Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

DanTex

(20,709 posts)
Fri Sep 6, 2013, 05:01 PM Sep 2013

Has the NSA really broken “strong” encryption?

http://www.pcpro.co.uk/blogs/2013/09/06/has-the-nsa-really-broken-strong-encryption/

It’s been reported that GCHQ and the US National Security Agency have managed to crack the encryption systems we use to protect emails, personal data and financial transactions. If this means HTTPS, SSL and so forth are no longer secure, it’s a huge deal. You may not be immediately alarmed about the idea of spy agencies accessing your supposedly private data, but if they’ve found a technique for getting around strong encryption, it could sooner or later find their way into less well-meaning hands.

Frustratingly, however, we don’t know the specifics of what’s really been broken. The original report in The Guardian – based on revelations from US whistleblower Edward Snowden – describes specific intelligence programmes; but the central allegation rests on a mysterious “breakthrough”, of which no details are provided.


Cracking the code?

In truth, it seems unlikely that the NSA has found a quick way to decrypt files protected by an industry standard algorithm such as AES and RSA. These systems are used precisely because, so far as any mathematician has been able to prove, the only way of finding a decryption key is by trial and error. If anyone were able to discover a quick way of doing it, it would be huge news, not just for the encryption industry, but for mathematics as a whole. It’s very unlikely that such a discovery might have been made in secret.

So that leaves the brute-force approach – and even for the NSA, with its comparatively vast computing resources, this simply isn’t practical. With a 256-bit key system, the number of possible combinations is approximately 115,792, 089,237,316,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000, 000,000,000,000,000,000. I don’t care how many billions of dollars you throw at the problem, when you’re up against those odds for every single message or file you want to read, you’re not going to be able to keep up. Snowden himself has previously affirmed that “properly implemented strong crypto systems are one of the few things that you can rely on”.

...
32 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Has the NSA really broken “strong” encryption? (Original Post) DanTex Sep 2013 OP
What about using a proxy server? Manifestor_of_Light Sep 2013 #1
Well, the algorithms are pretty simple. longship Sep 2013 #2
I'm very skeptical about this too, but a possibility I can imagine... Silent3 Sep 2013 #3
I think you are on the right track. In cases where they could not actually crack GoneFishin Sep 2013 #4
Agreed. I think that, if such cracks exists, they will be primarily implemented through Egalitarian Thug Sep 2013 #6
Yep Aerows Sep 2013 #19
It would be something like that. DanTex Sep 2013 #7
Hardware cracks. Aerows Sep 2013 #21
Well, maybe. But... longship Sep 2013 #8
My basic thought (hope) is that with open source you're safe. DanTex Sep 2013 #9
Yup, always a danger. longship Sep 2013 #14
If computer generated random numbers Aerows Sep 2013 #11
Well, you've got to generate the key somehow. longship Sep 2013 #16
Pseudo random Aerows Sep 2013 #18
Agreed. longship Sep 2013 #22
Many do, though Aerows Sep 2013 #24
You and Dan rock Aerows Sep 2013 #25
I was under the impression that /dev/random is pretty good. DanTex Sep 2013 #26
I thought it was hardware, if MoBo has it. longship Sep 2013 #29
No, but most people's home and work computers have been broken. hunter Sep 2013 #5
If you think they haven't "cracked" (read: back door) commercial encryption Aerows Sep 2013 #10
How about open source? DanTex Sep 2013 #12
That's where I see our safety and salvation Aerows Sep 2013 #13
I tend to agree. I run open source (mostly). DanTex Sep 2013 #15
"I've read 0% of the Linux kernel" Aerows Sep 2013 #17
I agree with you. It's just one of those things, like going to the gym more... DanTex Sep 2013 #20
No problem. lpbk2713 Sep 2013 #23
Absolutely NO, although they might want you to think that... devils chaplain Sep 2013 #27
Two questions... whttevrr Sep 2013 #28
You are right, yes. MineralMan Sep 2013 #30
but... whttevrr Sep 2013 #31
I know, but news is often bad. MineralMan Sep 2013 #32

longship

(40,416 posts)
2. Well, the algorithms are pretty simple.
Fri Sep 6, 2013, 05:25 PM
Sep 2013

They depend on "trap door" equations, ones that have no analytical inverse solution. An example is the product of two large prime numbers. It is not possible to factor a very large number except for exhaustive search. Such facts are used to design these trap doors.

By increasing the length of keys one can make these algorithms arbitrarily secure, meaning that the ability to crack a shorter key doesn't mean one could crack a longer one in any reasonable length of time even with huge computer resources (like the NSA).

These are the principles that make strong encryption so secure. It is not reasonable to claim that they are not safe. And there are plenty of people whose jobs are to insure their continued security.

Silent3

(15,206 posts)
3. I'm very skeptical about this too, but a possibility I can imagine...
Fri Sep 6, 2013, 05:41 PM
Sep 2013

...(if I were to put my tinfoil hat on) is that the NSA (or other government agency) has somehow influenced code commonly used to generate encryption keys such that the solution space one needs to search is significantly smaller than you'd get have to deal with if key generation used purely random factors.

GoneFishin

(5,217 posts)
4. I think you are on the right track. In cases where they could not actually crack
Fri Sep 6, 2013, 05:45 PM
Sep 2013

the encryption they paid money or otherwise influenced the companies to leave vulnerabilities for them to exploit.

 

Egalitarian Thug

(12,448 posts)
6. Agreed. I think that, if such cracks exists, they will be primarily implemented through
Fri Sep 6, 2013, 05:48 PM
Sep 2013

cooperative hardware, not a brute force break.

DanTex

(20,709 posts)
7. It would be something like that.
Fri Sep 6, 2013, 05:54 PM
Sep 2013

To have actually cracked the encryption the "hard way" they would have had to outsmart the entire world's mathematical community, which is highly doubtful. But I can easily see them influencing commercial encryption implementations in order to make them easier to crack, for example in the way you describe.

longship

(40,416 posts)
8. Well, maybe. But...
Fri Sep 6, 2013, 06:03 PM
Sep 2013

Many computers today have noise circuits in them for generating random numbers. OS like Linux can access these as part of their kernels. I am not sure how prevalent this is now. It's been a few years since I've been involved deeply. But the Linux kernel still has the random device.

When one generates a new key pair for public key crypto such a device is used along with another source, for instance typing on a keyboard, to generate the keys. There is no way with an open source software that the NSA can get in to influence such key generation since it can be done while disconnected from the Net and the source code can be checked (and IS checked).

As far as proprietary software, I don't think many companies would put their clients at risk by deliberately building insecure crypto software, even at the request of the NSA. If I were lead tech, I would tell NSA to get bent. The chance that it would get leaked out is too great and then clients using the software would be open to exploit. Imagine if the client was the US Federal Reserve Bank, for instance. Or, a large state bank somewhere.

I think strong crypto is secure.

Good post, though. Interesting to ponder these things.

DanTex

(20,709 posts)
9. My basic thought (hope) is that with open source you're safe.
Fri Sep 6, 2013, 06:09 PM
Sep 2013

The problem with commercial vendors is that the government could go to them and force them to put in a backdoor and also force them not to tell anyone about it. If I were lead tech, I would also want to tell the NSA to get bent, but then I would probably find myself out of a job, and also with a gag order that would send me to prison if I told the press.

I think the real issue, though, is not breaking the crypto, but how easy it is to get trojan horses. Even with open source. I've installed who knows how many packages. Yes in theory, they're open source, and malicious code would have been found by "thousands of eyes", but in reality who's to say the NSA hasn't put in a few obfuscated lines of code somewhere in there.

longship

(40,416 posts)
14. Yup, always a danger.
Fri Sep 6, 2013, 06:22 PM
Sep 2013

That's why a lot of eyes on the code are a good idea. The more, the better.

Also, install only from known secure sites so no Trojans can be snuck into the code.

I started Linux with Slackware 2.x (can't remember, it was an early 2.x) in the mid 90's. I've used SuSE, Debian, Gentoo, and Ubuntu. So, I've had a lot of experience with Linux. Now I stick with Ubuntu, but my big box is an older Gentoo AMD 64 twin core. Runs like a dream.


 

Aerows

(39,961 posts)
11. If computer generated random numbers
Fri Sep 6, 2013, 06:16 PM
Sep 2013

are an argument, we are doomed. Particularly with elliptical.

Constants are notoriously easy to penetrate, and random has never meant random in machine language due to the fact that it is possible to track the generation of a "random" constant.

longship

(40,416 posts)
16. Well, you've got to generate the key somehow.
Fri Sep 6, 2013, 06:27 PM
Sep 2013

And I don't know how the NSA can sneak into my machine to force a key. I mean, they aren't magic.

Please expand what you're saying as I am unsure of what that is.

longship

(40,416 posts)
22. Agreed.
Fri Sep 6, 2013, 06:45 PM
Sep 2013

How does one insure a large cycle size? Eventually all pseudo random number generators must repeat their cycles. I played with them per Knuth once and realized how bad the problem could be.

I would hope they've solved that problem by now.

Linux has /dev/random but I am no kernel expert. I presume it is meant to connect to hardware RNG, like a noise circuit, or a very fast clock. I haven't built a computer in a few years, so I don't know if it connects to anything on my current boxes.

But I have little need for strong encryption these days. When I was in the business, I used it all the time. I've not kept up on things for a couple of years, but I was pretty deep into things for some time.

Thanks for your response.

 

Aerows

(39,961 posts)
24. Many do, though
Fri Sep 6, 2013, 06:50 PM
Sep 2013

that's why it is a hotly debated topic and harshly enjoined decision.

You are obviously more involved and informed. That's why I ask.

 

Aerows

(39,961 posts)
25. You and Dan rock
Fri Sep 6, 2013, 06:56 PM
Sep 2013

I am eating the worst pizza in the history of pizza, but I'm starving.

EDIT: Aerows, ate the worst pizza ever made by mankind, ate it, survived, and lived to complain about it. Vomiting may occur.

DanTex

(20,709 posts)
26. I was under the impression that /dev/random is pretty good.
Fri Sep 6, 2013, 07:00 PM
Sep 2013

I think it grabs some "truly random" bits (from somewhere) and expands them into more pseudorandom bits in a "good" way. So obviously I'm not an expert here but that was my impression.

longship

(40,416 posts)
29. I thought it was hardware, if MoBo has it.
Fri Sep 6, 2013, 07:55 PM
Sep 2013

On the MoBo they put what is just a noise circuit -- a diode of some kind or something like that which spits out random noise. All one does is read bits off the noise somehow. Voila! You have your random element. (Or something like that.) One could also get a random seed from the least significant bytes of a very fast clock.

There's provisions for such a thing in the kernel when one compiles it, or as a kernel library on precompiled kernels. That's what gives you /dev/random AFAIK.

One would have to look at ones MoBo spec to see if it has one of these and I haven't done that in years. I am kind of out of things these days. My info may be out of date.

hunter

(38,311 posts)
5. No, but most people's home and work computers have been broken.
Fri Sep 6, 2013, 05:47 PM
Sep 2013

Me, I don't give a shit. I always do my best to say what I mean.

 

Aerows

(39,961 posts)
10. If you think they haven't "cracked" (read: back door) commercial encryption
Fri Sep 6, 2013, 06:13 PM
Sep 2013

I have bridges to sell you. Proprietary code is notorious for containing things that you would rather it didn't.

DanTex

(20,709 posts)
12. How about open source?
Fri Sep 6, 2013, 06:17 PM
Sep 2013

Have they cracked the actual protocols, or just forced commercial vendors to put in back doors? An important question IMO.

 

Aerows

(39,961 posts)
13. That's where I see our safety and salvation
Fri Sep 6, 2013, 06:19 PM
Sep 2013

Everyone can examine the source and can compile their own. If you have the source, and you control the compile, you control the code.

Maybe I'm naive, but that is my thought, anyway.

DanTex

(20,709 posts)
15. I tend to agree. I run open source (mostly).
Fri Sep 6, 2013, 06:25 PM
Sep 2013

But here's the thing. I'm a computer/math type, and I certainly don't read close to 1% of the source that install. In fact, I've read 0% of the Linux kernel. Who's to know if the NSA has snuck in some obfuscated backdoor? Certainly not me.

 

Aerows

(39,961 posts)
17. "I've read 0% of the Linux kernel"
Fri Sep 6, 2013, 06:30 PM
Sep 2013

Why not? It's kind of important to know what you are deploying on a system.

It's kind of like a doctor proudly declaring that he's not read any of the Merck resource on drugs because he'd know if they caused a reaction.

Don't get me wrong, I'm not kicking you for being so certain of such things, but I guess I'm not the same. I will plow deep into the things that I compile to use them to the best of my ability. Best of my ability.

DanTex

(20,709 posts)
20. I agree with you. It's just one of those things, like going to the gym more...
Fri Sep 6, 2013, 06:39 PM
Sep 2013

Believe, me, understanding the Linux kernel better is on my list, but it just never reaches the top.

Regarding being "certain", I hope I didn't give the wrong impression. I actually feel fairly uncertain. I kinda sorta hope that some other people (like you) are looking at the open-source software I install and making sure it works and is safe, but my point is that I haven't personally made sure of that, and I'm someone who actually could if I really wanted to. Most open-source users wouldn't have the technical knowledge to read the source even if they wanted. And even if I read a few percent of the source, which would take a very long time, I still would be very far from being able to spot some malicious code.

My point is that even with open source, we are (or at least I am) still relying on the "thousand eyes" to make sure things are right, as opposed to my own eyes.

devils chaplain

(602 posts)
27. Absolutely NO, although they might want you to think that...
Fri Sep 6, 2013, 07:03 PM
Sep 2013

They can't decrypt strong encryption. What they've achieved is success in twisting the arms (or perhaps gently nudging) corporations into including back doors in their proprietary encryption software. Open source stuff such as OpenPGP and Truecrypt are still uncompromised.

whttevrr

(2,345 posts)
28. Two questions...
Fri Sep 6, 2013, 07:47 PM
Sep 2013

First, how many pages would the average program print out if you printed out the source code?
For instance: How many pages of text would the Linux kernel be?

Second, what if the 1,000 eyes were only a few handfuls of something or other?
Because 1,000 eyes implies 500 people scouring every page of code tirelessly every day... when actuality probably gets us maybe a few dozen looking at some choice areas?

amiright?

whttevrr

(2,345 posts)
31. but...
Fri Sep 6, 2013, 08:09 PM
Sep 2013

I don't want to be.

You were supposed to come back with a retort about 1000 nerds, locked in a mothers basement, reading every single line of code that ever gets compiled.

Thanks...

Now my weekend is ruined...

You suck...








LOL J/K just kidding.

kinda...


MineralMan

(146,287 posts)
32. I know, but news is often bad.
Fri Sep 6, 2013, 08:17 PM
Sep 2013

Sorry. You have it right about open source code. It gets looked at, but mostly by people not competent to write it. So malicious, but well hidden stuff would get missed.

Latest Discussions»General Discussion»Has the NSA really broken...