NSA-Developed Crypto Technology No Longer Trusted For Use In Global Standards

from the I-just-can't-think-why dept

One of the most shocking pieces of information to emerge from the Snowden documents was that the NSA had paid RSA $10 million to push a weakened form of crypto in its products. The big advantage for the NSA was that it made it much easier to decrypt messages sent using that flawed technology. A few months after this news, the National Institute of Standards and Technology announced that it would remove the "Dual Elliptic Curve" (Dual EC) algorithm from its recommendations. But of course, that's not the end of the story. Betraying trust is always a bad idea, but in the security field it's an incredibly stupid idea, since trust is a key aspect of the way things work in that shadowy world. So it should come as no surprise that following the Dual EC revelations, the world's security experts no longer trust the NSA:

An international group of cryptography experts has forced the U.S. National Security Agency to back down over two data encryption techniques it wanted set as global industry standards, reflecting deep mistrust among close U.S. allies.

In interviews and emails seen by Reuters, academic and industry experts from countries including Germany, Japan and Israel worried that the U.S. electronic spy agency was pushing the new techniques not because they were good encryption tools, but because it knew how to break them.

The NSA has now agreed to drop all but the most powerful versions of the techniques -- those least likely to be vulnerable to hacks -- to address the concerns.

The Reuters report has interesting comments from security experts explaining why they opposed the new standards. Concerns included the lack of peer-reviewed publication by the creators, the absence of industry adoption or a clear need for the new approaches. There's also the intriguing fact that the UK was happy for the NSA algorithms to be adopted. Given the extremely close working relationship GCHQ has with the NSA, you can't help wondering whether the UK's support was because it too knew how to break the proposed encryption techniques, and therefore was keen for them to be rolled out widely. Certainly, the reason its representative gave for backing the two NSA data encryption methods, known as Simon and Speck, was feeble in the extreme:

Chris Mitchell, a member of the British delegation, said he supported Simon and Speck, noting that "no one has succeeded in breaking the algorithms.”

Moreover, it was only half-true: the Reuters story says that academics have already had "partial success" in finding weaknesses, which surely calls for a cautious approach and more research, rather than simply accepting the proposal and hoping for the best. And even the British representative had to admit that his NSA mates had totally blown it:

He acknowledged, though, that after the Dual EC revelations, "trust, particularly for U.S. government participants in standardization, is now non-existent."

As the NSA -- and also the W3C, thanks to its blessing of DRM in HTML -- will now find, regaining that lost trust will be a long and difficult process. Maybe others can learn from their (bad) examples.

Follow me @glynmoody on Twitter or identi.ca, and +glynmoody on Google+

Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: encryption, nsa, standards, trust


Reader Comments

Subscribe: RSS

View by: Time | Thread


  1. icon
    Ninja (profile), 25 Sep 2017 @ 8:20am

    "trust, particularly for U.S. government participants in standardization, is now non-existent."

    What was the saying?

    You heap what you sow?

    And that's true in many other aspects for the US government particularly and this saddens me because I know a few Americans and I personally feel that they (Americans as a whole) are better than that.

    link to this | view in thread ]

  2. icon
    roebling (profile), 25 Sep 2017 @ 9:26am

    Trust the NSA! (To leak everything you say...)

    link to this | view in thread ]

  3. identicon
    David, 25 Sep 2017 @ 9:40am

    Huh?

    Why would cryptographers trust the NSA in the first place? I think the point is rather that nobody trusts RSA any more because they let themselves be paid by the NSA for proposing an algorithm that is not inherently weak but can be weakened by using prescribed constants with unknown history (that could amount to being the public key for a weakness where the corresponding secret key to the weakness is in the NSA's hand).

    People know that the NSA has vested interests. It's rather RSA that has taken a markedly fishy course not in coherence with their reputation.

    link to this | view in thread ]

  4. identicon
    Anonymous Coward, 25 Sep 2017 @ 9:49am

    This was how I read it.

    Certainly, the reason its representative gave for backing the two NSA data encryption methods, known as Simon and Speck, was feeble in the extreme:

    Chris Mitchell, a member of the British delegation, said he supported Simon and Speck, noting that "no one else has succeeded in breaking the algorithms.”

    link to this | view in thread ]

  5. identicon
    Anonymous Coward, 25 Sep 2017 @ 10:07am

    The Best Way to Break Crypto

    is, of course, to break it before it becomes a standard.

    link to this | view in thread ]

  6. identicon
    Anonymous Coward, 25 Sep 2017 @ 10:24am

    Re: Huh?

    Historically, NSA's mission to secure computing resources against attack was presumed to trump their mission to obtain unauthorized access to computing systems. This was even supported in the case of DES, where NSA influenced the S-boxes to be more secure (though even there, NSA also influenced the key size downward, weakening it against brute force). Whether that downward influence was for unauthorized access or simple implementation efficiency (for performance, you always want to use the fastest cipher that will withstand all expected adversaries, and shrinking the key can make the cipher faster at the expense of security), their conduct over the last few decades has shown that they now place the mission of obtaining unauthorized access far above their mission of securing computing resources. Thus, while they might once have been helpful to cryptographers because they employed smart people to work on pro-security designs, they are now clearly hostile to cryptographers and must be treated as such.

    link to this | view in thread ]

  7. identicon
    Anonymous Coward, 25 Sep 2017 @ 10:25am

    Re:

    Reap not heap. Heaps are usually reserved for piles of something. Reaping is the harvesting of crops, in this case crops of distrust based on years of purposeful weakening of standards.

    link to this | view in thread ]

  8. identicon
    Anonymous Coward, 25 Sep 2017 @ 10:29am

    Re:

    You heap what you sow?

    Traditionally, it was reap, but I can see some modern CS-inspired alternatives:

    • You map where to go.
    • You stack what you hoe.
    • You set each row.
    • You queue each seed.

    Fortunately, only some of these sayings (heap, map, set) require careful balancing on each iteration.

    link to this | view in thread ]

  9. icon
    Ninja (profile), 25 Sep 2017 @ 10:31am

    Re: Re:

    Oh, I thought one and wrote the other. Right.

    link to this | view in thread ]

  10. identicon
    Anonymous Coward, 25 Sep 2017 @ 10:46am

    Trusting government

    or any of its agencies, makes you a 'willing' victim and therefore deserving of blame.

    link to this | view in thread ]

  11. identicon
    Almost Anonymous, 25 Sep 2017 @ 12:15pm

    Just a small point

    Glyn, we knew about the problems with Dual EC a long time ago, about 5 years before the Snowden releases. Most folks in the security community distrusted Dual EC for two reasons: the NSA was pushing it, and there was already research that indicated that the algorithm had an innate backdoor. That backdoor, combined with the NSA's desire to push it for use, pretty much confirmed that the algorithm was already compromised. Read more (and better) summary here: https://www.schneier.com/blog/archives/2007/11/the_strange_sto.html

    link to this | view in thread ]

  12. identicon
    Glyn Moody, 25 Sep 2017 @ 12:23pm

    Re: Just a small point

    Thanks for the link to Schneier's useful comments. Back then people were pretty sure about what the NSA was up to; after Snowden, they were completely sure...

    link to this | view in thread ]

  13. identicon
    Anonymous Coward, 26 Sep 2017 @ 4:31am

    "no one has succeeded in breaking the algorithms"

    Just like me and my car's door. I really do not have to break in. I have a key.

    link to this | view in thread ]

  14. identicon
    Anonymous Coward, 26 Sep 2017 @ 8:59am

    'Chris Mitchell, a member of the British delegation, said he supported Simon and Speck, noting that "no one has succeeded in breaking the algorithms.”'

    Give the ultra-close ties between GCHQ and NSA, this statement only makes me question the use of UK-developed-or-vetted crypto in addition to US-developed-or-vetted crypto.

    link to this | view in thread ]

  15. icon
    Ryan (profile), 25 Feb 2022 @ 4:22pm

    Lost Coin Recovery Agency

    It's a sad experience to lose your money to these wallets...I lost mine to Paxful in Dec 2021. A huge amount was stolen but I was lucky to recover it back after weeks of mails with no positive response from Paxful. I finally met a tech guy who tracked and recovered my trading $ with my stolen coin. If you have a similar issue, you can reach out: Jimfundsrecovery at consultant dot com.

    link to this | view in thread ]


Follow Techdirt
Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Discord

The latest chatter on the Techdirt Insider Discord channel...

Loading...
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it
Close

Email This

This feature is only available to registered users. Register or sign in to use it.