from Hacker News

Did NSA Put a Secret Backdoor in New Encryption Standard? (2007)

by aprescott on 9/5/13, 11:01 PM with 32 comments

  • by EthanHeilman on 9/5/13, 11:26 PM

    Yes, from the New York Times:

    Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.”

    “Eventually, N.S.A. became the sole editor,” the memo says.

  • by semenko on 9/5/13, 11:58 PM

    The NYT piece today had different redactions than the Guardian, showing the NSA may have done this with commercial VPN ASICs.

    The Times includes "Complete enabling for [XXXXXXX] encryption chips used in Virtual Private Network and Web encryption devices." http://www.nytimes.com/interactive/2013/09/05/us/documents-r...

    (compare to http://www.theguardian.com/world/interactive/2013/sep/05/sig... )

  • by jmgrosen on 9/5/13, 11:26 PM

  • by deveac on 9/5/13, 11:52 PM

    You don't even need to ask if the NSA broke the encryption to answer the question "Is this standard effectively compromised and not suitable for use?"

    Based on what we already know, keeping in mind the goal of encryption in the first place, the answer is "yes."

    But it is also a decent assumption to think that it is precisely the NSA that has broken the standard in light of the recent reporting by the NYT.

  • by swombat on 9/5/13, 11:13 PM

    This is clearly exaggerated. There's no way the NSA would ever do such a thing. Surely it would weaken US communications as well, and one of their mandates is to protect US communications - not to spy on americans, which it's forbidden to do.

    NIST and the NSA are obviously above reproach in this case.

    [/sarcasm]

  • by ganeumann on 9/5/13, 11:54 PM

    So, it's six years later. Is Dual_EC_DRBG in use in any commercial products?
  • by cupcake-unicorn on 9/5/13, 11:54 PM

    Is this encryption standard used in any real life applications? It sounds like people had a ton of problems with it even just right as it was released. They may have forced the standard, but it didn't look like it was adopted.
  • by SilliMon on 9/6/13, 12:30 AM

    It is might be time for an audit of code submits to the encryption libararies in open source projects.
  • by pyrocat on 9/5/13, 11:42 PM

  • by rob05c on 9/6/13, 12:02 AM

    That's why my projects use RIPEMD rather than SHA. I prefer my encryption algorithms to not be developed by an organization that has a vested interested in them being broken.
  • by danso on 9/5/13, 11:56 PM

    Would love to see an update to this with some context. So this became a government standard...but was it widely adopted in the industry (outside of government)? It had already been under suspicion of this fatal flaw before its release and Schneier says it was "also three orders of magnitude slower than its peers"...even if the security flaw didn't deter users, I would think a performance drop of three magnitudes would make it unpopular for use in anywhere but the government [insert joke about government inefficiency here].
  • by z3phyr on 9/5/13, 11:49 PM

    Digital fortress anyone?
  • by gfody on 9/6/13, 5:30 AM

    No. (per Betteridge's law of headlines)