|
Go vernmental Restrictions on the Development and Dissemination of Cryptographic Technologies: The Controversy Over NIST Standardization on DSS and Related Intellectual Property Issues Twentieth Annual Telecommunications Policy Research Conference Solomons Island, Maryland September 12 - 14, 1992 David L. Sobel Computer Professionals for Social Responsibility 666 Pennsylvania Avenue, S.E. Washington, DC 20003 (202) 54 -9240 Internet: sobel@washofc.cpsr.org On August 30, 1991, the National Institute of Standards and Technology ("NIST") published a notice in the Federal Register proposing a federal digital signature standard ("DSS"). The NIST proposal, and details of the standard setting process that recently have come to light, raise substantial questions concerning the future of U.S. information policy in general and cryptographic technology in particular. The DSS provides a means of authenticating the integrity of electronically transmitted data and the identity of the sender. According to NIST, the standard is "applicable to all federal departments and agencies for the protection of unclassified information, " and is "intended for use in electronic mail, electronic funds transfer, electronic data interchange, software distribution, data storage, and other applications which require data integrity assurance and data origin authentication."/ /1/ With governmental and commercial transactions increasingly dependent upon the reliability and integrity of such telecommunications applications, authentication techniques are in dispensable. As NIST's Associate Director for Computer Security, Lynn McNulty, has said, digital signature technology "will be an important part of re-engineering the business practices that we've used for so many years in government and other parts of society. ... The signature will be absolutely critical in certain areas where, because of statute or practice, we currently require a written signature on paper."/ /2/While use of the proposed DSS would be mandatory only for federal agencies, its adoption by the government would have a su bstantial impact on the private sector. Vendors will need to offer products for the government that meet the federal standard and are thus likely to design all of their products to conform to its re qu irements. /3/ Thus, the Data Encryption Standard ("DES"), which was adopted by NIST's pr edecessor, the National Bureau of Standards, as a government standard in 1977, was quickly adopted by the American National Standards Institute and became the worldwide industry standard. In its Federal Register notice, NIST stated that it had selected the DSS after evaluating several alternatives and that the agency had "followed the mandate contained in section 2 of the Computer Security Act of 1987 that NIST develop standards and guidelines to ' ... assure the cost-effective security and privacy of sensitive information in Federal systems. '"/4/ The reference to the Computer Security Act was significant because, in enacting the statute, Congress sought to vest civilian computer security authority in NIST and to limit the role of the National Security Agency ("NSA"). /5/ When Congress enacted the le gislation, it expressed particular concern that NSA, a military in telligence agency, would improperly limit public access to in formation in a manner in compatible with civilian standard setting. /6/ The House Report notes that NSA's natural tendency to restrict and even deny access to in formation that it deems important would disqualify that agency from being put in charge of the protection of non-national security in formation in the view of many officials in the civilian agencies and the private sector. NSA's reputation for excessive secrecy is well-known and well- deserved. In the years following the Second World War, the making and breaking of secret codes became in creasingly important to the U. S. national security es ta blishment. /7/ The National Security Agency, based at Fort George C. Meade, Maryland, was created by order of President Truman in 1952 and tasked with primary responsibility for co mm unications in telligence (COMINT) - - intercepting and deciphering the secret communications of foreign governments. By some accounts, NSA is capable of acquiring and automatically scanning most, if not all, of the electronic messages that enter, leave or transit the United States. /8/ The agency itself refuses to confirm or deny published information concerning its capabilities. In the 40 years since its creation, NSA has enjoyed a virtual monopoly in the area of cryptographic technology within the United States. Believing its mission requires that such technology be closely held, the agency has actively sought to maintain its monopoly and to suppress the private, non-governmental de velopment and dissemination of cryptography. The motivation behind NSA's efforts to suppress cryptographic know-how is obvious -- as the ability to securely encrypt in formation becomes more widespread, the agency's collection work becomes more difficult and time-consuming. NSA's efforts to maintain its monopoly have extended into the area of export and trade policy. The export of software products containing cryptographic features is governed by the International Traffic in Arms Regulations ("ITAR"), administered by the Office of Defense Trade Controls at the Department of State. /9/ In addition to software products sp ecifically designed for military purposes, the ITAR "Munitions List" includes a wide range of commercial software containing encryption capabilities. /10/ Under the export licensing scheme, the NSA reviews license applications for "information security technologies" covered by ITAR./11/ While the agency denies the charges, industry representatives claim that NSA-imposed restrictions are stifling innovation in an area that is in creasingly important to the computer industry. They further contend that the controls on the export of encryption technology are forcing U.S. companies to lose markets to foreign competitors. As economics writer Robert Kuttner has noted, restricting the ability of domestic manufacturers to commercialize and export new technologies no longer assures that advanced technologies will stay out of unfriendly hands: it only diverts the business to Japanese or European ma nu facturers who don't share America's view of technological security. This has the most far-reaching implications for American competitiveness, because it is precisely the most militarily sensitive technologies -- super- computers, semiconductor architecture and fabrication, fiber-optics, advanced machine tools, cryptography -- that are also key to the competitiveness of America's commercial industry. /12/ Considerations of "national security" can also play a role in the patent system and inhibit the technological innovation that system is intended to foster. The Invention Secrecy Act, a little-known provision enacted in 1952 (the year of NSA's birth), authorizes the Commissioner of Patents and Trademarks to withhold a patent and order that aninvention be kept secret "for such period as the national interest requires." Violation of a patent secrecy order is punishable by two years' imprisonment and a $10,000 fine. /13/ As a Justice Department representative told a congressional subcommittee in 1980, "what the Invention Secrecy Act says in effect is that there are some inventions that are too dangerous to be disclosed in the way that a patent normally discloses the invention ...." /14/ The number of secrecy orders issued under the Invention Secrecy Act remained relatively constant from 1952 until 1979. Since then, the number of active secrecy orders has increased: a total of 4,685 orders were in effect in 1986 compared with 3,513 in 1979. /15/ While in formation concerning the substance of patent secrecy orders is obviously difficult to obtain, cryptographic technology clearly has been the subject of many such orders issued at the insistence of NSA. /16/ These re strictions in effect exempt cr yptography from the underlying purpose of the patent system: to "stimulate ideas and the eventual de velopment of further significant advances in the art." /17/ NSA's objective has been to suppress, rather than stimulate, advances in civilian cr yp tography. As noted, Congress was cognizant of NSA's propensity toward excessive secrecy when it passed the Computer Security Act and sought to remove the impediments to technological innovation in the civilian sector. Congress sp ecifically intended to "greatly restrict" the influence of the military in telligence agencies "while at the same time providing a statutory mandate for a strong security program headed up by [NIST], a civilian agency." /18/ The House Report on the legislation noted that NSA's involvement in the development of civilian computer standards could have a chilling effect on the vigorous research and development that is on-going in the academic community and our domestic computer industry. This industry has been one of the most viable segments of our economy. Its rapid technological advances have been due in large part to being free to openly exchange ideas without government interference. NSA's inherent tendency to classify everything at its highest level is bound to conflict with this broader goal. The de velopment of the digital signature standard is, to a large extent, the first real test of the Computer Security Act. Unfortunately, in formation that has recently come to light suggests that the barrier Congress sought to erect between the civilian and military agencies can easily be breached. The Federal Register notice announcing the proposed DSS last August made no explicit reference to NSA and clearly implied that NIST had developed the standard. In an effort to analyze the federal standard setting process, Computer Professionals for Social Responsibility ("CPSR") submitted a Freedom of In formation Act request to NIST for records related to DSS. In response to the request, the agency initially asserted that all of the materials related to the evaluation of technology in choosing a digital signature standard for computer security are documents that are advisory and pr ed ecisional in nature, and are therefore exempt from disclosure under [FOIA]. In addition, some of the materials pertain to pending patent ap plications and are withheld under [FOIA] ... [and] are also protected under the provisions of [patent law]. /19/ After CPSR filed suit in federal court to compel disclosure of the DSS materials, NIST ac knowledged for the first time that the bulk of relevant documents in its possession in fact originated with NSA - - 142 pages of material were created by NIST while 1,138 pages were created by NSA. /20/ For reasons not explained by the agency, NIST dropped its FOIA exemption claims and released 140 pages of its own material and referred the remaining documents to NSA for processing. In response to news media scrutiny, NSA has now also acknowledged the leading role it played in developing the proposed DSS. In a letter to MacWeek magazine, NSA's Chief of In formation Policy acknowledged that the agency "evaluated and provided candidate algorithms including the one ultimately selected by NIST." /21/ While NSA steadfastly insists that its role in developing the digital signature standard is consistent with the letter of the Computer Security Act, the fact that the agency actually "provided" the DSS algorithm to NIST raises questions as to whether the spirit of the legislation has been followed. At least one authoritative observer does not believe it has. Rep. Jack Brooks, who was a driving force behind the Computer Security Act while serving as Chairman of the House Government Operations Committee (and who now serves as Chairman of the Judiciary Co mmittee), recently held hearings on DSS. He noted that under the Computer Security Act of 1987, the Department of Commerce [through NIST] has primary responsibility for establishing computer security standards including those dealing with cryptography. However, many in industry are concerned that in spite of the Act, the NSA continues to control the Commerce De partment's work in this area. For example, Commerce (at the urging of the National Security Agency) has proposed a "digital signature standard" (DSS) that has been severely criticized by the computer and telecommunications industry. /22/ The criticism of DSS alluded to by Rep. Brooks goes to the heart of the matter -- whether NSA's in volvement in the standard setting process has resulted in the adoption of a flawed standard. Comments submitted to NIST by industry and academic cryptography experts were overwhelmingly critical of the proposed DSS. The vast majority of these experts expressed the view that the proposed standard is inferior to the established and widely used RSA public-key te chnology, which many have ch ar acterized as the de facto international standard. /23/ Professor Martin Hellman of Stanford University, the co-inventor of publi-key cryptography, wrote that he was "deeply concerned by faults in the technical specifications of the proposed DSS and by its development process." He noted that NIST has lost considerable credibility with the non-military cr yp tographic research community and, unless the revision process of DSS is carried out in a much more rapid and open fashion, NIST is likely to become totally in effective in the setting of cryptographic standards. /24/ NIST documents released to CPSR under the Freedom of Information Act suggest that the agency's own experts recognized the superiority of the existing RSA technology and its status as an emerging de facto authentication standard. An internal NIST evaluation of existing technology conducted in late 1989 noted that the RSA technique is "widely known and widely used" and is "a most versatile public-key cryptosystem." /25/ Indeed, IEEE Spectrum magazine recently reported that the RSA technique had been readied by NIST as the [federal] standard for several months and was dropped in December 1989 with no al ternative in sight. Not until early spring of 1991 did NSA present the algorithm of choice to NIST. Even on background, sources declined to detail reasons behind the decision, although one mentioned that legitimate national security factors had come into play. /26/ The questions surrounding DSS -- both technical and procedural -- are so significant that even NIST's Computer System Security and Privacy Advisory Board has expressed reservations about the proposed standard. The Board has called for a "national level public review" of cryptography policy and has deferred approval of the proposed DSS "pending progress on the national review." /27/ The Undersecretary of Commerce for Technology, Dr. Robert M. White, agreed with the Board's recommendation and called upon NIST to organize a public workshop on cryptography issues. A three-day session is scheduled to begin on September 15 at NIST's headquarters in Gaithersburg, Maryland. This review of national cryptography policy comes at a critical time. In the Cold War atmosphere that prevailed for 45 years, cryptography was seen as a vital national interest and most policymakers were willing to permit the National Security Agency and the military establishment to maintain a monopoly in the field. With the end of the Cold War, the military and intelligence considerations have changed. Indeed, Congress recognized the need for reform when it enacted the Computer Security Act in 1987, even before the demise of the Soviet Union. Electroniccommunications are now widely used in the civilian sector and have become an integral component of the global economy. Computers store and exchange an ever increasing amount of highly personal in formation, including medical and financial data. In this electronic environment, the need for privacy- enhancing technologies is apparent. Communications applications such as electronic mail and electronic funds transfers require secure means of encryption and authentication -- goals that can be achieved only through the robust development and dissemination of cryptographic technology free of military interference. To that end, the role of the National Security Agency in civilian cryptography should be eliminated and NIST should be granted the authority and resources to assist, rather than hinder, the development of civilian cryptography in the United States. *F ootnotes* 1 56 Fed. Reg. 42981 (August 30, 1991). 2 "Lynn McNulty on Infosecurity Standards: A Talk with NIST's Protection Point Man, " ISPNews, (September/October 1992) at 6. 3 See Wright, The Law of Electronic Commerce (Little, Brown 1991) at 192-193. 4 56 Fed. Reg. 42981 (August 30, 1991). 5 See "The Computer Security Act of 1987 (P.L. 100-235) and the Memorandum of Un de rstanding Between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA)," the Subcommittee on Le gislation and National Security, Committee on Government Operations, House of Representatives, May 4, 1989 (testimony of Marc Rotenberg, CPSR Washington Office Director) reprinted in Military and Security Control of Computer Security Issues, 101st Cong., 1st Sess. (1989) at 80. 6 H. Rep. No. 153 (Part 2), 100th Cong., 1st Sess. 21 (1987). 7 See generally Kahn, The Codebreakers (Macmillan 1967). 8 Burnham, The Rise of the Computer State (Random House 1980), at 126. See generally Bamford, The Puzzle Palace (Houghton Mifflin 1982); "The National Security Agency and Fourth Amendment Rights," Hearings before the Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, 94th Cong., 1st Sess. (1975). 9 22 CFR Parts 120- 130. 10 See generally, Greguras and Black, "The Encryption Export Maze: Red Tape, Requirements, Re strictions," INFOSecurity Product News (June 1992). 11 Adam, "C ry ptography = Privacy?," IEEE Spectrum, August 1992 at 34 (reprinted statement of NSA). 12 Kuttner, "Spooks and Science: An American Dilemma," The Washington Post, August 20, 1989, at B8. See, also Kuttner, "How 'National Security' Hurts National Competitiveness, " Harvard Business Review, January - February 1991, at 140. 13 35 U.S. C. $ 181 et seq. 14 "The Government's Classification of Private Ideas," Hearings before a Subcommittee of the House Committee on Government Operations, 96th Cong. , 2d Sess. (1980) (hereinafter cited as "Private Ideas") at 258 (testimony of H. Miles Foy, Office of Legal Counsel, Department of Justice). 15 Hausken, "The Value of a Secret: Compensation for Imposition of Secrecy Orders under the Invention Secrecy Act," 119 Military Law Review (Winter 1988) at 202 n.10 (446 new orders were issued in 1986 compared with 293 in 1979). 16 See "Private Ideas" at 406-431; see also Gilbert, "Patent Secrecy Orders: The Unconstitutionality of Interference in Civilian Cryptography under Present Procedures," 22 Santa Clara Law Review 325 (1982). 17 Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 481 (1974). 18 H. Rep. No. 153 (Part 2), 100th Cong., 1st Sess. 7 (1987). 19 Letter from NIST to CPSR dated September 11, 1991. 20 CPSR v. NIST, Civil Action No. 92-0972 (D.D.C.) (agency affidavits filed in support of motion to stay proceedings). 21 Letter from Michael S. Conn (NSA) to Mitch Ratcliffe (MacWeek), October 31, 1991. 22 Opening Statement of Rep. Jack Brooks, Threat of Foreign Economic Espionage to U.S. Corporations, House Judiciary Subcommittee on Economic and Commercial Law, May 7, 1992 at 2. 23 See, e.g., Comments submitted to NIST by Fischer In te rnational Systems Corp., dated November 26, 1991. See also "Debating Encryption Standards, " Co mm unications of the ACM, July 1992 at 34 ("After years of testing and proven re liability, RSA is now used by the majority of software makers around the world, including IBM, Apple, Lotus, Sun and Mi crosoft"). 24 Comments submitted to NIST by Professor Martin E. Hellman, dated November 12, 1991, reprinted in Communications of the ACM, July 1992 at 47-49. 25 Memorandum from Roy Saltman to Lynn McNulty dated December 22, 1989. 26 Adam, "Cryptography = Privacy?," IEEE Spectrum, August 1992 at 29. 27 Computer System Security and Privacy Advisory Board, Re solutions No. 1 and 3, March 18, 1992.