Jump to content

How far did the NSA go to weaken cryptography standards?


shamu726
 Share

Recommended Posts

As cryptographers come to terms with recent leaks, the government's credibility is at risk

pgp_large_verge_medium_landscape.jpg

It started with an almost throwaway line in the in The Guardian's bombshell NSA cryptography story. After pages of shocking revelations, the article revealed one secret document showed that the NSA had "worked covertly to get its own version of a draft security standard issued by the US National Institute of Standards and Technology approved for worldwide use in 2006. 'Eventually, NSA became the sole editor,' the document states."

The National Institute of Standards and Technology is usually seen as an impartial judge of standards, so this was potentially catastrophic. This week, NIST denied the allegations, saying they would never "deliberately weaken a cryptographic standard," but the damage was done. Had the NSA been poisoning the well of cryptography?

The articles don't name specific programs as a concession to law enforcement, but the program was widely assumed to be a standard called the DUAL_EC_DRBG, which many have suspected of being an NSA plant for years. The algorithm works as a random number generator, but if it doesn’t work as advertised, it could easily serve as a backdoor codebreak for a third party like the NSA. (Most encryption schemes rely on random numbers to foil code-breakers, but if the NSA can guess the "random" string, it makes the code much easier to crack.) Early suspicions were also raised by two Microsoft engineers, John Kelsey and Niels Ferguson, which is consistent with the New York Times' description of the plant. If it's true, it's both good and bad news: the NSA really did get a bad standard approved by one of the most important boards in cryptography, but it probably didn't do them any good.

Unlike earlier leaks, this one comes with a lot of caveats — starting with the fact that DUAL_EC_DRBG was never widely adopted. When it was approved, it was included among three other standards, all of which were faster and more effective, so the NSA's choice was never a favorite. "I can tell you as a crypto professional, I took one look at it and said, that's gonna be slow, and then forgot about it," says Silent Circle CTO John Callas, who was working on cybersecurity for Apple at the time. When larger concerns were aired, a year after the fact, it was more important to NSA watchers than cryptography pros. For the most part, the standard had already been dropped. As Callas put it, "If the NSA had $250 billion for cryptography backdoors and the best they could do was Dual_EC, then we have nothing to fear from them."

It's also unlikely that NIST's own working group was compromised by any NSA covert action. Miles Smid was on the NIST working group that approved the standard and has since moved on to private contracting. He says any NSA involvement was fully disclosed, and happened before the group ever convened. "I don't recall that there was anything shadowy having to do with it," Smid recalls. "NIST is part of the government and so is the NSA. The NSA has submitted candidate algorithms in the past, and NIST treats them like any other submissions."

According to Smid, when NIST saw the standard had already been approved by a banking-industry trade group, they bundled it with the other recommendations and moved on. More importantly, the NSA's involvement in the standard was clear from the beginning. The two groups are known for working closely together and, as today’s statement pointed out, NIST is required by statute to consult with the NSA, which is still the government’s authority in all things crypto. DUAL_EC_DRBG was known from the start to have been coauthored by the NSA, and what The Guardian described as "working covertly" may have simply been the NSA openly lobbying for their in-house standard.

It's still unclear just how alarmed the crypto world should be. On some level, the community's safeguards worked: a bad standard was identified early and kept out of products. NIST may not have caught the problem, but the bad standard also didn't spread very far beyond the organization. With enough eyes on the problem and enough skepticism, a faulty random-number generator was never going to get very far.

But at the same time, the problem is much bigger than a single bad standard. Because of Snowden, we now have confirmation that the NSA purposefully spread a bad algorithm, which calls into question much more than just a single program. NSA algorithms are the basis for lots of products, many of which guard sensitive government information. There's no reason to doubt any particular one, but after this latest leak, they'll all be called into question. If NSA standards can't be trusted, many of the tools of modern cryptography will have to be rewritten. The biggest problem is that cryptographers don’t yet know how widespread the issue really is.

Source: The Verge

Link to comment
Share on other sites

  • Replies 1
  • Views 1.5k
  • Created
  • Last Reply

Top Posters In This Topic

  • frogman

    1

  • shamu726

    1

Popular Days

Top Posters In This Topic

Sounds like another bio-chem trail...el-CIA...dodo... stains in my shorts...Taking a bite out of my Apple "clone" phone will never be the same.

Made in China....dirty deeds dun dun cheap!

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...