{"id":71472,"date":"2013-09-20T11:43:00","date_gmt":"2013-09-20T10:43:00","guid":{"rendered":"http:\/\/rinf.com\/alt-news\/breaking-news\/deliberately-flawed-rsa-security-tells-customers-to-drop-nsa-related-encryption-algorithm\/71472\/"},"modified":"2013-09-20T13:50:46","modified_gmt":"2013-09-20T12:50:46","slug":"deliberately-flawed-rsa-security-tells-customers-to-drop-nsa-related-encryption-algorithm","status":"publish","type":"post","link":"http:\/\/rinf.com\/alt-news\/latest-news\/deliberately-flawed-rsa-security-tells-customers-to-drop-nsa-related-encryption-algorithm\/","title":{"rendered":"Deliberately flawed? RSA Security tells customers to drop NSA-related encryption algorithm"},"content":{"rendered":"<div class=\"ftpimagefix\" style=\"float: none;\">An encryption algorithm with a suspected NSA-designed backdoor has been declared insecure by the developer after years of extensive use by customers worldwide, including the US federal agencies and government entities.<\/div>\n<p>Major US computer security company RSA Security, a division of<br \/>\nEMC, has privately warned thousands of its customers on Thursday<br \/>\nto immediately discontinue using all versions of company&#8217;s BSAFE<br \/>\ntoolkit and Data Protection Manager (DPM), both using<br \/>\nDual_EC_DRNG (Dual Elliptic Curve Deterministic Random Bit<br \/>\nGenerator) encryption algorithm to protect sensitive data.<\/p>\n<p><i>\u201cTo ensure a high level of assurance in their application, RSA<br \/>\nstrongly recommends that customers discontinue use of<br \/>\nDual_EC_DRNG<\/i> [cryptographic keys generator] <i>and move to a<br \/>\ndifferent PRNG<\/i> [Pseudo-random Number Generator]<i>,\u201d<\/i><br \/>\nwarned RSA&#8217;s letter, as quoted by The Wall Street Journal.<\/p>\n<p>In the letter the RSA provided BSAFE Toolkits and DPM customers<br \/>\nwith a link to technical guidance to change the PRNG settings in<br \/>\ntheir products and promised to update the algorithm library.<\/p>\n<p>The letter does not mention RSA&#8217;s flagship SecurID tokens, used<br \/>\nby millions of employees around the world to get secure access to<br \/>\ntheir corporate networks.<\/p>\n<p>In 2006, the US National Institute of Standards and Technology<br \/>\n(NIST) followed by the International Organization for<br \/>\nStandardization officially endorsed Dual_EC_DRNG, so encryption<br \/>\nsoftware base on it was used for years by both private sector and<br \/>\nUS government agencies.<\/p>\n<p>Last week the New York Times published new revelations by former<br \/>\nNational Security Agency contractor Edward Snowden, exposing that<br \/>\ncrucial encryption algorithm of certain US-developed security<br \/>\nsoftware is based on weak mathematical formula intentionally<br \/>\ncrippled to facilitate NSA access to encrypted dataflow.<\/p>\n<p>On Wednesday, ArsTechnica media outlet sent an inquiry to RSA on<br \/>\nwhether it is going to alert its customers that company&#8217;s BSAFE<br \/>\nproduct operates a <i>\u201cdeliberately crippled pseudo random number<br \/>\ngenerator (PRNG), which is so weak that it undermines the<br \/>\nsecurity of most or all cryptography systems that use it.\u201d<\/i><\/p>\n<p>A mere 24 hours after that notification, the RSA issued an<br \/>\nadvisory to stop using compromised software.<\/p>\n<p>The RSA letter never mentions the NSA, although <i>\u201cdue to the<br \/>\ndebate around the Dual_EC_DRNG standard\u201d<\/i> the company invites<br \/>\nexperts to take part in recently reopened public expertise of SP<br \/>\n800-90 security standard by the National Institute of Standards<br \/>\nand Technology (NIST).<\/p>\n<p>According to NIST the RSA&#8217;s Dual_EC_DRNG tool is used in dozens<br \/>\nof third-party products that implement cryptographic functions,<br \/>\nsuch as McAfee Firewall Enterprise Control Center.<\/p>\n<p>Which means that all of them are also using \u2018corrected&#8217; random<br \/>\nnumber generator with implanted backdoor used by the NSA; but as<br \/>\nArsTechnica suspects \u2014 not only the NSA anymore.<\/p>\n<p>ArsTechnica claims that an <i>\u201cuntold number\u201d<\/i> of third-party<br \/>\nproducts <i>\u201cmay be bypassed not only by advanced intelligence<br \/>\nagencies, but possibly by other adversaries who have the<br \/>\nresources to carry out attacks.\u201d <\/i> Specially-designed<br \/>\nhardware using a simple trial and error method can relatively<br \/>\nquickly go through possible keys until the correct one is<br \/>\ngenerated.<\/p>\n<p>What is more significant, ArsTechnica warns, is that the BSAFE<br \/>\ntool is the default RNG in a <i>&#8220;large number of derivative<br \/>\ncrypto systems that are highly susceptible to being broken.\u201d<\/i><\/p>\n<p>Cryptography experts did not approve of the NIST&#8217;s decision to<br \/>\nchoose Dual_EC_DRNG as major encrypting tool from the very<br \/>\nbeginning and for years speculated over its sluggish performance<br \/>\nand the \u2018discrete logarithm&#8217; mathematical basis.<\/p>\n<p>But a person familiar with the process told Reuters that NIST<br \/>\naccepted Dual_EC_DRNG in the first place because many US<br \/>\ngovernment agencies were already using it.<\/p>\n<p>As Professor Mathew Green, a cryptographer at Johns Hopkins<br \/>\nUniversity, claims in his latest publication, when NIST embraced<br \/>\nDual_EC_DRNG, the tool had no security proof.<\/p>\n<p>Last week <a href=\"http:\/\/rt.com\/op-edge\/nsa-spying-weakens-us-security-768\/\" target=\"_blank\">Professor Green told RT<\/a> that the <i>\u201cNSA has<br \/>\na hard time breaking encryptions, so what they&#8217;ve done is they<br \/>\nactually tried to take the products that perform encryptions and<br \/>\nmake them worse, make it weaker so it is easier for them to break<br \/>\nthat encryption.\u201d<\/i><\/p>\n<p><i>\u201c[The] NSA is willing to make the US security a little bit<br \/>\nweaker,\u201d<\/i> Green said.<\/p>\n<p>Just this week Symantec computer security experts maintained<br \/>\nthey&#8217;ve identified an elite group of <a href=\"http:\/\/rt.com\/usa\/hackers-china-hidden-lynx-092\/\" target=\"_blank\">Chinese hackers<\/a> who have targeted the systems of US<br \/>\nmajor technology companies like Adobe, Dow Chemical, Google,<br \/>\nNorthrup Grumman, Yahoo and even Symantec itself since at least<br \/>\n2009.<\/p>\n<p>Earlier in 2013, the NSA was <a href=\"http:\/\/rt.com\/usa\/nsa-prism-classified-data-collection-348\/\" target=\"_blank\">exposed<\/a> as an agency that enjoyed global<br \/>\ninternet data flow control for years, using its behemoth PRISM<br \/>\nsurveillance program along with other costly projects. But<br \/>\ndespite practically limitless web control capabilities, the<br \/>\nagency failed to prevent foreign IT experts, particularly from<br \/>\n<a href=\"http:\/\/rt.com\/usa\/china-american-hackers-new-530\/\" target=\"_blank\">China<\/a>, performing high-profile hacks of<br \/>\nAmerican companies and other entities.<\/p>\n<p>Copyright: <a title=\"Deliberately flawed? RSA Security tells customers to drop NSA-related encryption algorithm\" href=\"http:\/\/rt.com\/usa\/nsa-weak-cryptography-rsa-110\/\" target=\"_blank\">RT<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An encryption algorithm with a suspected NSA-designed backdoor has been declared insecure by the developer after years of extensive use by customers worldwide, including the US federal agencies and government entities. Major US computer security company RSA Security, a division of EMC, has privately warned thousands of its customers on Thursday to immediately discontinue using [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":71473,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[487,1614,18],"tags":[],"class_list":{"0":"post-71472","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-breaking-news","8":"category-surveillance-big-brother","9":"category-latest-news"},"_links":{"self":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/71472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/comments?post=71472"}],"version-history":[{"count":0,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/posts\/71472\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media\/71473"}],"wp:attachment":[{"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/media?parent=71472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/categories?post=71472"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/rinf.com\/alt-news\/wp-json\/wp\/v2\/tags?post=71472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}