Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Network Security Viruses & Malware Hackers Security Solutions More Topics...
APC Free White Paper
Optimize your network investment &
Enter to win a Samsung Galaxy Note

www.apc.com
Security Solutions
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
NSA-Developed Encryption Untrustworthy, Security Firm Says
NSA-Developed Encryption Untrustworthy, Security Firm Says

By Barry Levine
September 24, 2013 2:17PM

Bookmark and Share
In 2006, NIST accepted an NSA proposal for one of four cryptographic systems for government use. According to news reports, the NSA proposal was considered unusual, and there had been suspicions by some users that it contained a back door. In fact, a 2007 presentation by Microsoft researchers specifically questioned the security of that component.
 


Is there a back door from the U.S. National Security Agency (NSA) in a section of encryption software from security firm RSA? That possibility has been raised by RSA itself, following a news report related to leaks by former NSA contract employee Edward Snowden.

On Monday, the security firm said its customers should not use the Dual Elliptic Curve Deterministic Random Bit Generation component of its BSAFE toolkit and Data Protection Manager security software. RSA is instead recommending that its customers use one of the other "cryptographic Pseudo-Random Number Generators built into the RSA BSAFE toolkit."

The RSA warning stems from the fact that Dual EC DRBG, as it is known, is a community-developed encryption algorithm standard, and the National Institute of Standards and Technology (NIST) has warned about its security. The NIST warning followed a report in The New York Times about NSA involvement in public cryptography standards.

'Called into Question'

In its September bulletin, NIST wrote that "concern has been expressed about one of the DRBG algorithms," which includes default elliptic curve points for three elliptic curves. It added that "security researchers have highlighted the importance of generating these elliptic curve points in a trustworthy way," and that recent comments from the community "have called into question the trustworthiness of these default elliptic curve points."

NIST said its role was to publish "the strongest cryptographic standards possible," using a transparent, public process to do so. Because of this, the agency said, it "strongly recommends that, pending the resolution of the security concerns," the Dual EC DRBG "no longer be used."

RSA, part of EMC, has said it agrees with NIST's assessment, and the subtext is that NSA might have made the elliptic curve spec easier for it to break. The RSA BSAFE kit has been used for increasing security in Web browsers, in hardware and in other kinds of software. Cryptographic packages commonly include random number generators, but generators that create less-than-random numbers could make the encoded content easier to decode.

Edward Snowden

The New York Times reported last week that the documents revealed by Edward Snowden, from his stint as a NSA contractor, indicated that the security agency was involved in community development of cryptography standards through NIST to create weak points, so that the resulting encoded material could be more easily cracked.

Snowden is a fugitive living in temporary asylum in Russia, and has been charged in the U.S. with espionage for his unauthorized disclosure of massive NSA programs that collected Internet, telephone and e-mail data.

In 2006, NIST accepted an NSA proposal for one of four cryptographic systems for government use. According to news reports, the NSA proposal was considered unusual, and there had been suspicions by some users that it contained a back door. In fact, a 2007 presentation by Microsoft researchers specifically questioned the security of that component. Reportedly, it had been accepted by NIST because other government agencies were already employing it.
 

Tell Us What You Think
Comment:

Name:

Serenicom:

Posted: 2013-10-07 @ 11:32pm PT
Now we know why Windows Vista was so slow. It was using a RNG more than a thousand times slower than the other three choices.

Duh!

JT Reynolds:

Posted: 2013-09-25 @ 3:39pm PT
Encryption may not be the foolproof solution we want, but it's better than nothing. It will give NSA more trouble than its worth to dig into our private data without good reason. Same goes for storing files online. Get them off the cloud services and stash them in a CloudLocker (www.cloudlocker.it), which stays in your home where they still need a warrant to get inside.



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Security Solutions
1.   Data Center Plug-In Monitors Security
2.   Security Firms Watch for Feisty Fans
3.   BlackBerry Wins Security Certification
4.   Best of Interop 2014 Finalists Named
5.   Oracle Tackles Mobile Security


advertisement
Security Firms Watch for Feisty Fans
Social media monitoring gives heads-up.
Average Rating:
BlackBerry Wins Security Certification
Enterprise Service 10 gets FIPS nod.
Average Rating:
Data Center Plug-In Monitors Security
ManageEngine offering is in beta.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug leaked will come at a very hefty price.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
 
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Hackers | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.