{"id":24854,"date":"2014-07-15T11:45:19","date_gmt":"2014-07-15T15:45:19","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24854"},"modified":"2014-07-15T11:45:19","modified_gmt":"2014-07-15T15:45:19","slug":"us-government-software-standards-may-enable-spying-by-nsa","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/us-government-software-standards-may-enable-spying-by-nsa.php","title":{"rendered":"US government software standards may enable spying by NSA"},"content":{"rendered":"<p><p>    San Francisco: US government standards for software may    enable spying by the National Security Agency through widely    used coding formulas that should be jettisoned, some of US' top    independent experts concluded in papers released on Monday.  <\/p>\n<p>    Such mathematical formulas, or curves, are an arcane but    essential part of most technology that prevents interception    and hacking, and the National Institute of Standards and    Technology (NIST) has been legally required to consult with the    NSA's defensive experts in approving them and other    cryptography standards.  <\/p>\n<p>    But NIST's relationship with the spy agency came under fire in    September after reports based on documents from former NSA    contractor Edward Snowden pointed to one formula in particular    as a Trojan horse for the NSA.  <\/p>\n<p>    NIST discontinued that formula, called Dual Elliptic Curve, and    asked its external advisory board and a special panel of    experts to make recommendations that were published on Monday    alongside more stinging conclusions by the individual experts.  <\/p>\n<p>    Noting the partially obscured hand of the NSA in creating Dual    Elliptic Curve - which Reuters reported was most broadly    distributed by security firm RSA - the group delved into the    details of how it and other NIST standards emerged. It found    incomplete documentation and poor explanations in some cases;    in others material was withheld pending legal review.  <\/p>\n<p>    As a whole, the panels recommended that NIST review its    obligation to confer with the NSA and seek legal changes \"where    it hinders its ability to independently develop the best    cryptographic standards to serve not only the United States    government but the broader community.\"  <\/p>\n<p>    They also urged NIST to weigh the advice of individual task    force members who made more dramatic suggestions, such as    calling for the replacement of a larger set of curves approved    for authenticating users, in part because they were selected    through unclear means by the NSA.  <\/p>\n<p>    \"It is possible that the specified curves contain a back door    somehow,\" said Massachusetts Institute of Technology professor    Ron Rivest, a co-founder of RSA and the source of the letter R    in its name. Though the curves could be fine, he wrote, \"it    seems prudent to assume the worst and transition away.\"  <\/p>\n<p>    More broadly, Rivest wrote, \"NIST should ask the NSA for full    disclosure regarding all existing standards... If NSA refuses    to answer such an inquiry, then any standard developed with    significant NSA input should be assumed to be 'tainted,'\"    absent proof of security acceptable to outsiders.  <\/p>\n<p>    In an email exchange, Rivest told Reuters that \"NIST needs to    have a process whereby evidence is publicly presented\" about    how the curves were chosen.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/ibnlive.in.com\/news\/us-government-software-standards-may-enable-spying-by-nsa\/486049-11.html\/RK=0\/RS=Ebmb3JkAYyB7weCxWb4v6tzmphQ-\" title=\"US government software standards may enable spying by NSA\">US government software standards may enable spying by NSA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> San Francisco: US government standards for software may enable spying by the National Security Agency through widely used coding formulas that should be jettisoned, some of US' top independent experts concluded in papers released on Monday. Such mathematical formulas, or curves, are an arcane but essential part of most technology that prevents interception and hacking, and the National Institute of Standards and Technology (NIST) has been legally required to consult with the NSA's defensive experts in approving them and other cryptography standards. But NIST's relationship with the spy agency came under fire in September after reports based on documents from former NSA contractor Edward Snowden pointed to one formula in particular as a Trojan horse for the NSA<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24854","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24854"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24854"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24854\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24854"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24854"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24854"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}