US Standards for Software May Allow 'Back Doors' for the NSA: Experts

Advertisement
By Reuters | Updated: 15 July 2014 09:13 IST
U.S. government standards for software may enable spying by the National Security Agency through widely used coding formulas that should be jettisoned, some of the country's top independent experts concluded in papers released on Monday.

Such mathematical formulas, or curves, are an arcane but essential part of most technology that prevents interception and hacking, and the National Institute of Standards and Technology (NIST) has been legally required to consult with the NSA's defensive experts in approving them and other cryptography standards.

But NIST's relationship with the spy agency came under fire in September after reports based on documents from former NSA contractor Edward Snowden pointed to one formula in particular as a Trojan horse for the NSA.

Advertisement

NIST discontinued that formula, called Dual Elliptic Curve, and asked its external advisory board and a special panel of experts to make recommendations that were published on Monday alongside more stinging conclusions by the individual experts.

Noting the partially obscured hand of the NSA in creating Dual Elliptic Curve - which Reuters reported was most broadly distributed by security firm RSA - the group delved into the details of how it and other NIST standards emerged. It found incomplete documentation and poor explanations in some cases; in others material was withheld pending legal review.

Advertisement

As a whole, the panels recommended that NIST review its obligation to confer with the NSA and seek legal changes "where it hinders its ability to independently develop the best cryptographic standards to serve not only the United States government but the broader community."

They also urged NIST to weigh the advice of individual task force members who made more dramatic suggestions, such as calling for the replacement of a larger set of curves approved for authenticating users, in part because they were selected through unclear means by the NSA.

Advertisement

"It is possible that the specified curves contain a back door somehow," said Massachusetts Institute of Technology professor Ron Rivest, a co-founder of RSA and the source of the letter R in its name. Though the curves could be fine, he wrote, "it seems prudent to assume the worst and transition away."

More broadly, Rivest wrote, "NIST should ask the NSA for full disclosure regarding all existing standards... If NSA refuses to answer such an inquiry, then any standard developed with significant NSA input should be assumed to be 'tainted,'" absent proof of security acceptable to outsiders.

Advertisement

In an email exchange, Rivest told Reuters that "NIST needs to have a process whereby evidence is publicly presented" about how the curves were chosen.

The curves faulted on Monday had been questioned by outsiders after media reports in September said the NSA could break much widely used security software, without detailing which ones or how. "These curves are ubiquitous in commercial cryptography," Johns Hopkins University professor Matthew Green said in an interview. "If you connected to Google or Facebook today, you probably used one."

Rivest's long association with RSA, now part of electronic storage maker EMC Corp, made his remarks more poignant. But prominent task force colleagues including Internet co-creator Vint Cerf and Ed Felten, former chief technologist at Federal Trade Commission, also gave strongly worded verdicts on the Department of Commerce unit.

"It cannot be accepted that NIST's responsibilities should be co-opted by the NSA's intelligence mission," wrote Cerf, who now works at Google Inc.

While Rivest called the internal history of Dual Elliptic Curve a "smoking gun" with an "almost certain" NSA back door, Felten wrote that NSA might not remain alone in its ability to use it and other possible NIST-approved holes for spying.

In each of three cases, including Dual Elliptic Curve and the more common curves faulted by Rivest, Felten said the suspected back door access "reduces the security of users against attack by other adversaries, including organized crime groups or foreign intelligence services."

The NSA might have been able to generate curves that pass cursory security tests but are still breakable through the aid of sheer computing power, because it can try millions of curves and get a few that fit its goals. But a researcher working for another country could discover the flaw, Felten said.

In the case of the curves approved under the FIPS 186 standard for authenticating digital signatures, NIST should start over and pick its own curves publicly rather than relying on the NSA, Felten and others said.

Several experts said NIST had to hire more cryptographers and strengthen its internal processes to avoid relying on NSA.

NIST acting Director Willie May agreed in a statement, saying his agency "must strengthen its in-house cryptography capabilities to ensure we can reach independent conclusions about the merits of specific algorithms or standards."

NIST did not respond to a Reuters email asking about the fate of the suspect curves.

© Thomson Reuters 2014

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. Oppo Find X9 Ultra With 200-Megapixel Periscope Camera Launched Globally
  2. Motorola Edge 70 Fusion Review
  3. OnePlus Ace 6 Ultra's Key Specifications Surface via Geekbench Listing
  4. Jailer 2 OTT Release Date Reportedly Revealed Online: When and Where to Watch it Online?
  5. Motorola Edge 70 Pro+ Leaked Renders Hint at Design, Five Colour Options
  6. Poco M8s 5G Debuts Globally With 7,000mAh Battery: See Price, Features
  7. Oppo Pad 5 Pro With 13,380mAh Battery Debuts Alongside Pad Mini: See Prices
  1. NASA Shuts Down Voyager 1 Instrument to Extend Mission Life in Deep Space
  2. Oppo Enco Clip 2 With Open-Ear Design, Up to 40 Hours Total Battery Life Launched Alongside Oppo Watch X3 Mini
  3. Vivo Y6t Launched With 6,500mAh Battery, Snapdragon 4 Gen 2 SoC: Price, Specifications
  4. OCBC Partners Lion Global Investors and DigiFT to Launch Tokenised Gold Fund With GOLDX Token
  5. Oppo Pad 5 Pro Launched With 13,380mAh Battery, Snapdragon 8 Elite Gen 5 SoC Alongside Oppo Pad Mini: Price, Features
  6. Redmi K90 Max Launched With Dimensity 9500 SoC, 8,550mAh Battery and Active Cooling Fan: Price, Specifications
  7. Oppo Find X9 Ultra Launched With Snapdragon 8 Elite Gen 5 SoC, 200-Megapixel Periscope Camera: Price, Specifications
  8. Oppo Find X9s Pro Launched With 200-Megapixel Cameras, 7,025mAh Battery: Price, Specifications
  9. OnePlus Ace 6 Ultra Geekbench Listing Reveals MediaTek Dimensity 9500 Chip, 16GB RAM
  10. Motorola Edge 70 Pro+ Leaked Renders Hint at Design, Five Colour Options
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.