The crypto protocols even the NSA can’t crack

By

Latest document dump reveals cyber-spy hit-list.

The latest tranche of documents to come from whistleblower Edward Snowden has identified the encryption methods - and combinations of methods - that even the US National Security Agency can’t seem to crack.

The crypto protocols even the NSA can’t crack

The documents, published by German newspaper Der Spiegel, include a 2012 slide deck which classifies commonly used encryption protocols into five categories based on their level of obstruction, from ‘trivial’ to ‘catastrophic’, with the latter box reserved for methods incurring “near-total loss/lack of insight to target communications, presence”.

The only example the presentation offers of a ‘catastrophic’ level of crypto protection is the combined use of Tor browsing with the CSpace anonymised messaging system, Trilight Zone anonymisation, and ZRTP (the protocol behind RedPhone and Signal) VOIP client on Linux.

The next category of obstruction is listed as comprising ‘major’ cryptographic impediments.

In this box the NSA has included:

  • Zoho encrypted webmail
  • Tor
  • Truecrypt
  • Off-the-record (OTR)  protocol for instant messaging encryption

‘Major’ level encryption techniques will hide the “majority” of targeted communications from NSA collection when used on their own, but not all, the presentation explains.

Records of failed intercepts, also published by Der Spiegel, suggest that the NSA cyber-spies have not yet cracked the 20+ year-old Pretty Good Privacy (PGP) encryption protocol either. Attempts to access the content of several PGP-encrypted Yahoo mail messages, also sent in 2012, are shown to be unsuccessful, with the explanation “no decrypt available for this PGP message”.

Documents also suggest the NSA was working to crack the Advanced Encryption Standard (AES) - despite endorsing it to the National Institute of Standards and Technology (NIST) at the same time.

On the other side of the coin, however, the documents also attest to the ease - and frequency - at which the NSA has been able to break down privacy protections individuals and organisations work to establish using VPNs to secure communications.

The documents refer to a massive-scale program to decrypt and collect communications exchanged via VPNs thought to be encrypted by the PPTP and Ipsec protocols. They indicate that PPTP-protected communications pose little imposition to the NSA, and when it comes to the harder-to-crack Ipsec protocol, the NSA officers attack individual routers to obtain the decryption keys that will allow them to see the content exchanged.

Meanwhile, the UK’s Government Communications Headquarters (GCHQ) is the NSA partner reportedly leading the charge against decryption of the commonly-used TLS and SSL protocols, commonly used to protect financial transactions and passwords online.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

NSW Police to embark on $126m IT overhaul

NSW Police to embark on $126m IT overhaul

CBA looks to GenAI to assist 1200 'security champions'

CBA looks to GenAI to assist 1200 'security champions'

Australia's super funds told to assess authentication controls

Australia's super funds told to assess authentication controls

WestJet probes cyber security incident

WestJet probes cyber security incident

Log In

  |  Forgot your password?