throbber
1/2/2019
`
`Saluting the data encryption legacy - CNET
`
`BEST PRODUCTS
`
`REVIEWS
`
`NEWS
`
`VIDEO
`
`HOW TO
`
`SMART HOME
`
`CARS
`
`DEALS
`
`DOWNLOAD
`
`JOIN / SIGN IN
`
`Saluting the data encryption
`legacy
`
`S E C U R I T Y
`
`Security technologist Bruce Schneier explains that while
`cryptography is one of the most basic tools of computer
`security, it barely existed as an academic discipline 30 years
`ago.
`
`| S E P T E M B E R 2 7, 2 0 0 4 9 : 1 2 A M P D T
`
`Upgrade to the most
`powerful Galaxy yet.
`
`The Data Encryption Standard, or DES, was a mid-'70s brainchild of the National
`Bureau of Standards: the first modern, public, freely available encryption
`algorithm. For over two decades, DES was the workhorse of commercial
`cryptography.
`Over the decades, DES has been used to protect everything from
`databases in mainframe computers, to the communications links
`between ATMs and banks, to data transmissions between police cars
`and police stations. Whoever you are, I can guarantee that many times
`in your life, the security of your data was protected by DES.
`
`Just last month, the former National Bureau of Standards--the agency is
`now called the National Institute of Standards and Technology, or NIST-
`-proposed withdrawing DES as an encryption standard, signifying the
`end of the federal government?s most important technology standard,
`one more important than ASCII, I would argue.
`
`Today, cryptography is one of the most basic tools of computer
`security, but 30 years ago it barely existed as an academic discipline. In
`the days when the Internet was little more than a curiosity,
`cryptography wasn't even a recognized branch of mathematics. Secret
`codes were always fascinating, but they were pencil-and-paper codes
`based on alphabets. In the secret government labs during World War II,
`cryptography entered the computer era and became mathematics. But
`
`Upgrade to
`the most
`powerful
`Galaxy yet.
`
`Play Sound
`
`Tech Today
`
`Autoplay
`
`00:19 /
`
`01:07
`
`https://www.cnet.com/news/saluting-the-data-encryption-legacy/
`
`1/5
`
`BlackBerry Corporation Exhibit 1026, pg. 1
`
`

`

`1/2/2019
`
`Saluting the data encryption legacy - CNET
`with no professors teaching it, and no conferences discussing it, all the
`cryptographic research in the United States was conducted at the
`National Security Agency.
`
`And then came DES.
`
`ADVERTISING
`
`In the days when
`the Internet was
`little more than a
`curiosity,
`cryptography wasn't
`even a recognized
`branch of
`mathematics.
`
`Back in the early 1970s, it was a radical idea. The National Bureau of
`Standards decided that there should be a free encryption standard.
`Because the agency wanted it to be non-military, they solicited
`encryption algorithms from the public. They got only one serious
`response--the Data Encryption Standard--from the labs of IBM. In 1976,
`DES became the government's standard encryption algorithm for
`"sensitive but unclassified" traffic. This included things like personal,
`financial and logistical information. And simply because there was
`nothing else, companies began using DES whenever they needed an
`encryption algorithm. Of course, not everyone believed DES was
`secure.
`
`When IBM submitted DES as a standard, no one outside the National
`Security Agency had any expertise to analyze it. The NSA made two
`changes to DES: It tweaked the algorithm, and it cut the key size by
`more than half.
`
`The strength of an algorithm is based on two things: how good the
`mathematics is, and how long the key is. A sure way of breaking an
`algorithm is to try every possible key. Modern algorithms have a key so
`long that this is impossible; even if you built a computer out of all the
`silicon atoms on the planet and ran it for millions of years, you couldn't
`do it. So cryptographers look for shortcuts. If the mathematics are
`weak, maybe there's a way to find the key faster: "breaking" the
`algorithm.
`
`The NSA's changes caused outcry among the few who paid attention,
`both regarding the "invisible hand" of the NSA--the tweaks were not
`made public, and no rationale was given for the final design--and the
`short key length.
`
`Play Sound
`
`But with the outcry came research. It's not an exaggeration to say that
`the publication of DES created the modern academic discipline of
`cryptography. The first academic cryptographers began their careers
`by trying to break DES, or at least trying to understand the NSA?s
`
`Tech Today
`
`Autoplay
`
`00:19 /
`
`01:07
`
`https://www.cnet.com/news/saluting-the-data-encryption-legacy/
`
`2/5
`
`BlackBerry Corporation Exhibit 1026, pg. 2
`
`

`

`1/2/2019
`
`Saluting the data encryption legacy - CNET
`tweak. And almost all of the encryption algorithms--public-key
`cryptography, in particular--can trace their roots back to DES. Papers
`analyzing different aspects of DES are still being published today.
`
`By the mid-1990s, it became widely believed that the NSA was able to
`break DES by trying every possible key. This ability was demonstrated
`in 1998, when a $220,000 machine was built that could brute-force a
`DES key in a few days. In 1985, the academic community proposed a
`DES variant with the same mathematics but a longer key, called triple-
`DES. This variant had been used in more secure applications in place
`of DES for years, but it was time for a new standard. In 1997, NIST
`solicited an algorithm to replace DES.
`
`The process illustrates the complete transformation of cryptography
`from a secretive NSA technology to a worldwide public technology.
`NIST once again solicited algorithms from the public, but this time the
`agency got 15 submissions from 10 countries. My own algorithm,
`Twofish, was one of them. And after two years of analysis and debate,
`NIST chose a Belgian algorithm, Rijndael, to become the Advanced
`Encryption Standard.
`
`It?s a different world in cryptography now than it was 30 years ago. We
`know more about cryptography, and have more algorithms to choose
`among. AES won?t become a ubiquitous standard in the same way that
`DES did. But it is finding its way into banking security products, Internet
`security protocols, even computerized voting machines. A NIST
`standard is an imprimatur of quality and security, and vendors
`recognize that.
`
`So, how good is the NSA at cryptography? They're certainly better than
`the academic world. They have more mathematicians working on the
`problems, they've been working on them longer, and they have access
`to everything published in the academic world, while they don't have to
`make their own results public. But are they a year ahead of the state of
`the art? Five years? A decade? No one knows.
`
`It took the academic community two decades to figure out that the
`NSA "tweaks" actually improved the security of DES. This means that
`back in the '70s, the National Security Agency was two decades ahead
`of the state of the art.
`
`PAID CONTENT
`
`Washington, District of Columbia:
`This Unbelievable Company is
`Disrupting a $200 Billion Industry
`
`Play Sound
`
`Paid Content by Everquote
`
`Today, the NSA is still smarter, but the rest of us are catching up
`quickly. In 1999, the academic community discovered a weakness in
`another NSA algorithm, SHA, that the NSA claimed to have discovered
`only four years previously. And just last week there was a published
`
`Tech Today
`
`Autoplay
`
`00:19 /
`
`01:07
`
`https://www.cnet.com/news/saluting-the-data-encryption-legacy/
`
`3/5
`
`BlackBerry Corporation Exhibit 1026, pg. 3
`
`

`

`1/2/2019
`
`Saluting the data encryption legacy - CNET
`analysis of the NSA's SHA-1 that demonstrated weaknesses that we
`believe the NSA didn't know about at all.
`
`Maybe now we're just a couple of years behind.
`
`Y O U M AY A L S O L I K E
`
`S p o n s o r e d L i n k s b y
`
`Ta b o o l a
`
`Wanna Stay Young? Eat Ginger!
`
`Sponsored by Healthy-Sporty
`
`Start Being Debt Free in 2019. See If You Qualify For This Brilliant No-Loan Solution.
`
`Sponsored by Freedom Debt Relief
`
`One Must Own Device Changed My Life
`
`Sponsored by Alert1 Help Button
`
`People from United States cannot believe these flight prices
`
`Sponsored by Flights Shop
`
`SHARE YOUR VOICE
`
`TAGS
`
` Post a comment
`
`Security
`
`Next Article: Google is primed to go big at CES again
`
`© 2019 Best Buy
`
`Play Sound
`
`Tech Today
`
`Autoplay
`
`00:19 /
`
`01:07
`
`https://www.cnet.com/news/saluting-the-data-encryption-legacy/
`
`4/5
`
`CNET Magazine
`
`Check out the winter 2018 issue of CNET
`Magazine to find out why Stranger Thing’s
`David Harbour danced with penguins, and
`discover the mining town in the Australian
`Outback where everyone lives underground.
`You can also retrace a famous fossil hunt in
`Mongolia from behind the wheel of an Infinity
`SUV, and learn how Reddit helped one
`reporter tackle her biggest insecurity.
`
`Read now!
`
`BlackBerry Corporation Exhibit 1026, pg. 4
`
`

`

`1/2/2019
`
`Saluting the data encryption legacy - CNET
`
`
`Download the CNET app About CNET
`|
`
`
`
`|
`
`
`Sitemap
`
`|
`
`Privacy Policy
`
`
`
`|
`
`
`Ad Choice
`
`|
`
`
`Terms of Use
`
`|
`
`
`Mobile User Agreement
`
`|
`
`Help Center
`
`© CBS INTERACTIVE INC.
`All Rights Reserved.
`
`AFFILIATE DISCLOSURE
`CNET may get a commission from retail offers.
`
`TOP BRANDS
`Roadshow
`
`Play Sound
`
`Tech Today
`
`Autoplay
`
`00:19 /
`
`01:07
`
`https://www.cnet.com/news/saluting-the-data-encryption-legacy/
`
`5/5
`
`BlackBerry Corporation Exhibit 1026, pg. 5
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket