This video belongs to the openHPI course Confidential Communication in the Internet. Do you want to see more?
An error occurred while loading the video player, or it takes a long time to initialize. You can try clearing your browser cache. Please try again later and contact the helpdesk if the problem persists.
Scroll to current position
- 00:00In our openHPI course Confidential Communication in the Internet,
- 00:04now we consider some Crypto Patents and Standards.
- 00:09In daily practice, cryptography plays a very very important role
- 00:14so new cryptographic knowledge it's a very interesting
- 00:21research topic, new cryptographic knowledge and procedures are published
- 00:27in scientific publications, in journals and
- 00:33conferences or they are applied for patents.
- 00:38The cryptographic process to apply such cryptographic methods,
- 00:44this of course must be interoperable in the context of various applications. Internet
- 00:51applications come from different people, there are many services
- 00:56which you want to interact with so this cryptographic means and tools
- 01:02need to be as much as possible interoperable.
- 01:07And to achieve this, various specifications and fixations
- 01:13need to be done, these are called standards and of course, the
- 01:20software companies need to agree on the standards.
- 01:26The standards then also
- 01:30be adhered to the various software providers, and a standard
- 01:35becomes a standard and becomes successful if many software providers
- 01:40apply as a standard and design tools that can deal with this fixation
- 01:47of cryptographic process.
- 01:51So, the use of cryptographic methods and implementations in crypto products
- 01:56especially in hardware and software should be carried out in compliance with relevant standards whenever possible
- 02:06So, here are some very important crypto patents,
- 02:12so, many cryptosystems and crypto algorithms are patents.
- 02:16So, here are the
- 02:20five most particular important crypto patents, the first is
- 02:27DES block ciphers, we discussed this in the first week of our course
- 02:32of symmetric encryption which is today no more considered
- 02:39secure enough. Then the first public key patent was the Diffie-Hellman
- 02:47key exchange, which solves the problem for securely exchanging secret keys
- 02:56in over an unsecured media so this also can be considered as the beginning
- 03:03of the asymmetric
- 03:07encryption methods development. Then the Merkle-Hellman Knapsack and PKI
- 03:15patent became very important with PKI description first time,
- 03:21then the Tree authentication method which was introduced in 1982
- 03:27for dealing with such hierarchical structures and then of course
- 03:33RSA asymmetric encryption and a signature standard which was introduced in
- 03:401983.
- 03:44There were a number of other significant crypto patents for example,
- 03:49a patent for the generation of RSA prime numbers, you remember RSA
- 03:56was based on the factorization problem, so,
- 04:02for the private key one needs to know two huge prime numbers
- 04:07and these huge prime numbers are multiplied and for an attacker
- 04:13he only can break the
- 04:16encryption system when he is able to defactorise
- 04:20this product.
- 04:23Then the One-Time Signatures is a very important crypto patent
- 04:27which was introduced in 1989 by Merkle.
- 04:30The IDEA cipher was introduced in 1993 and it provides a symmetric
- 04:39encryption method. DSA signatures
- 04:43which was introduced in 1993. Then Modulo Arithmetic Processing Chip,
- 04:50today it's a very popular
- 04:54elliptic curve cryptography, here as the first patent was done.
- 05:00And then IBE, the Identity Based Encryption method which was
- 05:05introduced in 2007.
- 05:08If we look at other crypto standards then
- 05:14there is the American institution for standardization, NIST (National Institute of Standards and Technology),
- 05:19so, important security standards of NIST is AES,
- 05:25the advanced encryption standard, the successor of DES,
- 05:30the symmetric encryption method which was,
- 05:34which nowadays is a successor of DES and is used in many fields of symmetric methods for encryption.
- 05:50SHA family, so we discussed several hash algorithms from the SHA family,
- 05:57the SHS, the Secure Hash Standard, which defines the use of hash functions
- 06:04and the DSA standard which provides algorithms for digital signatures.
- 06:11Then other important security standards which became important in
- 06:18the environment of banks, this is the DES standard, nowadays no more considered
- 06:26secure, than the PIN management
- 06:30standard which is described in the
- 06:35ISO 9564 and ANSI standard, the signature standard,
- 06:41banks when they interact with others, they recognize signatures,
- 06:48certificates, how the certificate should look like, you see there are different standards
- 06:55for the certificates used in the environment of banks and this is
- 07:02only the peak of the iceberg of the many other crypto patents and standards
- 07:08which are important to survive
- 07:15in our digital world.
To enable the transcript, please select a language in the video player settings menu.