DSA and patents

Werner Koch wk@isil.d.shuttle.de
Wed, 10 Dec 1997 09:26:08 +0100


I received good news concerning the Schnorr patent (see below).

I do not think that the other patent will make any problems; probably
the NIST wants that DSA is used and will keep it=B4s promise and make
the Kravits patent free.

By the way, I know of the security issues of ElGamal (after spending
some money on quite expensive Crypt lectures);  I didn=B4t know of my own
what generator g PGP uses, but that is a good thing (not knowing of too
much code).

-----Forwarded message from Peter Gutmann <pgut001@cs.auckland.ac.nz>----=
-


>2. The Schnorr patent (4,995,082): In a letter to the NIST Schnorr
> claimed that the DSA infringes his patent. FIPS 186 (about DSS)
> states that "The Department of Commerce is not aware of any patents
> that would be infringed by this standard". I also heard, that the
> government will help if someone is sued on patent infringement while
> working on a project implementing DSS for governmental purposes.
=20 The Schnorr patent is a so-called "scarecrow patent" which only applies t= o a=20 very restricted set of smart-card based applications. A number of lawyer= s=20 from companies big enough to care about possible lawsuits have examined i= t and=20 decided that any claims against typical software implementations are base= less. =20
>Another issue with the OpenPGP draft is, that it requires DSA signatures
>and has no provisions for plain ElGamal signatures. If itM-4s true, tha=
t
>DSA may infringe on some patents, can ElGamal signatures be made an opti=
on=20
>for OpenPGP and DSA be a SHOULD and not a MUST?
=20 There are various issues with Elgamal signatures, the main one is that th= e=20 keys PGP 5 currently generates with g=3D2 makes the signatures forgeable = using=20 an attack which Daniel Bleichenbacher described at EuroCrypt'96. You'd n= eed=20 to modify the PGP keygen to avoid this. There's a draft RFC=20 draft-rfced-info-gutmann-elgamal-00.txt which covers this and other issue= s. =20
>From the draft:
=20
>3. Security considerations
>
>Although the use of the Elgamal algorithm for digital signature
>generation is not directly addressed in this document, it should be
>pointed out that some care needs to be taken with both the choice of
>keys and the use of the algorithm. Details on the safe use of Elgamal
>are given in [4]. A weakness of Elgamal when used for digital
>signatures, and workarounds to avoid the weakness, are given in [5].
>
>Ongoing research into the security of Elgamal may reveal other factors
>which need to be taken into account to provide adequate security for
>signature and encryption applications, for example it is desirable that
>g generate a large subgroup of Zp*; it is recommended that implementors
>keep abreast of current research on the choice of parameters and use of
>the algorithm in order to avoid potential security weaknesses.
=20 Peter. =20 -----End of forwarded message----- --=20 Werner Koch, Duesseldorf - werner.koch@guug.de - PGP keyID: 0C9857A= 5