Important News:SafeLogic's CryptoComply Achieves FIPS 140-3 Validation for 28 OEs and Receives Certificate #4781! Read the blog post!
The SafeLogic Blog
Certicom: The Key to Blackberry's Future?
September 5, 2013 •Walt Paley
Blackberry is for sale, and many are predicting that the key to any sale is the portfolio of encryption patents held by subsidiary Certicom. Boasting over 350 patents and patents pending worldwide total, including what is considered a near-monopoly on elliptic curve cryptography, Certicom is the subject of much interest. Unfortunately for Waterloo’s most famous product, it appears to be the fascination of journalists’ speculation more than investors’.
Is the commentary on the patent portfolio about the high value of elliptic curve cryptography? Or is it saying more about the relative worth of the rest of Blackberry’s holdings? Maybe both?
The biggest issue with the patents is this: who is going to pay strong licensing fees when there are plenty of other algorithms available, many of which are are able to be validated by NIST’s CAVP? I understand that elliptic curve is the shiny new toy, and the NSA has openly supported it, but even their own Suite B algorithms still include AES and SHA alternatives.
Pushing for ECC is an uphill battle with a challenging dependency and catch 22. In order to realize significant profits from the patents, elliptic curve cryptography must become a widespread standard. However, for it to become mainstream, it cannot be subject to licensing fees that create instantly prohibitive financials.
Think of alternative fuel. If Chevron owned the intellectual property for a fuel that was twice as efficient as gasoline, and a fraction of the cost to manufacture, they would make more money that we could count… right? Possibly. We didn’t factor in the demand. If Mercedes, BMW, Ford and Chevrolet received subsidies to develop new engines to run on this miracle fuel, (and probably were included in a profit sharing arrangement,) demand could be created. Then other manufacturers would likely adopt the new specs to meet changing demands and stay competitive.
Blackberry isn’t in a strong position to create this demand or to subsidize it, however, so I just don’t see the potential for organic growth that could justify it. Licensing fees would have to be relatively paltry to garner enough interest in the current climate.
What if the climate changed drastically? Last month at the Black Hat conference in Las Vegas, some researchers theorized that RSA and classic Diffie-Hellman could become obsolete within five years. This is more in the seemingly growing trend of Chicken Little activity in cryptography. Sure, it’s possible, but they are giving a lot of credit to potential accelerations in codebreaking technology.
Even in this case, licensing the patents would be a tough sell. One of those same doomsday researchers admits that the U.S. government would probably overturn Certicom’s patents for the sake of national interest. Alex Stamos, CTO of Artemis, figures that “if the cryptopocalypse happens, those patents are not going to last.”
So where does that leave Blackberry’s portfolio? Possibly gathering dust alongside Betamax tapes, HD DVD’s, and the Microsoft Zune. It was the right strategy to acquire Certicom in 2009, for $106 Million, but the demise of Blackberry’s core business may have submarined the market for their crypto patents.
Let’s entertain an alternate ending to this same story. Blackberry’s devices would have continued to accumulate market share. With a stranglehold on the government and private enterprise mobile device demand, Certicom would have earned its purchase price and then some, as elliptic curve cryptography was established as the standard. Other handset manufacturers and app developers would have been at the mercy of Blackberry to either license the ECC algorithms or fall by the wayside, incompatible with the incumbent.
With Apple showing weakness for the first time in years, Microsoft stumbling again with hardware, and Google continuing to remind everyone “Don’t Be Evil”, we should be happy that there is no single 800 pound gorilla in mobility. Otherwise, they might have wielded that power as Blackberry envisioned, and we’d all be forced to fall into line.
Thanks but no thanks. In reality, I see ECC as being relegated to local encryption, embedded in the device hardware manufactured by whoever buys the patent portfolio, unless it is released without royalties. Most folks are satisfied with current algorithm options and there is no obvious incentive to pay licensing fees.
So unless the landscape turns, I’ll take my chances with the ‘cryptopocalypse’ and wait to see how things pan out.
Walt Paley
Walter Paley is the VP of Communications for SafeLogic. He is responsible for strategy, content, marketing, and outreach. Walt has worked with a series of start-ups and companies in growth stages, including Nukona (acquired by Symantec), Qubole, Bitzer Mobile (acquired by Oracle), and TigerText, among others. An Alumnus of the psychology program at UC San Diego, Walt lives in Southern California with his wife, kids, and their black lab, Echo.
Popular Posts
Search for posts
Tags
- FIPS 140 (111)
- FIPS validation (85)
- Encryption (70)
- cryptography (68)
- NIST (62)
- CryptoComply (60)
- SafeLogic (58)
- Industry News (54)
- cryptographic module (51)
- Conversations (49)
- CMVP (48)
- RapidCert (46)
- compliance (41)
- Ray Potter (33)
- SafeLogic News (33)
- Event (27)
- federal (27)
- CAVP (23)
- Cybersecurity (23)
- FIPS 140-3 (18)
- OpenSSL (16)
- government (14)
- FedRAMP (13)
- CryptoCompact (12)
- Cryptology (12)
- DoD (12)
- RSA (12)
- healthcare (12)
- partners (12)
- NSA (11)
- post-quantum cryptography (11)
- Cloud (9)
- PQC (9)
- security (9)
- CMMC (8)
- Suite B (8)
- testing (8)
- whitepaper (8)
- Approved Products List (APL) (6)
- HITECH (6)
- ICMC (6)
- lab (6)
- CEO (5)
- NIST 800-171 (5)
- NIST 800-53 (5)
- OpenSSL 3.0 (5)
- iOS (5)
- procurement (5)
- C3PAO (4)
- Common Criteria (4)
- HITECH Act (4)
- deadline (4)
- encrypt (4)
- innovation (4)
- procure (4)
- public sector (4)
- Air Force (3)
- BSAFE (3)
- DFARS (3)
- HIPAA Safe Harbor (3)
- HITECH Safe Harbor (3)
- OpenSSL 1.1.1 (3)
- OpenSSL 3.x (3)
- POA&M (3)
- TLS 1.3 (3)
- magazine (3)
- queue (3)
- transition (3)
- 3PAO (2)
- ACVP (2)
- BAA (2)
- CIO (2)
- CSP (2)
- Cyber Defense Magazine (2)
- Defense Industrial Base (2)
- HIPAA security controls (2)
- Historical Status (2)
- MFA (2)
- OpenSSL 1.0.2 (2)
- SPRS (2)
- StateRAMP (2)
- entropy (2)
- excellence (2)
- finance (2)
- founder (2)
- gold (2)
- leader (2)
- maturity (2)
- overlap (2)
- pilot (2)
- rsa conference (2)
- solution (2)
- sponsors (2)
- sunset (2)
- vendor (2)
- year (2)
- Active Status (1)
- Alliance for Digital Innovation (1)
- Android (1)
- CIO Prime Views (1)
- DHS (1)
- DIU (1)
- DIUx (1)
- DOJ (1)
- DoDIN APL (1)
- Entropy Source Validation (1)
- FCA (1)
- FIPS Compliance (1)
- FISMA (1)
- GSA (1)
- HITRUST (1)
- Matt Cornelius (1)
- Matthew Cornelius (1)
- Maturity Model (1)
- NCCoE (1)
- OMB (1)
- SLED (1)
- SP800-131A (1)
- SP800-90A (1)
- TLS 1.1 (1)
- background (1)
- best (1)
- co-founder (1)
- codies (1)
- congress (1)
- cybertech (1)
- education (1)
- elliptic curve cryptography (1)
- extended (1)
- faq (1)
- fintech (1)
- fiscal (1)
- fiscal year (1)
- fraud (1)
- globee (1)
- hill (1)
- interview (1)
- kratos (1)
- libgcrypt (1)
- national cybersecurity strategy (1)
- opportunities (1)
- parallel (1)
- profile (1)
- public (1)
- representatives (1)
- reseller (1)
- senate (1)
- senators (1)
- simplify (1)
- state (1)
- stealth mode (1)
- story (1)
- terminology (1)
- trophy (1)
- whistleblower (1)
- whistleblowing (1)