated the standards development effort
`During this
`leading to adoption of the DES in 1972.
`period, NBS solicited for algorithms and information
`upon which a standard could be based, published for
`comment the algorithm which best satisfied the re-
`quirements of an encryption standard, and coordinated
`the effort with both the potential using communities
`and supplying communities.
`
`This paper outlines the environment surrounding
`and the history of the Data Encryption Standard and
`discusses the objectives of additional standards to
`be developed within the computer security program.
`
`Key words:
`
`Computer security; encryption; standard.
`
`1.
`
`Introduction
`
`There are very few of us today whether we are computer scientists,
`managers, ADP facility personnel or communications specialists who have
`experience with encrypting and decrypting information in any operational
`environment.
`Therefore, there are very few of us who know what to ex-
`pect when we first begin to use data encryption procedures.
`As we en-
`counter problems or unexpected happenings there will be very few pre-
`cedents we can draw upon for guidance.
`We should, therefore, try to
`
`4
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 14
`
`
`
`get the most from those individuals and organizations who have already
`stumbled and learned from their experiences.
`We will need to know who
`they are, whether they are in industry, Government or academia.
`
`First, however, we need to remind ourselves as to why there are so
`many of us now concerned with data encryption when there were so few in
`As might be anticipated, since we are still at the beginning
`the past.
`of the first real sign of general or public interest in encryption, it is
`difficult to pull apart the underbrush and identify any real pathway.
`But let us try.
`
`2.
`
`Who Has Been Using Encryption?
`
`Prior to the mid-to-late 1960's almost the only use of encryption
`National security is still the
`was for national security purposes.
`predominant motive for data encryption.
`Other long-established uses
`of data encryption have been principally in foreign countries by inter-
`ministry networks, police and gendarmeries and embassy communications
`How do we ascertain these other principal users of data en-
`systems.
`Not surprisingly, we used the traditional market indicator--
`cryption?
`namely, who are the buyers of data encryption equipment sold by vendors.
`Here, even for U.S. vendors of cryptographic equi pment, the market is
`principally foreign buyers.
`
`In the United States at the present time, a very small percentage
`of companies use cryptographic equipment and encryption procedures.
`Hence, it is quite apparent that if we are to find and use available
`expertise and experience in cryptographic application, it will be from
`within the U.S. national security community, foreign organizations and
`governments and a very few U.S. companies.
`
`3.
`
`Why Is Encryption More in Demand Now?
`
`Since the late 1 960 ' s there have been a few newly emerging but
`important motivations other than national security for employing crypto-
`Categorized in terms of technological-
`graphic equipment and procedures.
`ly-induced changes they are simply that:
`
`o
`
`o
`
`o
`
`Computer and communications technology have combined to
`encourage dramatic increases in the volume and speed of
`information collection and distribution.
`
`The principal mode for distribution of time-sensitive
`data is now electronic.
`
`Advances in electronic technology have made electronic
`surveillance and interception inexpensive and available
`to individual buyers.
`
`5
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 15
`
`
`
`.
`
`o
`
`Computer, communication and transportation technology
`have combined to make the geographically dispersed
`company or government the more common organizational
`entity with its management almost totally dependent
`on electronic means of information transmission.
`Cat-
`egorized in terms of real or perceived threats, these
`new motivations for employing encryption can be put in
`different terms--namely , in a rough chronological order
`of emergent threat as follows:
`
`Organized and intentional attempts to
`obtain economic or market information
`from competitive organizations in the
`private sector.
`
`Organized and intentional attempts to
`obtain economic information from govern-
`ment agencies.
`
`Inadvertent acquisition of economic or
`market information.
`
`Inadvertent acquisition of information
`about individuals.
`
`Intentional fraud through illegal access
`to computer data banks with emphasis in
`decreasing order of importance on acquisi-
`tion of funding data, economic data, law
`enforcement data and data about individuals.
`
`Governmental intrusion on the rights of
`indi vi duals
`
`Invasion of individual rights by the
`Intelligence Community.
`
`4.
`
`What Is The "Cryptographic Marketplace?"
`
`Faced with this sporadic but increasing demand for cryptographic
`equipment, what kind of cryptographic marketplace exists?
`Obviously,
`the cryptographic marketplace has a very long history since equipment
`and procedures for transforming data into unintelligible form and then
`transforming it back into intelligible form have been used for thousands
`of years.
`
`However, looking just at the 1970' s, before the advent of the NBS
`data encryption standard, the cryptographic marketplace was and is
`large, competitive and one in which caveat emptor or "buyer beware"
`There are about 150 manufacturers of discrete
`was the prevalent theme.
`
`6
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 16
`
`
`
`cryptographic devices world-wide of which somewhat less than 100 are
`American companies.
`Most cryptographic equipment is now electronic
`where just a few years ago it was either mechanical or electro-mechanical.
`There are also a very few--probably less than fi ve--compani es world-wide
`that sell software encryption packages.
`
`If you really dig in and read company brochures, you will find about
`a dozen major manufacturers with what we would call a full line of cryp-
`tographic equipment, e.g., equipment for data with different trans-
`mission speeds, for different types of channels and transmission methods,
`for off-line and on-line use, etc.
`My estimate is that more than 75% of
`these dozen companies are foreign manufacturers.
`
`The commercial equipment is generally described in the above term-
`inology, with additional descriptors of allowable key variations and in
`"working principles."
`We can refer to the working principle as the en-
`cryption algorithm.
`
`As you may recall, the marketplace was described earlier as one of
`"buyer beware."
`This is because the intricacies of relating key varia-
`tions and working principles to the real strength of the encryption/
`decryption equipment were and are virtually unknown to almost all buyers,
`and informed decisions as to the right type of on-line, off-line, key
`generation etc., which will meet buyers' security needs have been most
`difficult to make.
`
`It was into this arena that the National Bureau of Standards en-
`tered in 1972.
`
`5.
`
`Legislative And Governmental Responsibilities
`
`Responsibilities for design, use and applications of cryptographic
`equipment were not clearly defined in 1972 ; they are still not clearly
`defined in 1977.
`
`NBS , under its Brooks Act (P.L. 89-306) responsibility for setting
`Federal standards for effective and efficient uses of computer systems,
`initiated a much needed program in computer security in 1971.
`It pur-
`sued as an essential part of computer security the development of data
`The purpose of the NBS data encryption standards
`encryption standards.
`development effort was to protect computer data in transit or resident
`in computer systems and networks.
`
`The primary constituency under the Brooks Act for NBS' data en-
`cryption standards were Federal agencies; the secondary constituency
`deriving from NBS' responsibilities as a member of the Department of
`Commerce was the general buyer not operating under national security
`provisions and directives.
`
`7
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 17
`
`
`
`Responsibilities for cryptographic R&D and use in national security
`activities are fairly well defined under the National Security Act of
`1947 and under the amending Executive Order 11905 of February 18, 1976.
`Under this Executive Order, the National Security Agency serves "under
`the Secretary of Defense as the central communications security authority
`of the United States Government" and is responsible for the "conduct of
`research and development to meet the needs of the United States for sig-
`nals intelligence and communications security."
`NBS has asked for and
`received the unique and very valuable assistance of NSA since 1972 in
`NBS 1 effort to provide data encryption standards for its constituencies.
`
`The only recent relevant Congressional legislation is the Privacy
`Act of 1974, under which 0MB assigned NBS responsibilities for the de-
`velopment of computer and data standards to meet the needs of the Act.
`Data security is not a requirement of the Privacy Act of 1974.
`However,
`data security is one of the means best suited for meeting requirements
`of the Act.
`
`As of 1977, NBS 1 data encryption program and its recently issued
`Data Encryption Standard (DES) have not, to the best of our knowledge,
`decreased existing competition in the cryptographic marketplace.
`In-
`deed, at least five new hardware and/or software encryption products
`have entered the marketplace as a direct result of the DES.
`
`Probably the principal change in the marketplace that can be
`attributed to NBS' DES is the lessening of the "buyer beware" character-
`Anyone buying cryptographic equipment which has been validated
`istic.
`against the DES can be assured of a specific level of data security:
`namely that 2^5 attempts and the use of the method of exhaustion are
`required to obtain any one key for the encryption algorithm used in the
`DES.
`
`6.
`
`History Of The Data Encryption Standard
`
`As I remarked earlier, the development and history of the DES have
`NBS has been directly involved for more than
`been most interesting.
`The active standards development effort, beginning with
`five years.
`We solicited
`collection of relevant information, was initiated in 1973.
`for information that was available in the field of cryptography that
`We were looking for the techni-
`could be used in guiding our efforts.
`cal specifications of a method of encryption which could be economically
`employed in a variety of computer security applications typical of our
`We wanted this information to be publicly avail-
`assigned constituency.
`able so that anyone desiring to adopt the standard could do so.
`We
`wanted the method of encryption selected as a standard to be amenable
`to various types of equipment built by the many vendors of computer and
`We wanted the specifications of encryption to be
`terminal equipment.
`unambiguous so that anyone would be able to decrypt the data encrypted
`by anyone who also adopted the standard if he had the "key" or secret
`variable that had been used.
`
`8
`
`PMC Exhibit 2017
`Apple v. PMC
`IPR2016-00754
`Page 18
`
`
`
`.
`
`Our first solicitation, in May 1973, produced nothing that satis-
`This solicitation requested "proposals for information
`fied these wants.
`and algorithms" that could be used in developing a standard and we got a
`lot of unsolicited proposals to develop encryption algorithms.
`It seemed
`that a lot of mathematicians had ideas they wished to pursue.
`Develop-
`ment of encryption algorithms is not something you do overnight, however.
`The algorithm that we received which had the best theoretical foundation
`was received scratched in pencil on a sheet of paper.
`It was suggested
`that a random stream of characters be written onto two infinite length
`tapes which are sent to the parties wishing to communicate.
`The sender
`should add the random stream to the message and the receiver should sub-
`tract the random stream from the message.
`This turns out to be the only
`perfect security system, but we've had difficulty finding suppliers of
`In addition, this system has other practical
`infinite length tapes.
`problems
`
`Even though we received no useful algorithms from the first solici-
`tation, a positive step was made.
`Interest was shown in cryptography
`and a need for an encryption standard was demonstrated.
`In addition,
`when a second solicitation was made in August 1974, several algorithms
`were submitted.
`Some were too specialized:
`some were ineffective.
`One
`was received that showed great merit as an encryption algorithm.
`
`7.
`
`Review Of The Data Encryption Standard
`
`This algorithm was published for public comment in March 1975, after
`undergoing Government review for acceptability as a Federal standard.
`coordination
`This is the third phase of a standards development effort:
`However, even before this was done, procedures were worked
`and review.
`out between NBS and IBM, the developer of the algorithm, for having the
`rights for making, using and selling apparatus implementing the algorithm
`available to interested parties under the claims of certain patents held
`The terms and conditions of the agreement by IBM to grant non-
`by IBM.
`exclusive, royalty free licenses under these patents are spelled out in
`the May 13, 1975 and August 31, 1976 issues of the Official Gazette of
`the United States Patent and Trademark Office.
`
`The comments received concerning the algorithm were most interesting.
`The most prevalent need that was apparent from the comments was for a
`Commentors eit