throbber

`
`Mathematical
`
`Cryptology
`
`for
`
`Computer Scientists and
`
`Mathematicians
`
`WAYNEjATTERSON
`Departmenm'omputer Science
`University of New Orleans
`
`
`
`_____._.-.Fl11:-
`
`ROWMAN & LITTLEFIELD
`Publishers
`
`Petitioner Apple - Ex. 1028, p. 1
`
`

`

`ROWMAN 8: LITTLEFIELD
`
`Published in the United States of America in 1987
`by Rowman & Littlefield, Publishers
`(a division of Littlefield, Adams & Company)
`81 Adams Drive, Totowa, New Jersey 07512
`
`Copyright © I987 by Rowman & Littlefield
`
`All rights reserved. No part of this publication may
`be reproduced, stored in a retrieval system, or
`transmitted in any form or by any means, electronic,
`mechanical. photocopying, recording, or otherwise,
`without the prior permission
`of the publisher.
`
`Library of Congress Cataloging-in-Publication Data
`
`Patterson, Wayne, I945—
`Mathematical cryptology.
`
`Bibliography: p. 287
`Includes index.
`i. Cryptography.
`Zl03.P35
`I987
`ISBN 0-84767438-X
`
`X. Title.
`652'.8
`
`86-l3ll7
`
`American Mathematical Society categories:
`94A60 (Cryptography); llT7l (Coding Theory)
`
`8789919088
`
`[3542
`
`Printed in the United States of America
`
`Petitioner Apple - Ex. 1028, p. 2
`
`

`

`Cryptography Before 1970
`
`15
`
`be sent --- of course, by another channel, since if the attacker were to
`intercept the pad, then the system would be useless.
`
`Rotor Machines
`
`To mechanize the production of ciphertext, various devices were
`invented which speed the process. One important family of such devices
`were the rotor machines, invented in the 1920’s, to implement Vigenere-
`type ciphers with very long periods.
`A rotor machine has a keyboard, and a series of rotors. A rotor is a
`rotating wheel with 26 positions. Each position completes an electric
`contact, and depending on the position. determines a different Caesar shift.
`When a key on the keyboard is depressed, a letter is generated depending
`upon the position of the rotors.
`Two of the best-known of these devices are the Hagelin and the
`Enigma machines. Both were invented in the 1920’s; the Enigma machine,
`the German code machine, was actually patented in the United States by
`Arthur Scherbius in 1923.
`In general, the period of a rotor machine with k rotors is 26‘. (Think of
`the odometer in your automobile.) Consequently, the rotor machine is a
`simple way to implement a VigenEre cipher with very long period.
`The Enigma machine consisted of a plugboard or Steckerboard, which
`simply perrnutes the message text, thence a sequence of rotors (usually 3 or
`5), and a reflecting rotor; it connects letters of the alphabet in pairs.
`The Enigma cryptosystem is xmw = « K, MM”, MR0“, T», where K
`is a space parametrized by the Steckerboard permutation, by the initial
`positions of the rotors, and by the reflecting rotor. The transformation t“ is a
`composition of the following transformations:
`=
`STECIKER'1 ° Rcao‘l ° Ti'l ° RC“) °
`
`. The breaking of the German Enigma machine is probably the most
`
`Petitioner Apple - Ex. 1028, p. 3
`
`

`

`16
`
`Mathematical Cryptology
`
`Cover for the Rotors
`and Lamps
`
`.
`
`I
`
`Reflector
`
`Rotors
`
`
`
`
`
`Steckerboard/ .
`
`
`Figure 1 .4
`The Enigma Machine
`
`Alan Turing, resulted in the saving of thousands of allied lives and the
`shortening of the war. [DEAV 80], [HODG 83], [KAHN 67], [WELC 82].
`However, based on all published material on the efforts at Bletchley
`Park, it would have required only a very simple modification of the Enigma
`machine to have defeated the best efforts of the British cryptographers.
`
`Petitioner Apple - Ex. 1028, p. 4
`
`

`

`Cryptography Before 1970
`
`17
`
`Indeed, the subject of the techniques developed by this group, and the
`devices they invented, could be the subject of a course by itself. And still to
`this day, many of the techniques developed are considered classified by the
`British government.
`
`Final Comments
`
`Cryptosystems based on the Caesar shift and the Vigenere cipher
`formed the basis for most of the successful cryptosystems of the early
`history of the subject, up through the end of the Second World War (and
`beyond).
`Methods such as those implemented by the Enigma machine are
`essentially secure from paper-and-pencil attacks. It is only the development
`of the computer that has rendered further methods necessary.
`
`Hints for Some Exercises
`
`EXERCISE 1.3. The number of permutations possible is 100! A good
`estimate of the size of n! is given by Stirling’s formula:
`11! z (210% e-n nn+'/2
`
`There are 105 microseconds in a second, thus 6 x 107 microseconds in a
`minute.
`
`EXERCISE 1.4. Are there any words or patterns of words which tend to
`appear more often in this text than they might in some other sample of
`English text?
`EXERCISE 1.5. What happens when a “Q” shows up in the message
`text? What must follow it (in English)?
`
`
`
`;.
`i:‘5
`i'.:
`
`.»a-.—w-—-¢w.--.-v.
`
`
`
`Petitioner Apple - Ex. 1028, p. 5
`
`

`

`36
`
`Authentication
`
`Mathematical Cryptology
`
`Consider a cryptosystem based on the traditional “secret-key” approach.
`Consider also that it is used for funds transfer in a banking network. One
`day the system manager receives a message from X. The manager decrypts
`the message using the secret key agreed upon by X and the manager. The
`message reads, “transfer $1,000,000 from my account to the system
`manager’s account”. The manager dutifully does so.
`X complains to the authorities, saying that the message was a forgery,
`sent by the manager himself(herselt). The system manager, when reached
`for comment by long distance telephone from Tahiti, says that the message
`was authentic and that X had recanted his desire to make the transfer.
`Since both X and the manager had to know the secret key, there is no
`way, using the cryptosystem, to resolve the disPute.
`However, a public-key cryptosystem could have resolved the issue.
`Suppose that, in addition to the message, every transmission in the network
`is required to be “signed”, that is, to contain a trailer encrypted using X’s
`public key. Then, this requirement would carry with it the ability to
`authenticate X’s message, since only X, knowing the rest of the key, would
`be able to decrypt the trailer.
`Therefore, if we could devise a PKC, it would certainly have most
`desirable features. But many questions remain to be asked First of all, can
`we devise a PKC? What should we look for? Second, if we can find one,
`will it be secure? Will it be efficient?
`These questions will, of course, be addressed in the succeeding
`chapters. For now, we will consider only the general parameters offinding
`PKCs.
`
`From the earlier description, we need to find functions that are “one-
`way”, that is, that enable an efficient computation sufficient for encryption,
`but whose inverses are cryptanalytically very difficult to find
`It is interesting that the two examples we will study next are analogous
`in some sense: one involves the ease of adding numbers together combined
`with the diffiCulty (or impossibility) of determining the original addends,
`given a sum; the other involves the ease of multiplying numbers together
`combined with the difficulty of finding the original factors, given a product.
`
`Petitioner Apple - Ex. 1028, p. 6
`
`

`

`
`
`..__. 8 __
`
`Other Security Problems
`
`In addition to the classic problem of cryptography, as represented
`throughout the monograph by the cryptosystem x = « K, M, C, T », there
`are some closely related problems which lend themselves to similar
`analyses.
`
`The Authentication Problem
`
`In an earlier chapter, the authentication problem was mentioned briefly.
`It differs from the encryption problem in that the message, or at least part of
`il. must be transformed in a way that only the sender can authenticate.
`As we saw in the earlier chapter, no secret-key cryptosystem can
`Provide authentication -—- since the secret key is always shared between the
`authentic sender and at least one other person, that other person could
`
`always “forge” the message.
`0f the public-key encryption systems described, only the RSA
`cryptosystem can be adapted for authenticafion as well as for secrecy (not at
`the same time, however).
`Consider using the RSA algorithm for authentication alone. As with the
`use of the RSA for secrecy, each user, i, generates a secret key pi, qi of
`loo-digit primes, and di; and publishes ni = piqi and ei = d;1 (mod uni».
`Recall that the enciphering transformation is E,(m) = mei
`(mod ni), and
`the (secret) deciphering transformation is Di(m) = mdi (mod 11,).
`In order to provide a message that can be authenticated, user i applies
`the transformation Di(m) and sends this message. The receiver of the
`message, in order to authenticate that the message came from i, consults the
`Public directory and applies the transformation Ei. Consequently, the
`receiver obtains
`
`Engm»
`
`= mdi (mod ni)
`
`Petitioner Apple - Ex. 1028, p. 7
`
`

`

`116
`
`Mathematical Cryptology
`
`= mdi-ei
`= 111.
`
`(modni)
`
`Furthermore, only i could have generated the message, since only i
`knows the transformation Di. There is, however, no secrecy involved, since
`any user of the network can attempt the decryption by trying the public key
`E.
`
`However, RSA can simultaneously provide secrecy and authentication
`by using a double transformation. Namely, when user i wants to send a
`message to user j, and to authenticate it (this is often called signing the
`message), useri uses the decryption transformation D,, and then uses user
`j’s public key to encrypt the message for secrecy. Consequently the
`transformation is:
`
`E,- (Di (m) ).
`
`When the message is received by j, j applies his/her decryption
`transformation, which only j knows, followed by i’s public encryption
`transformation for authentication. Thus:
`
`Ej(Di(m)) —9
`
`Ei(Dj(Ej(Di(m))))
`=Ei(Di(m)) = m
`
`The Merkle—Hellman and Graham-Shamir knapsacks carmot be used for
`authentication, since the enciphering transformation maps the message space
`not onto itself but rather to the integers; consequently, it cannot be inverted
`However, there is a Shamir “signature~only” knapsack algorithm. It is
`based on the knapsack-like problem:
`Given n, S e Z, and W = (W1, wz,
`such that
`
`...w2k ), find C = (c1, c2,
`
`cu )
`
`S=CW=Zciwi
`
`(modn)
`
`where each c,- e [0, log n].
`
`n is chosen to be a (say, 100-bit) random prime number, and the pair
`(W,n) is the public key.
`It is a message of [log n] bits so that in binary form, it represents an
`integer in the range [0, n- l].
`The sender constructs a k x 2k binary matrix H at random. A set of
`knapsack numbers are chosen to satisfy:
`
`Petitioner Apple - Ex. 1028, p. 8
`
`

`

`Standardization ofPublic-Key Encryption
`
`145
`
`messages, but can be an option (OSIScon) of open
`communications systems, as e.g. Teletex.
`Signatures are effected by the OSIS token, a credit card
`sized device issued by a bank, similar to a chipcard. but In
`addition providing a foil key input and display. The token is
`carried by Its owner. He keys in the payment message and his
`PIN (Personal Identification Number). The token authenticates
`him by his PIN. A positive authentication result activates the
`token to sign the (payment) message. After signing the message
`the token is deactivated.
`
`The signature is effected in the token by an asymmetric
`encipherment algorithm and the token's secret key,
`the
`(condensed) payment message being the cleartext input and the
`signature the ciphertext output. The token concatenates the
`message, the signature, and its own identifier. consisting of a
`token's public key, PKtoken, the latter's signature by the issuing
`bank's secret key, the bank's public key PKbank, and the latters
`signature by the OSIS central bank's secret key. For
`authentication purposes every token stores the bank‘s public
`key PKbank, which in turn authenticates the signing token's
`public key, PKtoken, which in turn authenticates the signature.
`For the encipherment algorithm the RSA scheme is being used
`at present.
`
`The token must be tamper-resistant and prevent exhaustive
`PIN search. It must give warning of attempts at intrusion. After
`three wrong PIN inputs, it must destroy its secret information.
`
`Key Management for Symmetric Ciphers:
`
`Whatever the sophistication of a key managemem system for
`data encipherment using a symmetric cipher, the fundamental
`problem is usually one of establishing master keys at the
`communications parties to allow for the secure exchange of
`session keys. The general solution to this problem involves a
`physical action to install the master keys; a secure key transport
`module may be used or the keys can be transported in printed
`form. In large networks the setting up of master keys operating
`between many pairs of communicating parties can be a very
`onerous task. In all cases, the master key must be kept secret.
`If a public key cryptosystem is also available to the system
`designer, the key management task can be transformed. What is
`then needed is a reliable source of public keys for each
`participating user. Given such a reliable source, it is possible to
`encipher master keys for symmetric ciphers using public keys.
`
`Petitioner Apple - Ex. 1028, p. 9
`
`

`

`146
`
`Mathematical Cryptology
`
`This enables a hybrid cipher system to be operated - using public
`keys for master key protection (with the simplified key
`management thereby available) and a symmetric cipher for the
`exchange of session keys and for data enclpherment (with the
`higher operating efficiency of the symmetric cipher). The vital
`issue in such a system is the need for absolute integrity of the
`source of public keys.
`
`Technical Properties
`
`Technical properties of public-key cryptosystems that may, in the
`future, match legal requirements are:
`
`The limiting factor is the perpetuation of
`Permanance:
`magnetically recorded information. The problem has been solved
`for data processing in general.
`Immutabllity: Quality A is sufficient for lmrnutability of the text
`signed. lmmutability of the document signed requires also quality
`E.
`
`Identification: The signing key must not be determinable by
`public information; its owner must keep it secret and must not
`make It available to anyone else. Quality C (including qualities A-
`B) is sufficient for identification.
`Negotiability: This property is provided by quality C. Partners
`must not conspire. Quality F provides for the negotiabllity
`(against conspiring partners) of a signature witnessed by a
`notary.
`A signature must be significant enough to
`Significance:
`change a legal situation; it must promote a warning to the signer
`that he is about to commit something important. Effectlng an
`electronic signature requires attention, e.g.
`it may only be
`achieved if one activates one‘s signing device (by putting in a
`PIN) and presses a key to sign and another key to transmit the
`message.
`Immediate trust: The receiver must be able to trust the
`
`signature prima facie. The digital signature not only can be pn'ma
`facie
`authenticated with the attached public key;
`full
`authentication with a trusted third party's authentic public key
`need not take much longer; for this purpose the attached public
`key can be authenticated by the trusted third party.
`Quality D cannot be provided by a handwritten signature, and
`therefore. neither may be required for its substitute. Quality F is
`
`Petitioner Apple - Ex. 1028, p. 10
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket