[governance] Fwd: [New post] In Wake of Latest Crypto Revelations, ‘Everything is Suspect’
Suresh Ramasubramanian
suresh at hserus.net
Fri Sep 20 20:46:54 EDT 2013
--- Forwarded message ---
From: Threatpost <donotreply at wordpress.com>
Date: 20 September 2013 10:48:48 PM
Subject: [New post] In Wake of Latest Crypto Revelations, ‘Everything is
Suspect’
To: suresh at hserus.net
Post : In Wake of Latest Crypto Revelations, ‘Everything is
Suspect’
URL :
http://threatpost.com/in-wake-of-latest-crypto-revelations-everything-is-suspect/102377
Posted : September 20, 2013 at 1:18 pm
Author : Michael Mimoso
So now that RSA Security has urged developers to back away from the table
and stop using the maligned Dual Elliptic Curve Deterministic Random Bit
Generation (Dual EC DRBG) algorithm, the question begging to be asked is
why did RSA use it in the first place?
Going back to 2007 and a seminal presentation at the CRYPTO conference (
http://rump2007.cr.yp.to/15-shumow.pdf ) by Dan Shumow and Niels Ferguson,
there have been suspicions about Dual EC DRBG primarily because it was
backed by the National Security Agency, which initially proposed the
algorithm as a standard. Cryptographer Bruce Schneier wrote in a 2007 essay
( https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html )
that the algorithm contains a weakness that “can only be described as a
backdoor.”
Given the current climate and revelations about NSA surveillance of
Americans, and implications the spy agency manipulated standards efforts,
in particular those overseen by NIST, Dual EC DRBG and other crypto
standards are going to be scrutinized top to bottom—not to mention the
deterioration of trust in any product built on that standard.
“I wrote about it in 2007 and said it was suspect. I didn’t like it back
then because it was from the government,” Schneier told Threatpost today.
“It was designed so that it could contain a backdoor. Back then I was
suspicious, now I’m terrified.
"We don’t know what’s been tampered with. Nothing can be trusted.
Everything is suspect,” Schneier said.
Iin his essay, Schneier wrote that not only was the algorithm derided as
slow compared to better available algorithms, but it had a bias, meaning
that the random numbers it generates aren’t so random. Dual EC DRBG was one
of four approved random bit generators in NIST Special Publication 800-90,
but it sticks out like a sore thumb.
“What Shumow and Ferguson showed is that these numbers have a relationship
with a second, secret set of numbers that can act as a kind of skeleton
key. If you know the secret numbers, you can predict the output of the
random-number generator after collecting just 32 bytes of its output,”
Schneier wrote. “To put that in real terms, you only need to monitor one
TLS Internet encryption connection in order to crack the security of that
protocol. If you know the secret numbers, you can completely break any
instantiation of Dual_EC_DRBG.
“The researchers don't know what the secret numbers are,” Schneier said.
“But because of the way the algorithm works, the person who produced the
constants might know; he had the mathematical opportunity to produce the
constants and the secret numbers in tandem.”
RSA advised its developer customers via email yesterday to no longer use
the algorithm, following a similar NIST recommendation (
http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-90-A%20Rev%201%20B%20and%20C
) last week. The algorithm is the default pseudo random number generator
in a number of RSA products, including the RSA BSAFE libraries and RSA’s
key management product RSA Data Protection Manager. BSAFE is embedded in
many applications, providing cryptography, digital certificates and TLS
security. RSA said the current product documentation can help developers
change the PRNG in their respective implementations. RSA also said it would
review its products to determine where the algorithm is in use and make the
appropriate changes.
RSA CTO Sam Curry told Wired magazine (
http://www.wired.com/threatlevel/2013/09/rsa-advisory-nsa-algorithm/ ) ,
which first reported the story yesterday, the algorithm has been part of
RSA libraries since 2004, two years before it was approved by NIST.
“Every product that we at RSA make, if it has a crypto function, we may or
may not ourselves have decided to use this algorithm,” Curry told Wired.
“So we’re also going to go through and make sure that we ourselves follow
our own advice and aren’t using this algorithm.”
Matthew Green, a cryptographer and research professor at Johns Hopkins
University, said RSA had no good reason to use the algorithm, and its
decision to do so puts the security of any product using the BSAFE library
into question.
“There's no good reason whatsoever, just none,” Green said. “There was no
good reason before the [Crypto 2007] backdoor presentation. It was a poor
decision then, and afterwards I kind of think it was malpractice. People
have known about this for a long time."
RSA’s core product, its SecurID two-factor authentication tokens, was
breached in 2011 and data stolen in that attack was used to attack Lockheed
Martin and others in the defense industry. RSA said it spent more than $66
million cleaning up from the attack and helping customers. An untold number
of RSA SecurID tokens were recalled and replaced. A source close to the
matter told Threatpost that SecurID currently does not use the Dual EC DRBG
random number generator, nor did it prior to the 2011 attack.
In the meantime, the immediate fallout is that we should expect more
technology companies to make similar announcements about NIST-approved and
NSA-influenced encryption. Experts are concerned too about the damage being
inflicted upon NIST as a standards body. It’s likely these revelations will
force greater scrutiny on the NIST-NSA relationship and nudge users and
providers away from the standard in time.
“The U.S. has had an enormous influence on crypto around the world because
we have NIST,” Green said in an interview before the RSA news broke. “You
could see people break away from NIST, which would hurt everyone, and move
to regional standards. That stuff is a problem.
“We trust NIST because there are a lot smart people there. If you split up
into regions, it’s possible things could get less secure,” Green added.
“You could end up with more vulnerabilities; standards get weaker the less
effort you put into it.”
Schneier agreed that scrutiny will tighten on NIST.
“The fact is, NIST has been tarnished badly, and we really need them,” he
said. “This is the biggest problem: The NSA has broken the fundamental
social contract of the Internet."
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.igcaucus.org/pipermail/governance/attachments/20130921/fc14ba2a/attachment.htm>
-------------- next part --------------
____________________________________________________________
You received this message as a subscriber on the list:
governance at lists.igcaucus.org
To be removed from the list, visit:
http://www.igcaucus.org/unsubscribing
For all other list information and functions, see:
http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
http://www.igcaucus.org/
Translate this email: http://translate.google.com/translate_t
More information about the Governance
mailing list