💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › SURFPUNK › surf0079.txt captured on 2022-06-12 at 14:29:56.

View Raw

More Information

-=-=-=-=-=-=-

Date: Wed, 14 Apr 93 15:51:29 PDT
Reply-To: <surfpunk@osc.versant.com>
Return-Path: <cocot@osc.versant.com>
Message-ID: <surfpunk-0079@SURFPUNK.Technical.Journal>
Mime-Version: 1.0
Content-Type: text/plain
From: surfpunk@osc.versant.com (Ernqvat guvf FHESCHAX vzcyvrf hfref pbafrag gb fhpu zbavgbevat)
To: surfpunk@osc.versant.com (SURFPUNK Technical Journal)
Subject: [surfpunk-0079] USCONGRESS: Vinton G. Cerf Speaks

# You may have seen this already;  I don't know where it's been.  It seems
# like this information shows up in comp.risks every once in a while, but
# it's nice to have handy, anyway.
# 
# Mike Mitten - gnome@pd.org 

________________________________________________________________________
________________________________________________________________________

 
 Written Testimony of
 
 Dr. Vinton G. Cerf
 Vice President 
 Corporation for National Research Initiatives
 
 and
 
 President
 Internet Society
 
 
 US House of Representatives
 
 Committee on Science, Space and Technology
 
 Subcommittee on Technology, Environment and Aviation
 
 
 March 23, 1993
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 Corporation for National Research Initiatives
 1895 Preston White Drive, Suite 100
 Reston, VA 22091
 +1 703-620-8990
 +1 703-620-0913
 
 
 National Information Infrastructure 
 
 
 INTRODUCTION
 
 Mr. Chairman, distinguished members of the subcommittee 
 and guests, my name is Vinton G. Cerf and I am Vice 
 President of the non-profit Corporation for National Research 
 Initiatives (CNRI). I also have the honor to serve as President of 
 the Internet Society (ISOC), which is a professional society of 
 individuals who are users, developers or operators of the 
 Internet. My remarks today are personal in nature, but they 
 are colored by my past and present professional experiences 
 which form the backdrop against which my opinions and ob-
 servations have evolved.
 
 I worked on the ARPANET project while a graduate student at 
 UCLA in the early 1970s, helping to develop the protocols used 
 to support communication between the computers (hosts) on 
 the network. The highly successful ARPANET experience with 
 packet switching technology led to additional satellite, mobile 
 radio and local area packet networks, developed under  
 Advanced Research Projects Agency (ARPA) sponsorship and, 
 in the case of Ethernet, at the Palo Alto Research Center of the 
 Xerox Corporation. Dr. Robert Kahn, now the president of 
 CNRI, initiated an ARPA internetting research program to ex-
 plore techniques to connect different packet networks in such 
 a way that the host computers did not have to know anything 
 about the intermediate networks linking them together. Dr. 
 Kahn and I developed the idea of gateways and wrote the first 
 specification for the basic TCP/IP protocols now used in the 
 Internet. 
 
 The idea behind Internet was the seamless linking of many 
 different kinds of packet switched networks. I came to ARPA in 
 1976 to manage the Internetting research program and by the 
 time I left ARPA in 1982, the TCP/IP protocols were widely 
 used and the Department of Defense had declared them stan-
 dards for military use. The Internet has blossomed in the sub-
 sequent 10 years, particularly after the National Science 
 Foundation (NSF) introduced the NSFNet as part of the 
 Internet in the mid-1980s. In 1982, there were about 100 
 computers  on the ARPANET and a few score others were part 
 of the NSF-sponsored CSNET which also used the Telenet  
 public data network. In 1993 there are over 1.5 million of 
 them. The system links over 10,000 networks in roughly 50 
 countries. Although it is not known for certain how many 
 users there are, we believe there are well over 5 million. The 
 system is tied into most public and many private electronic 
 messaging services and this expands the population able to 
 exchange email to some 15 million. They include business 
 people, academics, government workers, scientists, engineers, 
 librarians, schoolteachers, astronomers, oceanographers, biol-
 ogists, historians, reporters, attorneys, homemakers, and sec-
 ondary school students . 
 
 The system is doubling annually in users, networks, hosts and 
 traffic. In some parts of the Internet, such as the NSFNet 
 backbone, traffic growth rates as high as 15% per month have 
 been measured. Internet is growing faster than any other 
 telecommunications systems ever built, including the tele-
 phone network. Today, over half of the networks registered are 
 associated with business users. Of course, these rates of 
 growth cannot continue indefinitely, but there is reason to ex-
 pect that the user population will exceed 100M by 1998.
 
 Perhaps even more important, this federal investment in re-
 search has created new industries revolving at first around the 
 hardware and software of Internet technology, and more re-
 cently, around network and information services supported by 
 the Internet. The new businesses (such as Sun Microsystems, 
 3COM and Cisco Systems) have highly positive international 
 trade balances and phenomenal growth, commensurate with 
 the rapid growth of the Internet itself.  The growth rate is ex-
 tremely strong in Europe, South America and the Pacific Rim 
 creating major export markets for the US firms offering 
 Internet products and services.
 
 In 1975, operational management of the ARPANET was trans-
 ferred to the Defense Communication Agency (now the Defense 
 Information Systems Agency  - DISA). In the mid-80s, the 
 National Science Foundation (NSF), the Department of Energy 
 (DOE),  and the National Aeronautics and Space 
 Administration (NASA) joined in supporting the evolution of 
 the Internet and developing and applying its technologies. In 
 addition to developing their own networks (that became inte-
 gral components of the Internet), these agencies participated 
 in the development and standardization of the Internet proto-
 cols (TCP/IP Protocol Suite) and provided  support to the sec-
 retariats of the Internet Architecture Board (IAB) and Internet 
 Engineering and Research Task Forces (IETF and IRTF). This 
 included support for the Internet Assigned Number Authority  
 (IANA), document editor (RFC Editor), and Network 
 Information Centers which provide information and assistance 
 to users and deal with Internet network address assignments. 
 ARPA, NSF, DISA, DOE and NASA now make up part of the 
 Federal Networking Council which continues to oversee the 
 development of networks used in government-sponsored re-
 search and education.
 
 Formed at the beginning of 1992, the non-profit, professional 
 membership Internet Society  provides an institutional frame-
 work for carrying out a variety of activities intended to foster 
 the continued growth, evolution and application of the 
 Internet. Included in this undertaking is the responsibility for 
 the technical standards used in the Internet. Along with mem-
 bers of the Federal Networking Council, the Internet Society 
 supports the IETF Secretariat. It sponsors conferences and 
 workshops on the Internet and its technology, is establishing 
 liaison relationships with the International Telecommunication 
 Union (ITU) and Organization for International Standardization 
 (ISO), works with various United Nations agencies (e.g. UN 
 Development Program) to encourage the acquisition and use of 
 Internet facilities in technologically-emerging countries, and 
 participates in efforts to extend Internet services from univer-
 sity and research library communities to secondary school 
 systems. 
 
 The Internet Society does not operate any of the thousands of 
 networks that make up the Internet, but it assists service 
 providers by providing information to prospective users and 
 involves product developers and researchers in the evolution of 
 Internet technical standards. Corporate and individual, pro-
 fessional support for this organization is widespread and in-
 ternational in scope.
 
 
 High Performance Computing and Communication 
 
 The High Performance Computing  Act was signed into law late 
 in 1991. The original impetus for this legislation came from 
 then-Senator and now-Vice President Gore whose vision of 
 information superhighways limned the potential of a comput-
 ing and communications infrastructure which would permeate 
 and stimulate the government, business and private sectors of 
 the US economy. The promise of a vast new economic engine 
 equal to or larger than the engine sparked by the National 
 Highway Act of 1956 was a powerful incentive for this bill and 
 lies at the heart of the motivation for creating a new National 
 Information Infrastructure.
 
 One of the key elements of the HPC initiative is its National 
 Research and Education Network (NREN) program. Designed 
 to extend the performance envelope of networking into billion 
 bit per second  (gigabit) territory and to extend the scope of 
 access to a larger segment of the research and education 
 communities, the effort spawned a major research program on 
 gigabit networking. ARPA and NSF jointly funded an effort, or-
 ganized by the Corporation for National Research Initiatives, to 
 establish multiple gigabit testbeds across the United States. 
 The program is highly leveraged, involving major contributions 
 from the computing and communications industries as well as 
 several of the national laboratories  and major research uni-
 versities . 
 
 An important focus of the gigabit testbed program is to dis-
 cover by experimentation which technologies and applications 
 are likely to form the core of the high performance communi-
 cation systems of the future. The deep involvement of industry 
 is intended, in part, to assure that the results take into ac-
 count the plans and capabilities of the private sector. Such 
 partnerships among government, industry and academic insti-
 tutions form a bedrock upon which new national infrastruc-
 ture can be founded.
 
 The vision of the NREN component of the HPC effort begins 
 with the existing US component of the global Internet. Under 
 the NREN program, key parts of the US Internet have been 
 extended to operate at 45 million bits per second (in particular 
 the NSFNet) and procurement of higher speed services by DOE 
 and NASA is in progress. The gigabit testbed program is en-
 abling the early availability of very high speed network tech-
 nology and the results of the program will help to determine 
 the architecture and technology of even higher capacity ser-
 vices. The NSFNet initiative, which began in 1986, has also led 
 to the creation of dozens of new Internet service providers, in-
 cluding a number of for-profit networks offering unrestricted 
 Internet service to all who desire it. 
 
 Another fundamental motivation for the high performance 
 networking component of HPC is the intense investment by the 
 principal interexchange and local exchange telecommunica-
 tions carriers in the US in the use of optical fiber in their net-
 works. Capable of supporting operation in the billions of bits 
 per second, the optical networks form the strands from which 
 a national gigabit fabric can be woven. Investments by local 
 exchange carriers and cable companies to increase the capac-
 ity of the lines reaching business and residential customers 
 make it possible to envision a time when very high capacity 
 services can be supported on an end-to-end basis.
 
 The far-sighted vision of the HPC effort, together with the ex-
 plosive growth of the Internet and basic communications fa-
 cilities resulting from private sector initiatives, have set the 
 stage for a dramatic new step in the evolution and convergence 
 of computing and communication: the creation of a National 
 Information Infrastructure.
 
 INFRASTRUCTURE
 
 Information Infrastructure is the Rcommon groundS on which 
 computer-based products and services depend to achieve 
 commonality and interoperability. Included in infrastructure 
 are technical standards and the organizations and procedures 
 through which they are developed; communication services 
 and the physical, human and organizational resources needed 
 to deploy, maintain and operate them; legal and regulatory 
 frameworks which encourage cooperative development of pre-
 competitive technology, foster the protection of computer-ac-
 cessible intellectual property, the protection of privacy, and 
 support the conduct of electronic commerce; widely available 
 computer software for many hardware and operating system 
 platforms establishing ubiquitous and interoperable comput-
 ing environments in which applications can be embedded. 
 Infrastructure supplies the raw material out of which limitless 
 applications may be constructed. 
 
 Some of the characteristics which mark elements of infrastruc-
 ture include: ubiquity, expandable capacity, simplicity of use, 
 applicability to many uses and broad affordability. A function-
 ing information infrastructure will lower technical and eco-
 nomic barriers to the introduction of computer-based products 
 and services. It will simplify the discovery and ordering of 
 products and services as well as billing for their use or acqui-
 sition. It will also facilitate the day-to-day operation of busi-
 nesses, government, education, health care and all the myriad 
 activities that rely increasingly on the use of computer and 
 communication technology to accomplish their objectives.
 
 Infrastructure has an enabling character. The highway system 
 enabled the suburban housing boom and convenient, door to 
 door delivery of goods. Of course, it also stimulated the auto-
 mobile industry and travel. The power generation and distri-
 bution system enabled the facile application of fractional 
 horsepower motors and a vast array of other electrical appli-
 ances wherever they were needed. 
 
 Infrastructure development is almost always preceded by criti-
 cal inventions which motivate the need for the infrastructure. 
 The light bulb preceded and motivated the need for power gen-
 eration and distribution. The invention of the internal com-
 bustion engine and its application in automobiles motivated 
 the need for better roads, service stations, gasoline refining 
 and distribution. Once the roads were in place, their ubiquity 
 and easy accessibility stimulated the production of a vast ar-
 ray of different vehicles, all designed to conform to certain 
 common constraints (size, height, weight) so as to be usable on 
 most of the roads in the system.
 
 The computer is the automobile of the information infrastruc-
 ture. Laptops are the sports cars; desktops are the sedans; 
 supercomputers are the formula 1 racing engines; and gigantic 
 mainframe data storagesystems are the 18 wheelers. The local 
 access networks form the neighborhood streets; high capacity 
 computer networks are the superhighways; and circuit, cell 
 and packet switching systems form the complex interchanges.
 
 Just as vehicles on the road can be filled with an endless 
 variety of people and products performing a multitude of 
 services, software applications fill the empty computing vessels 
 to create the new products and services of the information 
 infrastructure. Communication protocols and standards form 
 the rules of the road. When traffic jams and accidents occur, 
 we call on emergency services to assist. The same may prove 
 true for the information infrastructure when viruses  infect the 
 system or other software and/or hardware failures occur; we 
 will need comparable emergency assistance to restore critical 
 services and functions.
 
 The Electronic Frontier Foundation speaks of computers and 
 computer networking as a frontier in cyberspace. This is an 
 interesting and apt analogy, given the relative immaturity of 
 both technologies. Despite the apparent sophistication of to-
 dayUs computers, networks and software, their application has 
 barely scratched the surface of the latent possibilities. The no-
 tion of frontier raises images of boundaries and limits. But cy-
 berspace is a virtual place. It is created out of software, mak-
 ing cyberspace an endlessly expandable environment. 
 
 Information is, itself, an infinitely renewable resource to be 
 harvested, shaped, applied and recycled. The products and 
 services which can be built atop the computer and communi-
 cation infrastructure simply have no logical limits. It is this 
 ceaselessly changing, growing, transmuting information re-
 source which will fuel the economic engine of the information 
 infrastructure. 
 
 INFORMATION INFRASTRUCTURE FORMATION
 
 The technical challenges to be overcome in creating a national 
 information infrastructure may only be overshadowed by some 
 of the legal and policy problems. Taking the easier ones, first, 
 it should be apparent that standards for the exchange of a va-
 riety of types of information (data) are essential. The value of 
 infrastructure is that providers of two services which must in-
 terwork do not have to make bilateral agreements with every 
 partner if appropriate technical standards are developed which 
 enable such interworking. In the case of program (software) 
 interworking, common representations of shared information 
 must be agreed upon so that software developers can be 
 reasonably assured that, if they follow the protocols, their 
 application programs will interwork with each other.
 
 A variety of high and low-level standards are needed for 
 representation of digital documents; information retrieval 
 queries and responses;remote program interactions; financial 
 or other commercial transactions; privacy, integrity and 
 authenticity preservation; and a plethora of application-
 specific standards for information interchange. These 
 representations need to include the capability for a wide range 
 of media, including sound and pictures. There are a number of 
 representations available for encoding these various media, 
 but there is not yet widespread agreement on a common set. 
 Consequently, we are still some distance away from a workable 
 information infrastructure. 
 
 The applications that can be supported on a suitable 
 information infrastructure are limited only by imagination and 
 creativity. Examples include health care support (e.g., patient 
 information, prescription databases, digitized X-Rays and MRI 
 scans), remote consultation); education (classrooms without 
 walls, using the information infrastructure to receive 
 instruction, explore digital libraries and work with distant 
 partners), manufacturing, provision of government 
 information, and support for electronic commerce (e.g., order 
 entry, electronic or physical delivery of products, electronic 
 payments, product specifications).
 
 An important element of Internet growth is the typical pricing 
 strategy of service providers: flat rates based on the bandwidth 
 of the lines used to access the Internet. Unlike some 
 commercial email and other public data network service 
 providers, Internet service providers have not charged by the 
 Rpacket.S Many believe that this policy has had a major, 
 positive effect on the growth of the network because users had 
 little uncertainty with respect to annual costs for use of the 
 system. 
 
 ANECDOTES FROM THE 21ST CENTURY
 
 Those of us who have lived with the Internet since its inception 
 have been living in what will be common in the next century. 
 
 In preparation for this testimony, I sent a brief message out on 
 the Internet to hundreds of thousands of people who make 
 daily use of the network. I asked them to offer their thoughts 
 on points they considered important to make. Within hours, I 
 had thousands of responses, not just from domestic sources 
 but from all over the world. Without the infrastructure of the 
 Internet, such a question would not have been worth asking 
 since the answers would have taken far too long to receive, 
 and I could not have applied available computer cycles to sort 
 and sift the resulting responses. My correspondents were al-
 most uniformly enthusiastic about the prospects for national 
 and global information infrastructure. The following were some 
 of the points they made: 
 
 o	The Internet Society newsletter is created by correspondents 
 all over the globe who email their stories to the editors in 
 Los Angeles, California and Reston, Virginia. The whole 
 process takes places over a few days, with all the editing 
 taking place on-line. Each issue is available on-line within 
 minutes of completion through a variety of information 
 services on the Internet.
 
 o	A professor at the University of Southern Louisiana offered 
 to teach a class on Internet use through email on the 
 Internet. 15,000 people applied to take the class! This is 
 distance-learning with clout!!
 
 o	A blind student of Shakespeare asked on the net, where 
 can I get on-line copies of the plays, itUs the only convenient 
 way for me to read them. He uses a text-to-speech and 
 text-to-Braille device. He got back many pointers to on-line 
 archives around the world.
 
 o	When President Clinton and Vice President Gore were visit-
 ing Silicon Graphics in CaliforniaUs Silicon Valley, the audio 
 and video of the speeches were  packetized and multicast
 on the Internet to hundreds of participating sites. This is an 
 example of the nascent potential in combining all forms of 
 communication in computer-mediated form.
 
 o	Internet Talk Radio recently made the front page of the New 
 York Times - it is another example of the convergence of 
 digital computer communications and mass media.
 
 o	When I needed information about the Spratley Islands, I 
 just turned to the CIA World Fact Book made available on 
 the  Internet by the University of Minnesota.
 
 o	A technical problem arose with an application running on 
 an Apple Macintosh. The user sent an email message to 
 several distribution lists and news groups and got back 
 helpful responses, some in minutes, from France, Germany, 
 Italy, Australia, India, Singapore, Canada, England, 
 Norway, United States, Finland, ... well, you get the idea. 
 Cyberspace has common interest groups that transcend 
 national boundaries.
 
 o	The city of Wellington, New Zealand, has a computer on the 
 Internet. It has placed there a wide range of information of 
 interest to potential visitors and tourists, local residents, 
 and Internet explorers. There is strong historical evidence 
 that the rich personal interactions that take place on the 
 Internet contribute to a marked increase in face-to-face 
 meetings requiring travel, so the local government is to be 
 commended for its foresight.
 
 
 IMPORTANT THINGS THE US GOVERNMENT CAN DO
 
 Offered below is a representative set of comments and sugges-
 tions received over the course of a few days from the Internet 
 community. Because of its source, it has an obvious Internet 
 bias to it, but despite that, I think these ideas are worthy of 
 serious consideration.
 
 1. Invest in the development of pre-competitive software and 
 technology which is made available to industry for competitive 
 productizing. Historically, universities have developed sample 
 implementations of new Internet software which is then used 
 as the basis for product and service development in industry. 
 Occasionally, industry will sponsor development of freely 
 available software which can be readily distributed throughout 
 the network, creating a kind of mini-infrastructure on which 
 more elaborate, for-profit products and services may be based. 
 In both cases, new businesses are often created to service the 
 market created. 
 
 2. Foster and facilitate the development of technical informa-
 tion standards through cooperative efforts among industry, 
 academia and government. The procedures of the Internet 
 Engineering Task Force are a model for expeditious and 
 effective development because the standards must be im-
 plemented by multiple parties and shown to interoperate be-
 fore they are eligible for standardization.
 
 3. Revisit COCOM and US-specific policy on the application, 
 use, and export of the RSA and DES cryptographic technology. 
 Present policies inhibit the creation of particular aspects of 
 global information infrastructure and, in some cases, US 
 companies are placed at a severe disadvantage relative to 
 competitors. These technologies are key elements [no pun 
 intended] in solving problems of intellectual property protec-
 tion and management and  electronic commerce in an on-line 
 environment.
 
 4. Adopt the TCP/IP protocols as coequal with the OSI proto-
 cols in the US GOSIP specifications (which describe the profile 
 of protocols that are recommended for use in Government pro-
 curements). The TCP/IP protocols are already in wide-spread 
 use within the government, so this change would merely 
 acknowledge reality.
 
 5. Move aggressively to support library access to Internet ser-
 vices, with particular attention to rural community access.
 
 6. Institute training programs to educate the nationUs sec-
 ondary school teachers and support staff on the use of com-
 puter and communication technology in the classroom. 
 Subsidize access where this is necessary. Involve state educa-
 tional infrastructure in this effort. Review highly successful 
 state-level programs as input to national policy development.
 
 7. Stimulate the development of quality software for use in 
 curricula at all levels. Consider programs to develop pre-pro-
 duction software and make it available at no charge, leveraging 
 the creativity of national laboratories, universities and individ-
 uals. 
 
 8. Mandate public, on-line availability of government-produced 
 or sponsored information and allow the private sector to add 
 value and resell it. For example, the White House is providing 
 on-line access to unclassified executive orders and text of 
 speeches by senior administration officials within hours  (and 
 sometimes minutes) of their release.
 
 9. Foster programs to explore and experiment with the use of 
 information infrastructure to support telecommuting. Not only 
 as an energy-saving, pollution-reducing step, but a major tool 
 for implementing the Americans with Disabilities Act provi-
 sions. It was noted that home-employment and suburban 
 satellite offices illustrate that electronic communication infras-
 tructure is approaching the importance of the more concrete 
 (pun intended) traffic highways.
 
 10. Make use of the Internet to harvest information from its 
 tens of thousands of public databases as an adjunct to intelli-
 gence gathering and analysis by various agencies of the federal 
 government. Make available government unclassified 
 information and analysis via the Internet as a contribution to 
 the community (e.g. CIA World Fact Book).
 
 11. Get all branches of the government on electronic mail and 
 support the ability to exchange email with the public.
 
 12. Encourage the deployment of ISDN services. 
 
 13 Foster the development of shared scientific databases  and 
 collaboration tools which can be used to enhance the utility of 
 research results and provide access to raw as well as analyzed 
 data to support corroborating research. 
 
 14. Make use of the Internet to build bridges among the 
 scientific, research, academic and educational communities.
 
 15. Link the museums of the world on the Internet.
 
 16. Avoid the unintentional creation of a gap between 
 information rich and poor. The concern here is that private 
 sector entrepreneurship may conflict with freedom of access to 
 public information. Note that the potential gap problem applies 
 equally as well to individuals and to large and small cor-
 porations!
 
  17. Position national policy so that the government need not 
 subsidize network service providers. Rather, subsidize users, 
 where this is appropriate. By this means, remove most of the 
 Appropriate Use Policy dilemmas from consideration at the 
 network level. It is not technically possible today, using exist-
 ing capabilities, to distinguish different classes of traffic at the 
 network level. [There were a few people who thought the gov-
 ernment should build the National Information Infrastructure 
 but the vast majority who commented on this preferred private 
 sector service provision, albeit under government policies 
 which assure ubiquity of service, full interconnection of all 
 service providers and reasonable costs].
 
 18. Find a way to make advertising permissible and useful in 
 the National Information Infrastructure.
 
 
________________________________________________________________________


Subject: Letter to Congress/RSA + DES
Date: Tue, 13 Apr 93 20:26:01 -0400
Sender: cprince
From: "Vinton G. Cerf" <vcerf@CNRI.Reston.VA.US>
Message-Id:  <9304132026.aa01197@IETF.CNRI.Reston.VA.US>



Dr. Vinton G. Cerf
3614 Camelot Drive
Annandale, VA 22003-1302

11 April 1993
The Honorable Timothy Valentine
Committee on Science, Space and Technology
Subcommittee on Technology, Environment and Aviation
House of Representatives
Rayburn House Office Building

Dear Chairman Valentine:

I recently had the honor of testifying before the 
Subcommittee on Technology, Environment and Aviation 
during which time Representative Rohrabacher (R, 
California) made the request that I prepare 
correspondence to the committee concerning the 
present US policy on the export of hardware and 
software implementing the Data Encryption Standard 
(DES) and the RSA Public Key encryption algorithm 
(RSA).

As you know, the DES was developed by the National 
Institute for Standards and Technology (NIST) in the 
mid-1970s, based on technology developed by 
Internatonal Business Machines (IBM). The details of 
the algorithm were made widely available to the 
public and considerable opportunity for public 
comment on the technology was offered. In the same 
general time period, two researchers at Stanford 
University (Martin Hellman and Whitfield Diffie) 
published a paper describing the possible existence 
of mathematical functions which, unlike the 
symmetric DES algorithm, could act in a special, 
pairwise fashion to support encryption and 
decryption. These so-called "public key algorithms" 
had the unusual property that one function would 
encrypt and the other decrypt -- differing from the 
symmetric DES in which a single function performs 
both operations. The public key system uses a pair 
of keys, one held private and the other made public. 
DES uses one key which is kept secret by all parties 
using it.

Three researchers at MIT (Rivest, Shamir and 
Adelman) discovered an algorithm which met Hellman 
and Diffie's criteria. This algorithm is now called 
"RSA" in reference to its inventors. The RSA 
technology was patented by Stanford and MIT and a 
company, Public Key Partners (PKP), created to 
manage licensing of the RSA technology. A company 
called RSA Data Security, Inc., was also formed, 
which licensed the technology from PKP and markets 
products to the public based on the technology.

The current policy of the United States places DES 
and RSA technology under export control. Because 
cryptography falls into the category of munitions, 
it is controlled not only by the Commerce Department 
but also by the State Department under the terms of 
the International Traffic in Arms regulations. 
Despite the public development of both of these 
technologies and their documented availability 
outside the United States over the last 15 years, US 
policy has been uniformly restrictive concerning 
export licensing. 

As the United States and the rest of the world enter 
more fully into the Information Age in which digital 
communications plays a critical role in the global 
infrastructure, the "digital signature" capability 
of public key cryptography is a critical necessity 
for validating business transactions and for 
identifying ownership of intellectual property 
expressed in digital electronic forms.

Registration and transfer of intellectual property 
rights in works which can be represented in digital 
form will be cenral factors in the national and 
global information infrastructure. A number of 
parties are exploring technical means for carrying 
out rights registration and transfer, making use of 
public key cryptography as a basic tool. 

In addition, there is a great deal of current work 
on electronic mail systems which support privacy by 
means of encryption and support authenticity by 
means of digital signatures. One of these systems, 
developed in the Internet environment I mentioned in 
my testimony, is called Privacy-enhanced Mail (PEM) 
and makes use of DES, RSA and some other special 
"hash" functions which are integral to the 
production of digital signatures.

For these various systems to be compatible on an 
international basis, it would be very helpful for 
the cryptographic components to be exportable on a 
world-wide basis. A number of vendors make produces 
relying on these technologies within the United 
States but often find it very difficult to engage in 
international commerce owing to the export licensing 
required for these technologies. Ironically, the 
technology appears to be widely available outside 
the US and also outside the COCOM countries, so US 
firms face both competition outside the US and 
export inhibitions in their attempts to develop 
worldwide markets.

There are  many valid national security reasons for 
limiting the export of cryptographic capabilities, 
since these technologies may aid an opponent in time 
of war or other conflict. Perhaps just as important, 
US intelligence gathering capability can be eroded 
by the availability of high grade cryptography on a 
worldwide basis. Recently, it has also been alleged 
that the world-wide availability of cryptography 
would also seriously impede US drug enforcement and 
anti-crime efforts. While these reasons seem 
sufficient, many have pointed out that the 
widespread accessibility to the detailed 
specifications of DES and RSA and availability and 
existence of software and hardware outside the US 
have long since done whatever damage is going to be 
done in respect of warfighting, crime or drug 
potential. This line of reasoning leads to the 
conclusion that our policies only inhibit legitimate 
commerce, but have little impact on the other 
concerns expressed.

As in all such controversy, there is often some 
truth on both sides. The National Institutes of 
Standards and Technology (NIST), has offered 
alternative digital signature capability. Technical 
assessments of the alternative have turned up 
weaknesses, in the opinions of some experts. There 
is not yet an alternative to DES, unless it is to be 
found in NSA's Commercial Crypto Evaluation Program 
(CCEP) in which NSA proposes to provide algorithms 
which are implemented in hardware by industry and 
made available for civilian use. As I understand 
this program, NSA does not intend to release any 
details of the algorithms, leaving open questions 
about the nature and strength of the technology. 
Some experts will persist in the belief that such 
offerings have weaknesses which are deliberately 
built in and hidden (so-called "Trojan Horses") 
which will allow the agency to "break" any messages 
protected by this means.

The critics complained loudly that the reasoning 
behind the design of certain parts of the DES 
algorithm (specifically the "S-boxes") was never 
made public and therefore that the algorithm was 
suspect. In fact, the DES has proven to be very 
strong - indeed, it may be that very fact which 
makes it so unpalatable in some quarters to permit 
its unrestricted export. It may be that the CCEP 
technology offered is satisfactory, but this is hard 
to tell without knowing more about its provenance. 

Presuming the wide availability of both DES and RSA 
technology, it seems to me appropriate and timely to 
re-examine US export control policy regarding these 
two algorithms. In all probability, any such review 
will require some classified testimony which will 
have to be heard in confidence by cleared members of 
your committee. I sincerely hope that the outcome 
will be favorable to use by US industry in 
international commerce, but even if the outcome 
results in continuation of present policy, it is 
timely to make such a review, in my opinion.

Sincerely,


Vinton G. Cerf








________________________________________________________________________
________________________________________________________________________

The SURFPUNK Technical Journal is a dangerous multinational hacker zine
originating near BARRNET in the fashionable western arm of the northern
California matrix.  Quantum Californians appear in one of two states,
spin surf or spin punk.  Undetected, we are both, or might be neither.
________________________________________________________________________

Send postings to <surfpunk@osc.versant.com>, subscription requests 
to <surfpunk-request@osc.versant.com>.  MIME encouraged.  
Xanalogical archive access soon.  Call the Helpdesk at 404-894-7173.
________________________________________________________________________
________________________________________________________________________






	atdt 8942195
	CONNECT 2400
	
	Checking authorization, Please wait...
	Welcome to Georgia Tech's TCP Service.
	
	This network system is for the use of authorized users only.
	Individuals using this network system without authority, or in
	excess of their authority, are subject to having all of their
	activities on this system monitored and recorded by system
	personnel.
	
	In the course of monitoring individuals improperly using this
	system, or during system maintenance, the activities of authorized
	users may also be monitored.
	
	Usage of this network implies the user's consent to such monitoring,
	The user hereby is advised that if such monitoring reveals possible
	evidence of criminal activity, system personnel may provide the
	evidence of the monitored activity to law enforcement officials.
	
	To get a menu type Help or ?
	If you have any difficulty call the Helpdesk at 894-7173.