Reuters: RSA Weakened Encryption For $10M From NSA

DamianTV

Member
Joined
Dec 7, 2007
Messages
20,677
http://yro.slashdot.org/story/13/12/21/0041228/reuters-rsa-weakened-encryption-for-10m-from-nsa

(Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.

Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.

The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.

RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.

RSA and EMC declined to answer questions for this story, but RSA said in a statement: "RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own."

The NSA declined to comment.

The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.

Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA's corporate evolution away from pure cryptography products as one of the reasons it occurred.

But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.

"They did not show their true hand," one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.

STORIED HISTORY

Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA's encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.

At the core of RSA's products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.

From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.

The stakes rose when more technology companies adopted RSA's methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.

RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words "Sink Clipper!"

A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.

The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.

"We became the tip of the spear, so to speak, in this fight against government efforts," Bidzos recalled in an oral history.

RSA EVOLVES

RSA and others claimed victory when export restrictions relaxed.

But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.

RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.

And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total.

"When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."

By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.

New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.

An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.

RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.

RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.

"The labs group had played a very intricate role at BSafe, and they were basically gone," said labs veteran Michael Wenocur, who left in 1999.

Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."

After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.

But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.

The White House, meanwhile, says it will consider this week's panel recommendation that any efforts to subvert cryptography be abandoned.
 
This is HUGE!

All the enterprise class servers... NAS/SAN/DAS are using this NSA backdoor security breach.

e.g.

7gy_bor.jpg
 
Freedom on the march.


  1. PRISM: China to investigate IBM, Oracle and EMC following NSA ...
    Aug 16, 2013 - China concerned West could be spying on its secrets,Security ... the security of IBM, Oracle and EMC hardware, following concerns that the NSA could be ... including Google, Apple, Microsoft, Facebook, Twitter and Yahoo.
  2. Investor Lawsuit Blames NSA For $12B Loss In IBM Value
    6 days ago - 54338751 story IBM Businesses China The Almighty Buck The Courts ... Or Apple. .... This is an investor of IBM suing IBM for cooperating with the NSA, and thereby damaging IBMs market valuation, causing said investor to ...
  3. NSA Spying Blowback Continues - Boeing Loses Brazil Jet Order ...
    1 day ago - Sweden's Saab won the contract instead for 36 new fighters to be ... put backdoors for the NSA into every product has prompted China to seek ways ..... Apple, Microshaft, Oracle, Google, AT&T, IBM ...
 
The sad thing is that this should put RSA into the grave, but will amost certainly not.
 
Were rolling out an alternative to RSA where I work. I wonder if this is why?
 
Were rolling out an alternative to RSA where I work. I wonder if this is why?

WOW the BORG has it's tentacles into ALL of them... Hitachi-BlueArc, HP, IBM, Isilon-EMC, Cicso Systems, NettApp...


Well, this should kill business overseas and in certain US markets...

How much did Congressman Mike Rogers(R-MI) and US Senator Dianne Feinstein(D-CSSR) know about this? Their respective committee mineons know?

This is how Fascist Government is killing business, free markets, and the economy. I hope there's a class-action lawsuit against all those government scumbags involved.

Government's big list of products with the spy holes: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/1401vend.htm
 
If more stories like this come out, theres nobody that is going to trust ANYTHING that comes from the USA that needs ANY degree of actual security. They keep accusing Snowden of stealing the keys to the kingdom, but he didnt. He just released information that the NSA bought the keys to the kingdom.

The NSA has betrayed the trust of the entire world.
 
A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.

This is going to get much worse. So much for the US economy.

But hey, no worries. They will pass amnesty and remove immigration limits, so everything will be great! The tech giants can replace their workforces with people at half pay to make up for lost global sales. :rolleyes:
 
Was just going to get a nice big Isilon array too... :(

Looks like a custom Glustre build it is then.
 
If more stories like this come out, theres nobody that is going to trust ANYTHING that comes from the USA that needs ANY degree of actual security. They keep accusing Snowden of stealing the keys to the kingdom, but he didnt. He just released information that the NSA bought the keys to the kingdom.

The NSA has betrayed the trust of the entire world.
You betcha... and after this very month, on Sunday 'Propaganda Mornings' that scumbag Congressman Mike Rogers from Michigan, was interviewed and slamming and pressuring Huawei to exit the U.S. telecom market for allegedly built-in back door security access breaches.

POT=>KETTLE=>BLACK=>LYING HYPOCRITES


Who wants to bet the Fascist Corporatist media blacks this out on 'Propaganda Sunday Mornings'?
 
Last edited:
Pretty safe to say that everything of technology importance has been compromised. Everyone has a price and the "bidder" has a printing press.

AND WE'RE STILL ONLY ABOUT 2% INTO SNOWDEN'S DOCUMENT CACHE!
 
This is going to get much worse. So much for the US economy.

But hey, no worries. They will pass amnesty and remove immigration limits, so everything will be great! The tech giants can replace their workforces with people at half pay to make up for lost global sales. :rolleyes:
I personally know senior HR people, and that's exactly what the executives/boardroom officials have told HR departments to implement... Get rid of the high cost US workers and recruit and use, the foreign low wage and benefits foreign/immigrant workers, esp... H1B/H2C workers. Dilute the high tech, entertainment, energy industries, as fast as possible with cheap foreign labor.

Their analysis in their documents are for, eventual cost savings of 50% So there you have it, cut wages/benefits by half on what Americans are currently earning. That's simply incredible.

PS: It's good to have friends in high places...;) you can seen the game plan from scumbags like; Bill Gates, Warren Buffet, etc... before it hits the economy.
 
I personally know senior HR people, and that's exactly what the executives/boardroom officials have told HR departments to implement... Get rid of the high cost US workers and recruit and use, the foreign low wage and benefits foreign/immigrant workers, esp... H1B/H2C workers. Dilute the high tech, entertainment, energy industries, as fast as possible with cheap foreign labor.

Their analysis in their documents are for, eventual cost savings of 50% So there you have it, cut wages/benefits by half on what Americans are currently earning. That's simply incredible.

PS: It's good to have friends in high places...;) you can seen the game plan from scumbags like; Bill Gates, Warren Buffet, etc... before it hits the economy.

It's a continuing process. ;) CIP, CQI, TQM, ISO 9000, LEAN, DFSS awards for everyone!

(Of course all of the beneficial portions of those methodologies were ignored for the much simpler, "short term, steal now, greed is good, bullshit bingo, death by PowerPoint, baffle them with bullshit" philosophy.)
 
Last edited:
Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract.

Don't use the defaults.
 
What do you guys think about encryption gurus like Bruce Schneider? How about AES as an alternative encryption? DES and Triple DES is broken as shit, the one way encrytpions like MD5 are also cracked all to hell. What alternatives are you guys thinking?
 
What do you guys think about encryption gurus like Bruce Schneider? How about AES as an alternative encryption? DES and Triple DES is broken as shit, the one way encrytpions like MD5 are also cracked all to hell. What alternatives are you guys thinking?

AES Twofish- I believe Truecrypt has it as an option to use.
 
If more stories like this come out, theres nobody that is going to trust ANYTHING that comes from the USA that needs ANY degree of actual security. They keep accusing Snowden of stealing the keys to the kingdom, but he didnt. He just released information that the NSA bought the keys to the kingdom.

Perhaps that is a goal?

The NSA has betrayed the trust of the entire world.

This should surprise nobody. When I first started using the "internet" there were about 16 sites - late 70s - and all there really was to "do" was relay chat. Even in those days I figured someone was watching what was being said. That is the only assumption I have ever made. It was the DARPA internet. Defense Advanced Research Projects Agency.

HELLO.

Internet was BAIT from word one and never less than this.

Oy.
 
Back
Top