Frank Sudia: Impact on Information Security and
        PKI 
    
    May 2023
    
    I could have received a Lifetime Achievement Award for my
    contributions to Information Security and Public Key Infrastructure
    (PKI), plus an honorary PhD in Computer Security, however most of
    what I did was never documented, and my major project
      collapsed under a cloud of bad management. So here is a
    summary. 
    
    Although I had used computers since the late 1970s, and worked as a
    business system programmer since 1985, I knew little about
    information security, apart from once using a password to scramble
    sensitive location data in an archaeology database. 
    
    I had moved to New York in 1989, initially working for a proxy
    voting service bureau, which gave me hands on exposure to the
    securities industry, where I served as lead developer on a system
    that handled most contested US proxy elections, which were often in
    the business news. 
    
    Upon moving to Bankers Trust Co. (BT) in 1991, I was no longer
    supporting a single system, but working in a central tech unit,
    providing bankwide systems level support to multiple business lines.
    One such internal client was the Lending System 2 (LS/2) project,
    which was being developed to automate the Bank's Syndicated Lending
    business. For example if some hotel developer wanted a $100 million
    loan, the system could easily assemble a syndicate of 20 banks to
    farm out the credit risk. (Prior to this I had been assisting on the
    rewrite of our Repo System, which tracked overnight repurchase
    agreements, handling up to $22 billion per day.) 
    
    We were rolling out OS/2 desktop PCs on a Novell token ring network,
    and the Federal Reserve auditors had ordered us to stop sending
    passwords in the clear, which could easily be sniffed, and switch to
    2-factor ID using Enigma Logic tokens that generated one-time codes.
    Our group was tasked to develop an Authentication server for token
    interactions, with LS/2 as our first customer, and myself as lead
    developer. We had licensed RSA BSafe, which was still under patent,
    mainly to create an authenticated Diffie-Hellman session out to the
    client. 
    
    Mercifully, the BT Authentication System (BTAS) system was a
    success, thanks to my writing the server in C on OS/2, with 2 guys
    supporting me on Windows GUI [DY] and database [MM]. It was adopted
    Bankwide, eventually reaching 40,000 corporate users accessing 240
    business applications at BT-successor Deutsche Bank (source KD),
    also used at State Street Bank and Goldman Sachs, and was spun out
    as the Indigo system. (Multiple staff on this project went on to
    senior info-sec positions at other banks.) 
    
    Before the Internet, your knowledge was limited to what you could
    read in magazines or books, or learn on the job. While researching
    this project, I subscribed to Communications
      of the ACM, which included early discussion (by Ron Rivest) of
    “key escrow” as a possible response to government demands to access
    the contents of encrypted communications. 
    
    I thought to myself, if keeping encryption keys in trusted storage
    could help Society, then possibly the banking system, which serves
    as a “trusted intermediary” in business, could step up and serve as
    a trusted repository of keys, in case of government demand. Hardly
    anyone had heard of this idea, so it wasn't yet controversial, and
    it seemed like an interesting new automated trust business. 
    
    By this point Silvio
      Micali had filed his 2 Fair Cryptosystem patents, which the
    system I had in mind would infringe, so some deal would be
    necessary. Undaunted I forged ahead filing one
      patent on an escrow based system, which contained enough
    subsystems to be granted 6 patent numbers. (Among other things the
    system enforces the scope of the warrant, and securely logs all
    access to the content.) 
    
    (My patents often cite Micali, but if you include his related
    entities (Corestreet, Phil Libin, Assa Abloy) they cite me around 10
    times more than I cited him.) 
    
    Meanwhile, it was becoming widely (if erroneously) believed that
    some form of national PKI was needed to support Privacy Enhanced
    Mail (PEM) and paperless office solutions. And since PC operating
    systems were (and still are) non-secure, we needed real hardware
    security as well. 
    
    An Intel engineer [DD] was working on a secure processor unit, by
    adding encrypted communication and memory, plus other security
    features including a random number generator and processor serial
    number, to a tape-out of their last generation '486 chip. (The part
    would have its own key-pair and device certificate, so it could
    identify itself and its capabilities.) My goal was to partner with
    Intel to create real hardware secure PCs for use as banking
    terminals, with us providing the PKI certificates and possibly key
    recovery services into the deal, which the chip makers would need,
    and certainly didn't see as part of their business. (I was planning
    to write on my tombstone, “He Made the Internet Secure.”) 
    
    (I could have filed further secure-device patents that would have
    covered much of what later became Digital Rights Management (DRM),
    but by then I had already filed so many patents, none of which had
    been implemented, that I couldn't get approval to file any more.) 
    
    The term “digital signature” originally referred to Identification
    Friend or Foe (IFF) transponder systems for combat aircraft.
    However, despite the similar wording, there was no well defined
    effort to actually deploy them as “signatures” in paperless business
    systems. To fill this gap, I (along with Rich
      Ankney, still at Fischer Intl.) wrote an early paper entitled
    
      Commercialization of Digital Signatures (Feb 1994), which
    supported my getting BTEC funded a few months later. 
    
    After filing our escrowed encryption system patent, I turned to the
    problem of creating a bank-ready Certificate Authority (CA). Bolt
    Beranek & Newman (BBN), a military security consulting firm, was
    marketing their so-called BBN box, which included on-board
    public/private key generation with tamper resistant storage, the
    idea being that the private key would never leave the box. 
    
    At one moment, Jim
      Bidzos, then CEO of RSA Data Security, pointed at their BBN
    box, which was gathering dust in a work room, and offered me a job
    to create a PKI certificate business. I declined (one of my
    worst-ever career moves, since he went on to found Verisign) since I
    believed a serious trust service needed to be run out of a well
    capitalized and risk-managed firm, not some flimsy startup. 
    
    Having just written a major security system and gotten it through a
    bank audit, I seriously doubted the auditors would go for the “metal
    box” solution, since it had no backup, and thus lacked a disaster
    recovery or business continuity solution, including from its own
    internal failure. Meanwhile, Micali's Fair Cryptosystem had the idea
    of splitting encryption keys for security, which seemed a lot wiser
    than a single point of failure. 
    
    In a flash of insight, it occurred to me that since RSA and
    Diffie-Hellman keys are exponents in a math formula, we could
    likewise split them using High School Algebra, since adding
    the exponents is the same as multiplying the numbers together. Thus
    we could break up the private key (or generate the key shares
    independently, such that when added together they would yield the
    private key) and keep them in separate locations. Now they're safe
    to handle and back up, since alone they do nothing. 
    
    All the mathematicians at NSA, Sandia National Labs, and NIST had
    not thought of that one, or if they had, no one published anything,
    so we were granted a patent on Multi-Step
      Signing (MSS). Soon after we filed a more sophisticated Adaptive
      Multi-Step patent, designed by Sandia mathematicians we had
    hired. NIST is currently organizing a bake-off for a national Threshold
      Cryptosystem Standard, to formalize this concept and promote
    its security and key management benefits. 
    
    Meanwhile, I was attending encryption standards meetings at ANSI X9,
    the accredited standards body for financial services. The widely
    used Data Encryption Standard (64-bit DES) was becoming insecure,
    and options to replace it including Triple-DES were being discussed.
    I was an early advocate that, in view of possible future algorithm
    obsolescence, we should not hard code the standards, as had been
    done with DES, but rather define the algorithm ID and key length to
    be variables. 
    
    I was the first to suggest (to MS of NIST) that a certificate issuer
    needed a 
      Certificate Practice Statement (which promptly became
    standard), so the user who seeks to rely on a certificate knows what
    policies were followed, such as whether no checking was done, versus
    commercial or military grade, etc. This simple legal fix got most
    low budget CAs off the hook, allowing them to issue low cost
    certificates in situations where more was not required. 
    
    PKI certificates were already defined in the ISO X.509 network
    directory standard, which was under joint development via an ANSI X9
    committee (chaired and attended by the same people as the ISO
    committee). However, in early versions the format was restricted to
    pre-defined fields such as Name, Organization, Org Unit, Validity
    Period, etc. which lacked extensibility, and business information
    was being overloaded into the name fields. As a lawyer I figured
    this would never fly, and in my single biggest contribution to PKI,
    I suggested adding a variable extension field that businesses could
    use to customize authority restrictions and refer to policy
    statements, etc. 
    
    This was adopted in X.509
      Version 3, which led to multiple PKI companies (other than
    ours) attaining multi-billion dollar valuations, based on the
    so-called “standard extensions,” of which around 37 are defined in RFC-5280 (2008),
    and users can create their own. As usual, I was the only lawyer in a
    room full of networking experts, and this was another of my clever
    legal fixes, which enabled the rapid takeoff off SSL for online
    credit card payments.
    
    One of my driving visions was a universal electronic legal document
    system (which has never happened, since most certificates are only
    for SSL). Addison
      Fischer had received a few patents on Electronic Document
    Authorization (EDA) certificates. After reading them I filed 2 more,
    and then Rich Ankney and I authored a new standard ANSI
      X9.45 to define Authorization certs. Various such controls are
    common (in both finance and government) when signature authorities
    are high (such as $10 million, $100 million, etc.), so I designed
    something that could encode the authorities our Bank was using.
    X9.45 was never implemented, due to Fischer feeling underpaid, but
    it could be revived now that the patents have expired. 
    
    In a parallel effort, I played a leading role in the American Bar Association,
    Section of Science & Technology, Information Security Committee,
    serving on the Editorial Committee for their Digital Signature
    Guidelines, where I provided a banking perspective. Some of my
    suggestions, such as root key suspension and modular certificate
    practice statements were not adopted. And I wasn't the prime creator
    of Digital Signature Law, since Alan Asay of the Utah court system,
    who we later hired, had already developed his legal model of
    "Subscriber, Certificate Authority, and Relying Party," which became
    the worldwide standard. 
    
    As a side project, I attended an ASTM Medical Records standards
    meeting in Philadelphia. The group was debating who had access
    rights to medical records, given that under default Copyright Law,
    each physician would own the copyright in their patient notes. I
    piped up and suggested that (as a matter of practicality) the
    records should belong to the patient, to facilitate transfer between
    providers. I'm not sure of events after that, but that policy
    approach was adopted. 
    
    Something else the PKI field needed was credible security auditing.
    Each company needs to pass its own security audits, and it likewise
    needs proof that its service providers, such as any outside CAs, are
    adequately secure. The obvious place to get such auditing standards
    was from the American Institute of Certified Public Accountants (AICPA), who had never heard
    of PKI. 
    
    In one of our great moments, a group from the ABA Information
    Security Committee including Mike Baum, Joe Wackerman of the US
    Postal Service, Rich Field, Chuck Miller (who later became our
    general counsel) and myself attended a meeting of the AICPA Computer
    Audit Committee. At first we sat through a discussion on how
    auditors needed some way to audit “through the computer.” Then at
    the end we introduced ourselves as ABA representatives and inquired
    how could we get them interested in computer security auditing? 
    
    (This was an official ABA mission, since Mike was our committee
    chair, and I'm sure he ran it by his boss Tom Smedinghoff, Chair of
    the ABA Section of Science & Technology above him.) 
    
    Our Bank was using an accounting standard called SAS-70, wherein for
    example a bank providing pension services can obtain an audit of its
    own operations, a summary of which which can then be given to a
    corporate client to submit as part of their audit for SEC purposes,
    since pension liabilities are a material part of their financial
    statements, without their auditors needing to audit us as well. 
    
    In seeking this meeting, my idea was that the AICPA should beef up
    and reissue SAS-70 to make it support transferable audits of service
    provider security. Although I had minimal further involvement, this
    was done, leading to the modern SSAE-18 standards
      with their SOC 2 & 3 options. Since then WebTrust and
    SysTrust audits have become a standard offering for the major
    accounting firms. 
    
    Banks are regulated and can only engage in approved lines of
    business, including an exception for data processing services.
    Operating a Certificate Authority (CA) to issue PKI certificates
    might have passed muster under the Data Processing Exception, but we
    were successful in getting the Federal Reserve to issue a ruling
    that, as with the traditional notary business, certifying digital
    data would also be considered “the business of banking,” not
    requiring an exception. 
    
    (One standards committee was looking to standardize RSA for
    government use, but “RSA” was trademarked, so they asked me what
    should they call it? I said call it “RDSA” for reversible digital
    signature algorithm, which resonated with their preference for DSA
    based signatures. The resulting rDSA
      Standard is still going strong, and since they were mainly
    copying prior standards, coming up with a workable name may have
    been 10% the project.) 
    
    I designed or co-designed many other security systems, including
    reliance management (to determine the total signature risk
    outstanding), crypt-wrap contracting (to impose contract terms on a
    certificate end user), certified electronic mail (to provide read
    receipts with minimal third party involvement), numerous certificate
    revocation and signature authorization schemes, a wire-transfer
    inspired micro-cash system (which was briefly evaluated by the NY
    Federal Reserve), a honeypot system to lure and track hackers, and
    others. However, none of these were built or deployed, so my public
    impact has been limited mainly to the items discussed above. 
    
    Our in-house BT Electronic Commerce (BTEC) unit was founded
    in 1994, a year prior to Verisign, which helped them get funding. My
    original idea, based on my securities processing background, was to
    initially create a low-key banking industry utility, akin to the
    Depository Trust Company (a nearly invisible Wall Street stock and
    bond custody system), to provide certification and key management. 
    
    BTEC was spun out in November 1996 as CertCo, LLC with institutional
    [Tisch, Greenberg] and strategic [Intel, Fischer] investors, raising
    $30M at a valuation of $150M, in a transaction managed by Goldman
    Sachs. I had started research in 1993 (filing my first patent on
    1-14-94), so by late 1996 I had 3 years into it, devising its
    concepts and managing the policy and standards spaces. (3 years x 50
    weeks a year = 150 weeks, so $150M / 150 weeks = $1M/week = my
    apparent value-add.) 
    
    However, the Bank let the project be taken over* by an incompetent
    manager, prompting my departure in early 1997, and when
    basic solutions** could not be delivered, the focus shifted to an
    aspirational, high profile, industry-wide system that looked good on
    PowerPoint, but was also never delivered. (A remnant of that effort
    can still be seen in 
      Identrust, which I inspired but declined to partner with us.)
    
    
    [* The senior exec [BJK] who signed off on this ill-fated
    arrangement was later indicted
      for theft of $18 million of unclaimed funds payable to the
    State of New York. He was sentenced to community service, and the
    Bank paid $63.5 million in fines. While it was soon recognized that
    this was a mistake, no one had the moral strength to push back. The
    Bank had Vernon Jordan on its Board, who was later criticized for
    lack of interest in senior management ethics.] 
    
    [** For the record, coming off my recent success with BTAS, given
    available software and developer pay in the 1990s, I could have
    easily produced beta versions of all 6 systems I designed for CertCo
    (CA, AA, RM, CW, AQ, KE) for under $1.5 million total, net of
    overhead and legal. Yet due to warped management focus, we had
    already burned $14 million by the time of the spinout.] 
    
    In 2000 the music stopped due to the Dot-Com stock market crash, and
    the company closed in early 2002, after burning over $100 million,
    with peak staff over 120, and after inducing scores of global banks
    to collectively burn $400 million (source JH), still with no
    meaningful products or revenue. As I often say, "Few people have
    ever heard of CertCo, and those who have don't think very highly of
    it."*** This was a good-sized failed deal, but it was dwarfed by
    other Dot-Com Era failures such as Webvan and CommerceOne, and would
    have been rounding error during the 2008 mortgage bond market
    collapse. [*** Or, less charitably, "A festival of bad behavior
    culminating in a business disaster of Titanic proportions."] 
    
    Many aspects of my system were documented in the book “What
    Information Security Really Is” (Itakura, 2002) written by a
    Japanese bank participant, available only in Japanese. (I never
    wrote a book, preferring not to talk up the value of assets I didn't
    control.) Among the more tangible impacts of CertCo were that banks
    stopped partnering with info-sec companies, and declined to offer
    e-trust services, while many of our staff went on to thrive in the
    still-nascent info-sec industry. 
    
    After leaving the Bank, I happened to sit next to former Reuters
    exec Jim Rutt on a
    shuttle flight from NYC to DC. He had just been named CEO of Network Solutions
    (NetSol), so I pitched him to hire me to build PKI into his
    offering. He brought me in as a consultant, during which I explained
    what certificates were, and pointed out that there was no button on
    their website to give them $500 for a certificate, as Verisign was
    charging. 
    
    Rather than hire me to build an in-house CA business from scratch,
    Rutt started looking to buy Thawte,
    a leading CA based in South Africa. However, as he later explained,
    his Board (dominated by corporate parent SAIC) declined to proceed (due to
    jealousy by SAIC staff that their spinout was already way too
    successful). Disgusted by their refusal to grow the business, he
    decided to sell it. 
    
    In 2000, at the peak of the dot-com bubble, Netsol was acquired by
    VeriSign for $21 billion in stock, $7 billion above its market
    valuation the day before, valuing them at 1/3 of the combined
    company (without, so far as I know, ever issuing a certificate). I
    call this my “$7 Billion Idea.” He told me that, had he been allowed
    to buy Thawte, the ratio would have been 2/3 to 1/3 (minus the cost
    of Thawte). Thus, although I was never involved in Verisign, I had
    major “impact” on them. (1 getting it funded, 2 buying NetSol.) 
    
    (At one point Rutt asked me if I wanted to be his head of M&A,
    which would have given me a front row seat for his maneuvering, but
    I declined due to fear I didn't have enough deal experience – of
    ones that had been successful.) 
    
    Years later Verisign exited the certificate business (selling out to
    DigiCert) after Google accused them of issuing fishy certificates
    and the major browsers “distrusted” their root key. There is still a
     Verisign today, consisting
    mainly of NetSol's former domain service and Internet root servers.
    (So it's a good thing they bought NetSol, since that business is
    still doing okay.) 
    
    Leaving New York City in 2000 and relocating to Silicon Valley, I
    tried to get a few projects funded, but got nowhere due to the
    Dot-Com stock market crash and ensuing recession. And there was no
    going back to New York, since the NY banks had laid off 1/3 of their
    staff, BT had gone under in 1998 and been acquired by Deutsche Bank,
    and every senior contact had left. 
    
    Working for security startup IPLocks in 2002, I helped design and
    market their database security and integrity monitoring system,
    which is now FortiDB, a successful product of FortiNet. 
    
    Controversy -- After the attacks of September 11, 2001, I drafted an
    article on  Restoration of National Sovereignty [WITHDRAWN],
    outlining how Congress could regulate encryption, and sent it out
    for comment. Alas it contained errors and was uniformly panned,
    leading me to  withdraw it, but not before it led to an NSA
    denial (“It's not going to happen”), an NAS rebuke (“Nothing new”),
    inspired the Cypherpunk mailing list to go private, inspired right
    wing groups to go around overturning state laws regulating knife
    lengths, which I had suggested were analogous to key lengths, and
    turned me into a perceived enemy of crypto-freedom and privacy
    lovers. 
    
    (The reason the "key recovery debate" never gets anywhere is
    Nat-Sec's refusal to let itself be audited, despite persistent
    reports of intel-abuse, and refusal to deal with any technology
    system other than as a pass-thru or puppet, while loading it up with
    backdoors that would make anyone cringe. Hence the tech industry's
    low enthusiasm for such ideas. When I touted our system's support
    for user-selectable escrow agents, the NSA case officer scowled at
    me like I was a poisonous snake.) 
    
    Thus it was good news when ChatGPT (on 4/2/23) completely misstated my background, and
    said I developed a popular open-source network monitoring system! 
    
    Then in 2003 I took a job as general counsel of Avocet Sports Technology, Inc.
    (Palo Alto, CA), which I held for 10 years. This got me away from
    Internet Security, helped me develop my legal and business skills,
    and didn't create AI patent conflicts. 
    
    Some major impacts these events had on Me included that, (a)
    I redoubled my efforts to solve problems in my philosophical system,
    and (b) when I achieved my next major breakthrough in 2003, allowing
    its AI theory to get off the ground, I vowed to “take good care” of
    what I had discovered, and took the project private. 
    
    I expect to extend this into a much longer memoir, but the above
    covers many highlights of my career in Information Security. 
    
    Home / AI-Ethics
    
     Copyright © 2023-24,
        Frank W. Sudia, All Rights Reserved