View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
August 28, 1997updated 03 Sep 2016 8:37pm

RSA OUT OF RUNNING IN IETF SECURE EMAIL STANDARDS RACE

By CBR Staff Writer

It appears that the tactics of internet security player RSA Security Inc to attempt to get its technology adopted by the Internet Engineering Task Force (IETF) has blown up in its face. At the start of last month the company, which is a subsidiary of Security Dynamics Inc, published its RC2 algorithm on its website to enable closer scrutiny by the IETF’s engineers. It said it was trying to get a Request for Comments (RFC) on the matter issued by the IETF, which never happened. But at the recent IETF meeting in Munich, the group bypassed RSA’s protocol, which includes the S/MIME standard for electronic messaging, because it is considered proprietary. RSA had said it had no intention of giving up the source code or the name when it published the spec. That sort of attitude does not go down well at the IETF, which generally does not adopt anything that is still encumbered by a patent held by a company requiring license fees. But as luck would have it, the 20 year-old patent on the Diffie-Hellman key management system runs out on September 6, after which it will be free for anybody to use. Rival security company Pretty Good Privacy Inc says it will step in with an implementation based on Diffie-Hellman for consideration by the IETF called Open PGP, to which PGP will claim no ownership. It is expected to be voted on next month, after which it could take anything up to two years to become an IETF standard. The discussion in Munich was under the auspices of the IETF’s IP security area working group. W. Diffie and M.E. Hellman published their paper called New directions in cryptography in 1976. RSA public key cryptosystem inventor Ron Rivest, the ‘R’ in RSA, developed RC2 eleven years later.

Content from our partners
Unlocking growth through hybrid cloud: 5 key takeaways
How businesses can safeguard themselves on the cyber frontline
How hackers’ tactics are evolving in an increasingly complex landscape

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU