Forgot your password?
typodupeerror
Security

+ - New Encryption Standard may Contain Backdoor 1

Submitted by
Hugh Pickens
Hugh Pickens writes "Bruce Schneier has a story on Wired about the new official standard for random-number generators the NIST released this year that will likely be followed by software and hardware developers around the world. There are four different approved techniques (pdf), called DRBGs, or "Deterministic Random Bit Generators" based on existing cryptographic primitives. One is based on hash functions, one on HMAC, one on block ciphers and one on elliptic curves. The generator based on elliptic curves called Dual_EC_DRBG has been has been championed by the NSA and contains a weakness that can only be described a backdoor. In a presentation at the CRYPTO 2007 conference (pdf) in August, Dan Shumow and Niels Ferguson showed that there are constants in the standard used to define the algorithm's elliptic curve that have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG. "We don't know where the constants came from in the first place. We only know that whoever came up with them could have the key to this backdoor. And we know there's no way for NIST — or anyone else — to prove otherwise," says Schneier."
This discussion was created for logged-in users only, but now has been archived. No new comments can be posted.

New Encryption Standard may Contain Backdoor

Comments Filter:
  • That's like getting keys to your house copied by the burglers in prison. Of course they will make you encryption - that way they know how to break it...

"The trouble with doing something right the first time is that nobody appreciates how difficult it was." -- Walt West

Working...