iTnews
  • Home
  • News
  • Technology
  • Security

Potential backdoors in US crypto standards discovered

By Stacy Cowley on Jul 15, 2014 1:27PM
Potential backdoors in US crypto standards discovered

NIST-commissioned report released.

US government software standards may enable spying by the National Security Agency through widely used coding formulas that should be jettisoned, some of the country’s top independent experts have reported.

Such mathematical formulas, or curves, are an arcane but essential part of most technology that prevents interception and hacking.

The National Institute of Standards and Technology (NIST) has been legally required to consult with the NSA’s defensive experts in approving them and other cryptography standards.

But NIST’s relationship with the spy agency came under fire in September after reports based on documents from former NSA contractor Edward Snowden pointed to one formula in particular as a Trojan horse for the NSA.

NIST discontinued that formula, called Dual Elliptic Curve, and asked its external advisory board and a special panel of experts to make recommendations that were published today alongside more stinging conclusions by the individual experts.

Noting the partially obscured hand of the NSA in creating Dual Elliptic Curve - which was most broadly distributed by security firm RSA  - the group delved into the details of how it and other NIST standards emerged.

It found incomplete documentation and poor explanations in some cases; in others material was withheld pending legal review.

As a whole, the panels recommended that NIST review its obligation to confer with the NSA and seek legal changes “where it hinders its ability to independently develop the best cryptographic standards to serve not only the United States government but the broader community.”

They also urged NIST to weigh the advice of individual task force members who made more dramatic suggestions, such as calling for the replacement of a larger set of curves approved for authenticating users, in part because they were selected through unclear means by the NSA.

“It is possible that the specified curves contain a back door somehow,” said Massachusetts Institute of Technology professor Ron Rivest, a co-founder of RSA and the source of the letter R in its name.

Though the curves could be fine, he wrote, “it seems prudent to assume the worst and transition away.”

More broadly, Rivest wrote, “NIST should ask the NSA for full disclosure regarding all existing standards... If NSA refuses to answer such an inquiry, then any standard developed with significant NSA input should be assumed to be `tainted,’” absent proof of security acceptable to outsiders.

Rivest said NIST needed to have a process whereby evidence about how the curves were chosen is publicly presented.

His long association with RSA, now part of electronic storage maker EMC, made his remarks more poignant.

But prominent task force colleagues including internet co-creator Vint Cerf and Ed Felten, former chief technologist at the US Federal Trade Commission, also gave strongly worded verdicts on the Department of Commerce unit.

“It cannot be accepted that NIST’s responsibilities should be co-opted by the NSA’s intelligence mission,” wrote Cerf, who now works at Google.

While Rivest called the internal history of Dual Elliptic Curve a “smoking gun” with an “almost certain” NSA back door, Felten wrote that NSA might not remain alone in its ability to use it and other possible NIST-approved holes for spying.

In each of three cases, including Dual Elliptic Curve and the more common curves faulted by Rivest, Felten said the suspected back door access “reduces the security of users against attack by other adversaries, including organised crime groups or foreign intelligence services.”

The NSA might have been able to generate curves that pass cursory security tests but are still breakable through the aid of sheer computing power, because it can try millions of curves and get a few that fit its goals. But a researcher working for another country could discover the flaw, Felten said.

In the case of the curves approved under the FIPS 186 standard for authenticating digital signatures, NIST should start over and pick its own curves publicly rather than relying on the NSA, Felten and others said.

Several experts said NIST had to hire more cryptographers and strengthen its internal processes to avoid relying on NSA.

NIST acting Director Willie May said his agency “must strengthen its in-house cryptography capabilities to ensure we can reach independent conclusions about the merits of specific algorithms or standards."

NIST did not respond to request for detail on the fate of the suspect curves.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright Reuters
© 2019 Thomson Reuters. Click for Restrictions.
Tags:
back doorsecuritysoftwarestandardsus

Partner Content

How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Why Genworth Australia embraced low-code software development
Promoted Content Why Genworth Australia embraced low-code software development
Security "mindset shift" needed to protect organisations
Promoted Content Security "mindset shift" needed to protect organisations
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
  • Forrester Technology & Innovation Asia Pacific 2022
By Stacy Cowley
Jul 15 2014
1:27PM
0 Comments

Related Articles

  • Adelaide council rules out facial recognition on city CCTV network
  • WA gov expands Microsoft enterprise agreement
  • IBM workflow analysis software beset by bugs
  • NDIS case management system provider breached
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Australia scraps digital passenger cards for international arrivals

Australia scraps digital passenger cards for international arrivals

PayTo rollout kicks off

PayTo rollout kicks off

Neobank Volt exits the banking industry

Neobank Volt exits the banking industry

Westpac sets sights on hybrid meeting spaces

Westpac sets sights on hybrid meeting spaces

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
Case Study: EY invests in AI to improve approach to flexible working
Case Study: EY invests in AI to improve approach to flexible working
Case study: AFL kicks goals with its new digital platform
Case study: AFL kicks goals with its new digital platform
Case Study: Good360 deploys NetSuite, Magento and Salesforce
Case Study: Good360 deploys NetSuite, Magento and Salesforce
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.