News / USA

Study: NSA Infiltrated RSA Security More Deeply Than Thought

A sign marks the entrance to RAS's facility in Bedford, Massachusetts, March 28, 2014.
A sign marks the entrance to RAS's facility in Bedford, Massachusetts, March 28, 2014.
Reuters
Security industry pioneer RSA adopted not just one but two encryption tools developed by the U.S. National Security Agency, greatly increasing the spy agency's ability to eavesdrop on some Internet communications, according to a team of academic researchers.
 
Reuters reported in December that the NSA had paid RSA $10 million to make a now-discredited cryptography system the default in software used by a wide range of Internet and computer security programs. The system, called Dual Elliptic Curve, was a random number generator, but it had a deliberate flaw - or “back door” - that allowed the NSA to crack the encryption.
 
A group of professors from Johns Hopkins, the University of Wisconsin, the University of Illinois and elsewhere now say they have discovered that a second NSA tool exacerbated the RSA software's vulnerability.
 
The professors found that the tool, known as the “Extended Random” extension for secure websites, could help crack a version of RSA's Dual Elliptic Curve software tens of thousands of times faster, according to an advance copy of their research shared with Reuters.
 
While Extended Random was not widely adopted, the new research sheds light on how the NSA extended the reach of its surveillance under cover of advising companies on protection.
 
RSA, now owned by EMC Corp, did not dispute the research when contacted by Reuters for comment. The company said it had not intentionally weakened security on any product and noted that Extended Random did not prove popular and had been removed from RSA's protection software in the last six months.
 
“We could have been more skeptical of NSA's intentions,” RSA Chief Technologist Sam Curry told Reuters. “We trusted them because they are charged with security for the U.S. government and U.S. critical infrastructure.”
 
Curry declined to say if the government had paid RSA to incorporate Extended Random in its BSafe security kit, which also housed Dual Elliptic Curve.
 
An NSA spokeswoman declined to comment on the study or the intelligence agency's motives in developing Extended Random.
 
The agency has worked for decades with private companies to improve cybersecurity, largely through its Information Assurance Directorate. After the 9/11 attacks, the NSA increased surveillance, including inside the United States, where it had previously faced strict restrictions.
 
Documents leaked by former NSA contractor Edward Snowden showed that the agency also aimed to subvert cryptography standards. A presidential advisory group in December said that practice should stop, though experts looking at the case of Dual Elliptic Curve have taken some comfort in concluding that only the NSA could likely break it.
 
“It's certainly well-designed,” said security expert Bruce Schneier, a frequent critic of the NSA. “The random number generator is one of the better ones.”

Random numbers
 
Cryptography experts have long been suspicious of Dual Elliptic Curve, but the National Institute of Standards and Technology and RSA only renounced the technology after Snowden leaked documents about the back door last year.
 
That was also when the academic team set out to see if they could break Dual Elliptic Curve by replacing two government-issued points on the curve with their own. The professors plan to publish a summary of their study this week and present their findings at a conference this summer.
 
Random numbers are used to generate cryptographic keys - if you can guess the numbers, you can break the security of the keys. While no random number generator is perfect, some generators were viewed as more predictable than others.
 
In a Pentagon-funded paper in 2008, the Extended Random protocol was touted as a way to boost the randomness of the numbers generated by the Dual Elliptic Curve.
 
But members of the academic team said they saw little improvement, while the extra data transmitted by Extended Random before a secure connection begins made predicting the following secure numbers dramatically easier.
 
“Adding it doesn't seem to provide any security benefits that we can figure out,” said one of the authors of the study, Thomas Ristenpart of the University of Wisconsin.
 
Johns Hopkins Professor Matthew Green said it was hard to take the official explanation for Extended Random at face value, especially since it appeared soon after Dual Elliptic Curve's acceptance as a U.S. standard.
 
“If using Dual Elliptic Curve is like playing with matches, then adding Extended Random is like dousing yourself with gasoline,” Green said.
 
The NSA played a significant role in the origins of Extended Random. The authors of the 2008 paper on the protocol were Margaret Salter, technical director of the NSA's defensive Information Assurance Directorate, and an outside expert named Eric Rescorla.
 
Rescorla, who has advocated greater encryption of all Web traffic, works for Mozilla, maker of the Firefox web browser. He and Mozilla declined to comment. Salter did not respond to requests for comment.
 
Though few companies appear to have embraced Extended Random, RSA did. The company built in support for the protocol in BSafe toolkit versions for the Java programming language about five years ago, when a preeminent Internet standards group - the Internet Engineering Task Force - was considering whether to adopt Extended Random as an industry standard. The IETF decided in the end not to adopt the protocol.
 
RSA's Curry said that if Dual Elliptic Curve had been sound, Extended Random would have made it better. “When we realized it was not likely to become a standard, we did not enable it in any other BSafe libraries,” he added.
 
The academic researchers said it took about an hour to crack a free version of BSafe for Java using about $40,000 worth of computer equipment. It would have been 65,000 times faster in versions using Extended Random, dropping the time needed to seconds, according to Stephen Checkoway of Johns Hopkins.
 
The researchers said it took them less than 3 seconds to crack a free version of BSafe for the C programming language, even without Extended Random, because it already transmitted so many random bits before the secure connection began. And it was so inexpensive it could easily be scaled up for mass surveillance, the researchers said.

You May Like

Karzai's Legacy: Missed Opportunities?

Afghanistan's president leaves behind a much different nation than the one he inherited, yet his legacy from 13 years in power is getting mixed reviews More

US Urges Restraint in Hong Kong Protests

Protesters angered by Beijing's decision to only approve candidates that it sanctions for Hong Kong's leadership elections in 2017 More

Archive of Forgotten UCLA Speeches Offers Snapshot of History

Recordings of prominent voices in social change, politics, science and literature from 1960s, early 1970s now available on YouTube More

This forum has been closed.
Comments
     
There are no comments in this forum. Be first and add one

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Treasure Hunters Seek 'Hidden Treasure' in Central Kenyai
X
Gabe Joselow
September 29, 2014 6:20 PM
Could a cave in a small village in central Kenya be the site of buried treasure? A rumor of riches, left behind by colonialists, has some residents dreaming of wealth, while others see it as a dangerous hoax. VOA's Gabe Joselow has the story.
Video

Video Treasure Hunters Seek 'Hidden Treasure' in Central Kenya

Could a cave in a small village in central Kenya be the site of buried treasure? A rumor of riches, left behind by colonialists, has some residents dreaming of wealth, while others see it as a dangerous hoax. VOA's Gabe Joselow has the story.
Video

Video Iran's Rouhani Skeptical on Syria Strikes

Iranian President Hassan Rouhani expressed skepticism Friday that U.S.-led airstrikes in Iraq and Syria could crush Islamic State militants. From New York, VOA’s Margaret Besheer reports the president was also hopeful that questions about Iran’s nuclear program could be resolved soon.
Video

Video US House Speaker: Congress Should Debate Authorization Against IS

As wave after wave of U.S. airstrikes target Islamic State militants, the speaker of the Republican-controlled House of Representatives says he would be willing to call Congress back into session to debate a formal, broad authorization for the use of military force. VOA’s Michael Bowman reports from Washington, where legislators left town 10 days ago for a seven-week recess.
Video

Video Ebola Patients Find No Treatment at Sierra Leone Holding Center

At a holding facility in Makeni, central Sierra Leone, dozens of sick people sit on the floor in an empty university building. They wait in filthy conditions. It's a 16-hour drive by ambulance to Kailahun Ebola treatment center. Adam Bailes was there and reports on what he says are some of the worst situations he has seen since the beginning of this Ebola outbreak. And he says it appears case numbers may already be far worse than authorities acknowledge.
Video

Video Identifying Bodies Found in Texas Border Region

Thousands of immigrants have died after crossing the border from Mexico into remote areas of the southwestern United States in recent years. Local officials in south Texas alone have found hundreds of unidentified bodies and buried them in mass graves in local cemeteries. Now an anthropologist and her students at Baylor University have been exhuming bodies and looking for clues to identify them. VOA’s Greg Flakus has more from Waco, Texas.
Video

Video Ebola Robs Liberians of Chance to Say Good-Bye to Loved Ones

In Liberia, where Ebola has killed more than 1,500 people, authorities have worked hard to convince people to allow specialized burial teams to take away dead bodies. But these safety measures, while necessary, make it hard for people to say good bye to their loved ones. VOA's Anne Look reports on the tragedy from Liberia.
Video

Video Reconstruction? What Reconstruction? Life After War in Gaza

It’s been a month since Israel and the Palestinians agreed to a ceasefire to end 52 days of an air and tank war that left 60,000 homes in Gaza damaged or destroyed and 110,000 homeless. Sharon Behn reports that lack of reconstruction is leading to despair.
Video

Video US, Saudi Arabia and UAE Hit Islamic State's Oil Revenue

The United States, Saudi Arabia and the United Arab Emirates have bombed oil facilities operated by Islamic State militants in Syria. It was a truly collaborative effort, with the two Arab countries dropping the majority of the bombs. The 12 refineries targeted were estimated to generate as much as $2 million per day for the terrorist group. VOA Pentagon correspondent Carla Babb has the story.
Video

Video Russia's Food Sanctions Raise Price Worries, Hopes for Domestic Production

Russia retaliated against Western sanctions imposed for its actions in Ukraine by halting food imports from the West. The temporary import ban on food from Australia, the European Union, Norway and North America has Russian consumers concerned that they could face a sharp increase in food prices. But in an ironic twist, the restrictions aimed at the Kremlin have made Russia's domestic food producers hopeful this can boost their business. VOA's Daniel Schearf reports from Moscow.
Video

Video Washington to Pyongyang: 'Shut This Evil System Down'

U.S. Secretary of State John Kerry is calling on North Korea to shut down prison camps and other human rights abuses following a United Nations Commission of Inquiry into "widespread and systematic human rights violations." VOA State Department Correspondent Scott Stearns reports from the United Nations.
Colonel Steve ‘Spiros’ Pisanos left Greece and came to the U.S. to learn to fly. He flew fighters for the Allies in World War II, narrowly escaping death multiple times.Colonel Steve ‘Spiros’ Pisanos left Greece and came to the U.S. to learn to fly. He flew fighters for the Allies in World War II, narrowly escaping death multiple times.

AppleAndroid