{"id":24882,"date":"2014-07-16T03:44:26","date_gmt":"2014-07-16T07:44:26","guid":{"rendered":"http:\/\/www.opensource.im\/?p=24882"},"modified":"2014-07-16T03:44:26","modified_gmt":"2014-07-16T07:44:26","slug":"overreliance-on-the-nsa-led-to-weak-crypto-standard-nist-advisers-find","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/overreliance-on-the-nsa-led-to-weak-crypto-standard-nist-advisers-find.php","title":{"rendered":"Overreliance on the NSA led to weak crypto standard, NIST advisers find"},"content":{"rendered":"<p><p>    The    National Institute of Standards and Technology needs to hire    more cryptographers and improve its collaboration with the    industry and academia, reducing its reliance on the U.S.    National Security Agency for decisions around cryptographic    standards.  <\/p>\n<p>    Lack of    internal expertise in certain areas of cryptography and too    much trust in the NSA led NIST to ignore security concerns    about a pseudorandom number generator called Dual_EC_DRBG (Dual    Elliptic Curve Deterministic Random Bit Generator) in 2006,    technical experts who reviewed the organizations standards    development process said in     a report released Monday.  <\/p>\n<p>    Media    reports last year based on secret documents leaked by former    NSA contractor Edward Snowden claimed that the NSA used its    influence over NIST to insert a backdoor into Dual_EC_DRBG and    possibly weaken other cryptographic standards. The revelations    called into question the integrity of NISTs standard-making    processes and damaged the organizations reputation in the    cryptographic community.  <\/p>\n<p>    The new    report by NISTs Visiting Committee on Advanced Technology    (VCAT) is based on assessments by a panel of outside technical    experts including Internet pioneer Vint Cerf, who is vice    president and chief evangelist at Google; cryptographer and    Massachusetts Institute of Technology professor Ron Rivest, who    co-authored the widely used RSA encryption algorithm; Edward    Felten, professor and director of the Center for Information    Technology Policy at Princeton University; Ellen Richey,    executive vice president and chief enterprise risk officer at    Visa; Steve Lipner, partner director of software security at    Microsoft; Belgian cryptographer and cryptanalyst Bart Preneel,    who works as a professor at the University of Leuven; and Fran    Schrotter, senior vice president and chief operating officer of    the American National Standards Institute.  <\/p>\n<p>    Regarding the inclusion of Dual_EC in its SP 800-90A    recommendation, NIST failed to exercise independent judgment    but instead deferred extensively to NSA, Felten wrote in his    assessment. After DUAL_EC was proposed, two major red flags    emerged. Either one should have caused NIST to remove DUAL_EC    from the standard, but in both cases NIST deferred to NSA    requests to keep DUAL_EC.  <\/p>\n<p>    NISTs    limited staffing and their lack of experience with elliptic    curves, mathematical constructs that have important    applications in cryptography and are used in DUAL_EC, were    important factors that contributed to NISTs mistakes,    according to Felten.  <\/p>\n<p>    Internally, NIST has very limited cryptographic expertise:    just a handful of cryptographers, Rivest also wrote in his    assessment. The internal capabilities at NIST to develop and    evaluate cryptographic standards is by itself not sufficient to    produce the desired cryptographic standards, particularly given    the number of standards and guidelines involved. Additional    expertise is essential.  <\/p>\n<p>    While    Dual_EC is the most obvious candidate for a standard    intentionally weakened by the NSA, suspicion lingers over all    NIST standards that the NSA played a significant role in    developing.  <\/p>\n<p>    The    panel of experts also looked at two other issues: NISTs    decision to recommend NSA-chosen elliptic curves for ECDSA    (Elliptic Curve Digital Signature Algorithm) in the FIPS 186    (Digital Signature Standard), and the recommendation of certain    NSA-designed cipher modes for specific uses in the SP 800-38    series (Recommendation for Block Cipher Modes of Operation),    despite evidence of security weaknesses.  <\/p>\n<p>    The    damage caused by a Dual_EC_DRBG backdoor may be small because    few users may have actually used the pseudorandom number    generator, Rivest said. However, the damage to NIST and its    credibility for developing trustworthy cryptographic standards    is considerable. Not only do other NIST standards developed in    coordination with the NSA now need critical review, but the    process for developing future standards needs re-assessment and    reformulation.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2454380\/overreliance-on-the-nsa-led-to-weak-crypto-standard-nist-advisers-find.html\/RK=0\/RS=90GUvSKh_bamhE9A2q4OMhCbsBo-\" title=\"Overreliance on the NSA led to weak crypto standard, NIST advisers find\">Overreliance on the NSA led to weak crypto standard, NIST advisers find<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The National Institute of Standards and Technology needs to hire more cryptographers and improve its collaboration with the industry and academia, reducing its reliance on the U.S. National Security Agency for decisions around cryptographic standards. Lack of internal expertise in certain areas of cryptography and too much trust in the NSA led NIST to ignore security concerns about a pseudorandom number generator called Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) in 2006, technical experts who reviewed the organizations standards development process said in a report released Monday. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-24882","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24882"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=24882"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/24882\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=24882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=24882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=24882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}