Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
NIST overlooked NSA's cryptography 'back door'
#1
While the article below is about NIST allowing [knowingly] for citizens, companies and programs to be provided with 'encryption' that they knew NSA could get into via a built-in 'back door', it raises in my mind the very real issue of NIST being under the 'thumb' of the intelligence agencies vis-a-vis their 'investigation' of the WTC and 9-11! They are supposed to be an 'independent' agency, guided only by science; however, they clearly are more often guided by political and 'national security' pressures.

NIST overlooked spy agency's cryptography 'back door', say scientists


Aug 5, 2014
[Image: PW-2014-08-05-Cartlidge-nist.jpg]
Independence questioned: did NIST know about the backdoor?
The National Institute of Standards and Technology (NIST) lacks independence and uncritically adhered to the wishes of US electronic eavesdroppers in releasing a weakened random-number generator in 2006. So says a group of mathematicians and computer scientists in a new report commissioned by the lab following the leaking of documents last year by the former National Security Agency (NSA) contractor Edward Snowden. According to those documents, the NSA designed an encryption algorithm to include a "back door" so that it could copy encryption keys from internet users without their knowledge. The algorithm was approved by NIST, which itself develops cryptography technology and advises US companies and government agencies on electronic security issues.
Random-number generators are at the heart of encryption on the Internet. In particular, they provide the 1s and 0s that make up many of the keys that are used to encipher and decipher communications in e-mail exchange, banking and medicine, for example. While sequences of truly random numbers are notoriously difficult to generate, online randomization relies more on data-based "pseudo-random" processes. These usually involve taking a more-or-less random "seed" such as the data associated with timings of key strokes or hard-drive access and then stretching that seed into a sequence using a specially designed algorithm.
The NSA algorithm Dual Elliptic Curve Deterministic Random Bit Generation (Dual_EC_DRBG) relies on the fact that elliptic curves can be used to construct "one-way functions". This means that while it is straightforward to multiply a pair of x, y co-ordinates on such a curve to generate a second set of co-ordinates, it is very hard to reverse the operation to arrive back at the original values of x and y. DUAL_EC uses elliptic curves with two publicly declared co-ordinates P and Q. The algorithm multiplies Q by a factor that is initially dependent on a pseudo-random seed and then removes some of the bits from the resulting x co-ordinate. The programme then re-sets the factor by multiplying it by P, and the new factor is subsequently multiplied by Q to produce the next output sequence. Repeating this cycle many times, Dual_EC should produce a long string of pseudo-random bits.
Trivial for an attacker

However, there is a snag. It turns out that all future (and past) outputs can be predicted if an attacker is able to work out just one set of output co-ordinates from the truncated x value associated with them a relatively trivial task given the fact that Dual_EC, unlike other similar algorithms, cuts off very few of the 1s and 0s describing the x co-ordinate (just two out of 32 bytes) and, crucially, if that attacker knows the mathematical relationship between P and Q.
If P and Q were themselves selected purely at random then this kind of attack, cryptographers say, would be practically impossible. In contrast, however, the algorithm is vulnerable if the person setting it up chooses the values non-randomly in other words, they set up a back door. Many cryptographers believe that the NSA probably knows the relationship between P and Q, and therefore has a back door allowing them to decipher encoded communications.
Being more open

When the story about DUAL_EC and its alleged back door broke last September, NIST responded to the "community concern" by putting the standard containing the algorithm SP 800-90 (which contains three other random-number generators not under suspicion) open for "public comment". NIST then announced in April that it had decided to remove the offending program from the standard. In the meantime, NIST also asked its Visiting Committee on Advanced Technology to investigate how the organization could improve its standards work in the future. The committee then entrusted that task to a specially appointed panel of seven experts.
The panel commended NIST for being "forthcoming, open and transparent" in responding to its enquiries, but concluded that these were qualities sometimes lacking when it is developing cryptographic standards. In individually submitted assessments of what had gone wrong, many of the panel members also said that NIST had made a mistake in approving the algorithm in the first place, arguing that it had done so because it had been overly trusting of the NSA.
NIST failed to exercise independent judgment but instead deferred extensively to the NSA
Edward Felten, Princeton University
Panellist Edward Felten, a computer scientist at Princeton University, argues that NIST should not have allowed the NSA to provide the values of P and Q, or, as a minimum, should have asked the agency to provide evidence of the variables' randomness. "NIST failed to exercise independent judgment but instead deferred extensively to the NSA," he wrote.
Fellow panellist Bart Preneel of KU Leuven University in Belgium believes that NIST has "lost its credibility" and estimates that it will need "several years" to regain the trust of providers and users of Internet services. "It is clear that this could only happen because in some sense NIST was misled by the NSA," he says
Asking the wrong question

Chief cyber-security adviser at NIST, Donna Dodson, says that NIST "did not know that there was a back door" in DUAL_EC before September 2013, and that even today it "still doesn't know" whether the deliberate weakness exists. She adds that "in hindsight" the organization probably would not have issued the algorithm, admitting that although it offered companies the possibility of generating their own values of P and Q, NIST "didn't make it easy" for people to do this. "We focused on the question 'did the algorithm have a back door?', rather than the question we should have asked: 'could the algorithm have had a backdoor?'"
However, mathematician Richard George, who worked for the NSA as a cryptographer for 41 years before retiring in 2011, says "The NSA has never attempted to put a backdoor in a NIST algorithm." Indeed, he insists that the values of P and Q were randomly generated. "There is a relationship between those two values but we don't know what it is," he says. "We provide crypto-variables for the US government, and the same system that was used to generate those random values I was told was used to generate these."
The NIST report is called "NIST Cryptographic Standards and Guidelines Development Process" (PDF).
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Great New 911 Film - NIST insider speaks out about the obvious lies. Peter Lemkin 0 4,662 14-03-2017, 07:25 AM
Last Post: Peter Lemkin
  Trump Aims To Take Back Power Sequestered by 9/11? David Guyatt 31 36,684 20-02-2017, 11:50 AM
Last Post: David Guyatt
  Tony Szamboti's 25 Points of Contention with NIST Lauren Johnson 0 3,595 08-11-2014, 06:36 AM
Last Post: Lauren Johnson
  Tony Szamboti on NIST Lauren Johnson 0 2,787 08-11-2014, 06:36 AM
Last Post: Lauren Johnson
  More BS: an alternative to the NIST fairytale Martin White 4 7,016 04-11-2014, 10:13 AM
Last Post: Martin White
  Prelude To A Lawsuit Against NIST?! Peter Lemkin 4 4,628 04-03-2014, 03:01 AM
Last Post: Lauren Johnson
  The case against the NIST WTC 7 collapse initiation analysis Tony Szamboti 4 4,047 04-11-2013, 07:11 AM
Last Post: Peter Lemkin
  Int'l Center for 9/11 Studies - NIST Cumulus Video Database Released Ed Jewett 10 7,548 09-11-2010, 09:54 PM
Last Post: Peter Lemkin
  NIST photos and videos released Ed Jewett 2 4,280 02-09-2010, 08:55 PM
Last Post: Peter Lemkin
  Pentagon 'Aircraft's' Flight Deck Door NEVER OPEN!!! NEW & NEWS!!!! Peter Lemkin 2 4,757 20-08-2010, 08:48 AM
Last Post: Carsten Wiethoff

Forum Jump:


Users browsing this thread: 1 Guest(s)