News / USA

Study: NSA Infiltrated RSA Security More Deeply Than Thought

A sign marks the entrance to RAS's facility in Bedford, Massachusetts, March 28, 2014.
A sign marks the entrance to RAS's facility in Bedford, Massachusetts, March 28, 2014.
Reuters
— Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.
 
Reuters reported in December that the NSA had paid RSA $10 million to make a now-discredited cryptography system the default in software used by a wide range of Internet and computer security programs. The system, called Dual Elliptic Curve, was a random number generator, but it had a deliberate flaw - or “back door” - that allowed the NSA to crack the encryption.
 
A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability.
 
The professors found that the tool, known as the “Extended Random” extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters.
 
While Extended Random was not widely adopted, the new research sheds light on how the NSA extended the reach of its surveillance under cover of advising companies on protection.
 
RSA, now owned by EMC Corp, did not dispute the research when contacted by Reuters for comment. The company said it had not intentionally weakened security on any product and noted that Extended Random did not prove popular and had been removed from RSA's protection software in the last six months.
 
“We could have been more skeptical of NSA's intentions,” RSA Chief Technologist Sam Curry told Reuters. “We trusted them because they are charged with security for the U.S. government and U.S. critical infrastructure.”
 
Curry declined to say if the government had paid RSA to incorporate Extended Random in its BSafe security kit, which also housed Dual Elliptic Curve.
 
An NSA spokeswoman declined to comment on the study or the intelligence agency's motives in developing Extended Random.
 
The agency has worked for decades with private companies to improve cybersecurity, largely through its Information Assurance Directorate. After the 9/11 attacks, the NSA increased surveillance, including inside the United States, where it had previously faced strict restrictions.
 
Documents leaked by former NSA contractor Edward Snowden showed that the agency also aimed to subvert cryptography standards. A presidential advisory group in December said that practice should stop, though experts looking at the case of Dual Elliptic Curve have taken some comfort in concluding that only the NSA could likely break it.
 
“It's certainly well-designed,” said security expert Bruce Schneier, a frequent critic of the NSA. “The random number generator is one of the better ones.”

Random numbers
 
Cryptography experts have long been suspicious of Dual Elliptic Curve, but the National Institute of Standards and Technology and RSA only renounced the technology after Snowden leaked documents about the back door last year.
 
That was also when the academic team set out to see if they could break Dual Elliptic Curve by replacing two government-issued points on the curve with their own. The professors plan to publish a summary of their study this week and present their findings at a conference this summer.
 
Random numbers are used to generate cryptographic keys - if you can guess the numbers, you can break the security of the keys. While no random number generator is perfect, some generators were viewed as more predictable than others.
 
In a Pentagon-funded paper in 2008, the Extended Random protocol was touted as a way to boost the randomness of the numbers generated by the Dual Elliptic Curve.
 
But members of the academic team said they saw little improvement, while the extra data transmitted by Extended Random before a secure connection begins made predicting the following secure numbers dramatically easier.
 
“Adding it doesn't seem to provide any security benefits that we can figure out,” said one of the authors of the study, Thomas Ristenpart of the University of Wisconsin.
 
Johns Hopkins Professor Matthew Green said it was hard to take the official explanation for Extended Random at face value, especially since it appeared soon after Dual Elliptic Curve's acceptance as a U.S. standard.
 
“If using Dual Elliptic Curve is like playing with matches, then adding Extended Random is like dousing yourself with gasoline,” Green said.
 
The NSA played a significant role in the origins of Extended Random. The authors of the 2008 paper on the protocol were Margaret Salter, technical director of the NSA's defensive Information Assurance Directorate, and an outside expert named Eric Rescorla.
 
Rescorla, who has advocated greater encryption of all Web traffic, works for Mozilla, maker of the Firefox web browser. He and Mozilla declined to comment. Salter did not respond to requests for comment.
 
Though few companies appear to have embraced Extended Random, RSA did. The company built in support for the protocol in BSafe toolkit versions for the Java programming language about five years ago, when a preeminent Internet standards group - the Internet Engineering Task Force - was considering whether to adopt Extended Random as an industry standard. The IETF decided in the end not to adopt the protocol.
 
RSA's Curry said that if Dual Elliptic Curve had been sound, Extended Random would have made it better. “When we realized it was not likely to become a standard, we did not enable it in any other BSafe libraries,” he added.
 
The academic researchers said it took about an hour to crack a free version of BSafe for Java using about $40,000 worth of computer equipment. It would have been 65,000 times faster in versions using Extended Random, dropping the time needed to seconds, according to Stephen Checkoway of Johns Hopkins.
 
The researchers said it took them less than 3 seconds to crack a free version of BSafe for the C programming language, even without Extended Random, because it already transmitted so many random bits before the secure connection began. And it was so inexpensive it could easily be scaled up for mass surveillance, the researchers said.

You May Like

EU Court Fines Poland for Hosting CIA 'Black Sites'

Ruling is first time a court has acknowledged suspects were held and tortured at the sites, under US program launched following the 9/11 terrorist attacks More

Migrant Issues Close to Home Spur Groups to Take Action

Groups placing water, food in the desert, or aiding detainees after release, have one common goal: no more deaths of migrants crossing illegally into the US More

Video At AIDS Conference, Prevention Pill Stirs Excitement

Truveda shows promise, spurring debate over access and other approaches More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Israel Targets Gaza Supply Tunnelsi
X
July 24, 2014 4:42 AM
The Israeli military has launched a ground operation in Gaza to destroy the myriad tunnels that may have been used to smuggle weapons to Hamas. VOA's Zlatica Hoke reports that could mean more hardship for the people of Gaza, who obtain some of their essential supplies through these underground passages
Video

Video Israel Targets Gaza Supply Tunnels

The Israeli military has launched a ground operation in Gaza to destroy the myriad tunnels that may have been used to smuggle weapons to Hamas. VOA's Zlatica Hoke reports that could mean more hardship for the people of Gaza, who obtain some of their essential supplies through these underground passages
Video

Video MH17's 'Black Boxes' Could Reveal Crash Details

The government of Malaysia now has custody of the cockpit voice and flight data recorders from Malaysia Airlines Flight 17, which was hit by a missile over Ukraine before crashing last week. As VOA's Carolyn Presutti reports, the so-called black boxes may hold information about the final minutes of the flight.
Video

Video Living in the Shadows Panel Discussion

Following a screening of the new VOA documentary, "AIDS - Living in the Shadows," at the World AIDS conference in Melbourne, a panel discussed the film and how to combat the stigma associated with HIV/AIDS.
Video

Video IAEA: Iran Turns its Enriched Uranium Into Less Harmful Form

Iran has converted its stockpiles of enriched uranium into a less dangerous form that is more difficult to use for nuclear weapons, according to the United Nations’ Atomic Energy Agency. The move complies with an interim deal reached with Western powers on Iran's nuclear program last year, in exchange for easing of sanctions. Henry Ridgwell reports for VOA from London.
Video

Video Relic of Saint Draws Catholics Worried About Immigration Issue

A Roman Catholic saint who is a figure of devotion for those crossing the border into the United States is attracting believers concerned about the plight of undocumented immigrants. Mike O'Sullivan reports from Los Angeles, where a relic of Saint Toribio has drawn thousands to local churches.
Video

Video US Awards Medal of Honor for Heroics in Bloodiest of Afghan Battles

U.S. combat troops are withdrawing from Afghanistan, on pace to leave the country by the end of this year. But on Monday, U.S. President Barack Obama took time to honor a soldier whose actions while under fire in Afghanistan earned him the Medal of Honor. VOA's Jeff Seldin has more from the Pentagon.
Video

Video Ukraine Rebels Surrender MH17 Black Boxes

After days of negotiations, a senior separatist leader handed over two black boxes from an airliner downed over eastern Ukraine to Malaysian experts early Tuesday. While on Monday, the U.N. Security Council unanimously demanded that armed groups controlling the crash site allow safe and unrestricted access to the wreckage.
Video

Video In Cambodia, HIV Diagnosis Brings Deadly Shame

Although HIV/AIDS is now a treatable condition, a positive diagnosis is still a life altering experience. In Cambodia, people living with HIV are often disowned by friends, family and the community. This humiliation can be unbearable. We bring you one Cambodian woman’s struggle to overcome a life tragedy and her own HIV positive diagnosis.

AppleAndroid