ECC patents
Patent-related uncertainty around elliptic curve cryptography (ECC), or ECC patents, is one of the main factors limiting its wide acceptance. For example, the OpenSSL team accepted an ECC patch only in 2005 (in OpenSSL version 0.9.8), despite the fact that it was submitted in 2002.
According to Bruce Schneier as of May 31, 2007, "Certicom certainly can claim ownership of ECC. The algorithm was developed and patented by the company's founders, and the patents are well written and strong. I don't like it, but they can claim ownership."[1] Additionally, NSA has licensed MQV and other ECC patents from Certicom in a US$25 million deal for NSA Suite B algorithms.[2] (ECMQV is no longer part of Suite B.)
However, according to RSA Laboratories, "in all of these cases, it is the implementation technique that is patented, not the prime or representation, and there are alternative, compatible implementation techniques that are not covered by the patents."[3] Additionally, Daniel J. Bernstein has stated that he is "not aware of" patents that cover the Curve25519 elliptic curve Diffie–Hellman algorithm or its implementation.[4] RFC 6090, published in February 2011, documents ECC techniques, some of which were published so long ago that even if they were patented any such patents for these previously published techniques would now be expired.
Known patents
- Certicom holds a patent on efficient GF(2n) multiplication in normal basis representation.
- Certicom holds multiple patents which cover the MQV (Menezes, Qu, and Vanstone) key agreement technique.
- Certicom holds U.S. Patent 6,563,928 on technique of validating the key exchange messages using ECC to prevent a man-in-the middle attack. It expires in 2019.
- Certicom holds U.S. Patent 6,782,100 on calculating the x-coordinate of the double of a point in binary curves via a Montgomery ladder in projective coordinates. It expires in 2020.
- US National Security Agency holds U.S. Patent 4,567,600, U.S. Patent 4,587,627, U.S. Patent 6,212,279, U.S. Patent 6,243,467 on efficient GF(2n) calculations in normal basis (all of these patents expired or lapsed (as Google shows) due to failure to pay fees)
- RSA Data Security holds U.S. Patent 5,854,759 on efficient basis conversion. It expires in 2017.
- Hewlett-Packard holds U.S. Patent 6,252,960 on compression and decompression of data points on elliptic curves. It expires in 2018.
According to the NSA, Certicom holds over 130 patents relating to elliptic curves and public key cryptography in general.[5]
It is difficult to create a complete list of patents which are related to ECC, but a good starting point is Standards for Efficient Cryptography Group (SECG) – a group devoted exclusively to developing standards based on ECC. There is controversy over the validity of some of the patent claims.
Certicom's lawsuit against Sony
On May 30, 2007, Certicom filed a lawsuit against Sony in United States District Court for the Eastern District of Texas Marshall office, claiming that Sony's use of ECC in Advanced Access Content System and Digital Transmission Content Protection violates Certicom's patents for that cryptographic method. In particular, Certicom alleged violation of U.S. Patent 6,563,928 and U.S. Patent 6,704,870. The lawsuit was dismissed on May 27, 2009.[6] The stipulation states, "Whereas Certicom and Sony have entered into a settlement agreement pursuant to which they have agreed to a dismissal without prejudice, these parties therefore jointly move to dismiss all claims and counterclaims asserted in this suit, without prejudice to the right to pursue any such claims and counterclaims in the future." [7]
As for the prior art, Sony claimed:[8]
- For '870 patent: Alfred J. Menezes, Minghua Qu and Scott A. Vanstone, IEEE P1363 Standard, Standard for RSA, Diffie–Hellman and Related Public-Key Cryptography, Part 6: Elliptic Curve Systems (Draft 2) (October 30, 1994)
- For '928 patent: Scott A. Vanstone, G. B. Agnew and R. C. Mullin, An implementation of elliptic curve cryptosystems over F2155, IEEE Journal on Selected Areas in Communications, Volume 11, Issue 5, Jun 1993 p. 804 - 813
See also
References
- ↑ Fulton, III, Scott M. (2007-05-30). "Certicom Patent Suit Against Sony Threatens to Unravel AACS". betanews.com. Retrieved 2013-08-12.
- ↑ "Certicom Sells Licensing Rights to NSA". Certicom. 2003-10-24. Retrieved 2013-08-12.
- ↑ "Are elliptic curve cryptosystems patented?". RSA Security. Archived from the original on 2013-05-24. Retrieved 2013-08-12.
- ↑ Bernstein, Daniel J. (2006-05-23). "Irrelevant patents on elliptic-curve cryptography". Retrieved 2013-08-12.
- ↑ "The Case for Elliptic Curve Cryptography". NSA. 2009-01-15. Retrieved 2013-08-12.
- ↑ "Certicom Corporation et al v. Sony Corporation et al Featured Case Has Decisions". justia.com. 2009-05-27. Retrieved 2013-08-12.
- ↑ "Certicom Corporation et al v. Sony Corporation et al, Filing: 112". justia.com. 2009-05-27. Retrieved 2013-08-12.
- ↑ "Certicom Corporation et al v. Sony Corporation et al, Filing: 52". justia.com. 2008-07-14. Retrieved 2013-08-12.
External links
- "Crypto FAQ: 6.3.4 Are elliptic curve cryptosystems patented?". RSA Security. Archived from the original on 2013-05-24. Retrieved 2013-08-12.
- "The Case for Elliptic Curve Cryptography". National Security Agency. 2009-01-15. Retrieved 2013-08-12.
- Shankland, Stephen (2002-09-19). "Open-source group gets Sun security gift". CNET. Retrieved 2013-08-12.
- Klimov, Alexander (2005-10-15). "ECC patents?". cryptography at metzdowd.com. Retrieved 2013-08-12.
- Moeller, Bodo (2005-10-17). "ECC patents?". cryptography@metzdowd.com. Retrieved 2013-08-12.
- "SECG Patent Policy of April 26, 1999: Patents held by Certicom" (PDF). SECG. 1999-05-27. Retrieved 2013-08-12.
- "SECG Patent Policy as of February 10, 2005: Patents held by Certicom" (PDF). SECG. 2005-02-10. Retrieved 2013-08-12.
- Harper, Menezes and Vanstone, Public-Key Cryptosystems with Very Small Key Lengths, EUROCRYPT '92 (LNCS 658)
- "Certicom v Sony complaint, 2:07-cv-216" (PDF). 2007-05-31. Retrieved 2013-08-12.
- Denis, Tom St. (2006). "Elliptic Curve Cryptography Redux" (PDF). Toorcon 0x08: 24–28.