Author Topic: RSA sold out to the NSA for 10 million  (Read 1122 times)

0 Members and 1 Guest are viewing this topic.

Offline The Illusive Man

  • The Beast
  • *****
  • Posts: 869
  • Gender: Male
  • Saw the ME3 endings, got turned into a husk. :(-
RSA sold out to the NSA for 10 million
« on: January 04, 2014, 03:19:56 pm »
Yet another nasty secret revealed by Snowden leaks! Really RSA, you sold out for only ten million dollars? At least tack another zero in to your price, have a spine after all.

TL:DR version from Reuters:
Quote
Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.

The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.

RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.
Even notice that when groups go into the private sector they go bad? Thankfully my PGP key is a Diffie-Hellman/DSS not RSA because of proper paranoia. The flawed algorithm Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) was implemented in the BSAFE library. This means trouble for the following huge list of companies because all their listed software had been using Dual_EC_DRBG. TL:DR anything using Dual_EC_DRBG to generate random data for encryption or FIPS integrity checking is fucked.

The following companies and corresponding software are affected:
(click to show/hide)

But wait, there’s MOAR courtesy of  Sam Curry, RSA’s chief technology officer.
Quote
RSA actually added the algorithm to its libraries in 2004 or 2005, before NIST approved it for the standard in 2006 and before the government made it a requirement for FIPS certification, says Sam Curry, the company’s chief technology officer. The company then made it the default algorithm in BSafe and in its key management system after the algorithm was added to the standard. Curry said that elliptic curve algorithms were all the rage at the time and RSA chose it as the default because it provided certain advantages over the other random number generators, including what he says was better security.

“Cryptography is a changing field. Some algorithms go up and some come down and we make the best decisions we can in any point in time,” he says.”A lot of the hash-based algorithms were getting struck down by some weaknesses in how they chose numbers and in fact what kind of sample set they chose for initial seeding. From our perspective it looked like elliptic curve would be immune to those things.”

Curry says the fact that the algorithm is slower actually provides it with better security in at least one respect.

“The length of time that you have to gather samples will determine the strength of your random number generation. So the fact that it’s slower sometimes gives it a wider sample set to do initial seeding,” he says. “Precisely because it takes a little longer, it actually winds up giving you more randomness in your initial seeding, and that can be an advantage.”

Now for some hilarity, two Microsoft employees (Dan Shumow and Niels Ferguson) discovered this in 2007 and no one listened! Their presentation, On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng  PDFversion here, was downplayed by Microsoft and Jon Callas, the CTO of Silent Circle. Callas who now looks like an ass stated that:

Quote
“If [NSA] spent $250 million weakening the standard and this is the best that they could do, then we have nothing to fear from them,” he says. “Because this was really ham-fisted. When you put on your conspiratorial hat about what the NSA would be doing, you would expect something more devious, Machiavellian … and this thing is just laughably bad. This is Boris and Natasha sort of stuff.”
Despite knowing about indoctrination I thought it was a good idea to put a human Reaper near my office. Now I am a sentient husk :(.

*RRRRRRRRRRAAAAAAAAAAAAAAAAAWWWWWWWWWWWWRRRRRRRRR* *SCREECH* *smokes*


Offline Ironchew

  • Official Edgelord
  • The Beast
  • *****
  • Posts: 1888
  • Gender: Male
  • The calm, intellectual Trotsky-like Trotskyist
Re: RSA sold out to the NSA for 10 million
« Reply #1 on: January 04, 2014, 06:20:39 pm »
Sounds like the NSA paid for an exploit of a known flawed implementation of RSA, not a fundamental weakness of RSA itself. That's what Shor's algorithm is for; just build a reliable quantum computer with enough qubits first.
Consumption is not a politically combative act — refraining from consumption even less so.