Backdoored standards show we desperately need more cryptographers

Posted by   Virus Bulletin on   Sep 11, 2013

Too few currently possess the skills to verify standards.

Recent revelations of the NSA's crypto-breaking capabilities have led to calls for better cryptography. But we need more cryptographers too.

In the 2010 edition of their classic book Cryptography Engineering, Bruce Schneier, Niels Ferguson and Tadayoshi Kohno wrote on the SHA family of hash functions:

"At least they have been standardized by NIST, and they were developed by the NSA."

And, in case that would worry some readers, they added a footnote:

"Whatever you may think about the NSA, so far the cryptography it has published has been quite decent."

Given revelations on how the NSA effectively wrote a NIST standard in which it inserted a (mathematical) backdoor, I doubt these sentences will make it to the next edition unaltered.

What the NSA did was undoubtedly bad and will further damage the agency's reputation within the security community. But I think it also says something important about today's cryptography.

Earlier this year I blogged about how Microsoft appears to make HTTP requests to URLs shared via Skype, proving the company had access to the unencrypted content of Skype conversations.

The source code of Skype is closed. Which means that, even before this discovery, if it would matter to you if Microsoft read your conversations (or shared them with third parties) you had no way of verifying that this didn't happen - so it came down to how much you trusted Microsoft.

Now compare that with cryptography standards, which tend to be public. "Dual_EC_DRBG" had been published by NIST for more than a year before two Microsoft researchers, including the aforementioned Niels Ferguson, found a vulnerability that could act as a backdoor.

It is certainly possible that other cryptography standards contain backdoors, inserted by the NSA or other agencies. In an op-ed for Wired, Bruce Schneier writes:

"Certainly the fact that the NSA is pushing elliptic-curve cryptography is some indication that it can break them more easily."

Although he reckons that using longer keys is an easy fix.

ECC group addition
  Group addition on an elliptic curve. Source: Wikimedia Commons.

Elliptic curve cryptography (ECC) is generally seen as the next step for cryptography, replacing decades-old algorithms like Diffie-Helman and RSA. It is certainly a powerful tool that will help fend encryption against ever-faster cracking methods. But it has an important weakness: it is very hard to understand.

It is part of a much broader branch of mathematics called arithmetic geometry. This requires a lot of prior knowledge so that, despite its important applications, the vast majority of maths students will never encounter anything of it during their studies. Most of those that do will only briefly touch upon it.

Even those mathematicians that will learn enough about elliptic curves over finite fields to understand ECC and its many pitfalls do not necessarily have a good enough understanding of computer architecture to be able to implement the algorithms or write standards.

All in all, the number of proper experts in ECC is really small. A few thousand, perhaps even fewer. Given how difficult it is to find bugs in other people's code - especially if you're not sure there is a bug in the first place - it could be that there are mathematical backdoors in some of the other standards. Standards that are out there for billions of Internet readers to download and check.

It is also possible that there aren't any more of these backdoors and that most of the standards, including ones that the NSA worked on, are actually quite good. Yet that lack of certainty could cause us to throw away the baby with the bath water.

The ongoing revelations have resulted in an increased interest in cryptography. Hopefully, it will also result in more cryptographers. We need them now more than ever.

Posted on 11 September 2013 by Martijn Grooten

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

A crime against statistics that is probably worse than the cyber attacks faced in County Durham

A report on the number of cyber attacks faced by UK local authorities is a good example of how the large numbers seen in many reports on security are rather meaningless.

NCSC gives important advice on lateral movement

The UK's National Cyber Security Centre (NCSC) has provided helpful and practical advice on preventing and detecting lateral movement by an attacker within a network.

What kind of people attend Virus Bulletin conferences?

If you are considering submitting a proposal for a talk to VB2018 and you're not familiar with the event, you may find it useful to know what kind of people attend the conference.

Olympic Games target of malware, again

An unattributed malware attack has disrupted some computer systems of the 2018 Winter Olympics. In 1994, a computer virus also targeted the Winter Olympics.

There are lessons to be learned from government websites serving cryptocurrency miners

Thousands of websites, including many sites of government organisations in the UK, the US and Sweden, were recently found to have been serving a cryptocurrency miner. More interesting than the incident itself, though, are the lessons that can be…