Risk
9/9/2013
12:18 PM
Connect Directly
RSS
E-Mail
50%
50%

NSA Crypto Revelations: 7 Issues To Watch

After latest NSA leaks, security and crypto experts sound off on repercussions, unanswered questions and ramifications for U.S tech vendors selling abroad.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
What do the latest National Security Agency (NSA) leaks portend for privacy, the future of cryptography and people's use of encryption, as well as foreign businesses' trust of American-made technology hardware and software?

Documents leaked by NSA whistleblower Edward Snowden, and detailed Friday by the Guardian, The New York Times and ProPublica, have revealed an NSA decryption program, codenamed Bullrun, that has the ability to hack such protocols as HTTPS, VoIP and Secure Sockets Layer. SSL is used to protect today's sensitive Web transactions, including online banking and e-commerce.

"Project Bullrun deals with NSA's abilities to defeat the encryption used in specific network communication technologies," said a leaked NSA document. Leaked documents also revealed that the NSA has modified some commercial encryption products "to make them exploitable" and worked with "industry partners" -- meaning, U.S. technology firms -- to add known exploits or back door access to their software and hardware.

[ How badly will U.S. be hit by eroded international trust? Read NSA's Prism Could Cost U.S. Cloud Companies $45 Billion. ]

In the wake of the Bullrun leak, information security and cryptography experts are sounding off on the biggest resulting security repercussions, as well as questions that remain unanswered:

1. Back Doors Could Be Abused By Others.

The most recently published leaks suggest that the NSA has built back doors into well-known technology products including CryptoAG, Lotus Notes, and possibly Windows, and purposefully weakened encryption standards. "It's probably just a coincidence that Intel has a crypto random number generator called Bull Mountain," tweeted Jeffrey Carr, CEO of network defense firm Taia Global, referring to Intel's random number generator Bull Mountain, which of course bears a passing resemblance to the name of the NSA's Bullrun decryption program.

But what's to stop foreign intelligence agencies, criminal gangs or unscrupulous business rivals from finding and tapping the product back doors or cryptographic weaknesses designed by the NSA? In fact, Pro Publica, which bills itself as a "non-profit newsroom," said that it had chosen to publish the recent information on the NSA's capabilities precisely because of such questions.

"The potential for abuse of such extraordinary capabilities for surveillance, including for political purposes, is considerable," it said. "The government insists it has put in place checks and balances to limit misuses of this technology. But the question of whether they are effective is far from resolved and is an issue that can only be debated by the people and their elected representatives if the basic facts are revealed."

2. Press Reports Omitted Crucial Details.

None of last week's press reports included details from the leaked documents pertaining to precisely which products the NSA might have had back doors added, or which encryption algorithms the agency might have weakened. "I wish we knew more, there isn't enough detail in what's been released to really pin down what we're dealing with," said security researcher and encryption expert Adam Caudill via email. "We know the NSA has attacks -- we just don't know on what, specifically. Most of the things mentioned are systems with many components, not just single algorithms. Without knowing what algorithms, we are left to guess, and speculation can be dangerous."

3. NSA Documents Suggest Crypto Really Works.

Despite the NSA's capabilities, it isn't omniscient or "magical," and in fact faces some real-world encryption challenges, said Bruce Schneier, chief security technology officer of BT, writing in Friday's Guardian. Schneier revealed that for the past two weeks, he's been helping the Guardian review hundreds of top-secret NSA documents that were leaked by whistleblower Edward Snowden.

"How do you communicate securely against such an adversary?" said Schneier. "Snowden said it in an online Q&A soon after he made his first document public: 'Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on.'"

"The crypto is good. It's one of the few things we can rely on," echoed Jon Callas, CTO of Silent Circle and previously a co-founder of PGP, via email. "Snowden said that himself. It's the rest of the systems that need careful examination."

Some of the NSA's most recently revealed operating techniques likewise suggest that encryption still provides protection. "I am sure we'd all like to know more technical details about the weaknesses in the widely deployed ciphers and other algorithms, if there are any and especially if they are serious," said encryption expert Ivan Ristic, director of engineering at Qualys, via email. "But, actually, I don't think that's what is really important. First, we now understand the extent at which the NSA is working to bypass encryption, rather than attack it. I think that's very telling; we can conclude that encryption -- if implemented properly -- works as designed."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Mathew
50%
50%
Mathew,
User Rank: Apprentice
9/11/2013 | 10:41:55 AM
re: NSA Crypto Revelations: 7 Issues To Watch
Jerry -- Influencing is one thing, but undermining is arguably a different matter entirely.
JohnR044
50%
50%
JohnR044,
User Rank: Apprentice
9/10/2013 | 11:20:31 PM
re: NSA Crypto Revelations: 7 Issues To Watch
The news out of NSA just keeps getting worse. This is "SPIES GONE WILD" the sequel. In view of these depressing revelations, we can only do what we little we can do to protect what's left of our privacy.

Encryption won't keep NSA out entirely, but it will make it harder for them to pick us out of the crowd. Decrypting still takes extra time & effort and that little bit of hassle may be enough to keep their noses out of your business.

The same goes for storing stuff on Dropbox, iCloud, etc. Take it down and stash everything in a CloudLocker (www.cloudlocker.it), which works just the same but it's private and stays in your home where they still need a warrant to see inside.
JerryJ
50%
50%
JerryJ,
User Rank: Apprentice
9/10/2013 | 8:44:03 PM
re: NSA Crypto Revelations: 7 Issues To Watch
NSA influencing cryptography designs is ancient news. Consider DES, the 1970's-designed predecessor to AES (ref. http://en.wikipedia.org/wiki/D....
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.