HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 3 MINUTES AGO.
You are here: Home / Enterprise I.T. / What Enterprises Can Learn from NSA
What Enterprises Can Learn from NSA Encryption Cracking
What Enterprises Can Learn from NSA Encryption Cracking
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
SEPTEMBER
06
2013


With a little help from supercomputers, court orders, arm twisting, and technical prowess, the National Security Agency (NSA) can beat your encryption. So says a report from the New York Times.

Specifically, the paper reports that secret documents show that the NSA has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world.

"Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, designed by a programmer named Phil Zimmermann," Times' reporters Nicole Perlroth, Jeff Larson and Scott Shane wrote in the article they penned together. "The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the NSA always had the key."

Focusing in Network Layer

For insight into the headlines, we turned to Kevin O'Brien, an enterprise solution architect at CloudLock. He told us the lesson here is that the network layer is the principle means of access for the NSA, through its backdoor arrangements to capture data as it flows through various providers' systems.

"In analyzing that data, much of which is encrypted on the wire, their approach is to exploit systemic vulnerabilities rather than attempting brute-force attacks on the encryption keys themselves," O'Brien said.

"Calling these approaches 'groundbreaking analytic capabilities' is a stretch: dictionary attacks on poorly chosen passwords, well-known vulnerabilities in insecure protocols, and other recognized vectors of encryption breaking are not new," he said. "The scale and scope of these attacks by the NSA are noteworthy, however."

Troubling Secret Arrangements

But here is what's more trouble to O'Brien: There appears to be secret arrangements with platform providers. In other words, the NSA is apparently exerting pressure for software companies to design in mechanisms through which the NSA's monitoring network can gain access to data, presumably post-decryption, removing the need to crack the algorithms being used.

"While the full scope of what constitutes 'groundbreaking' is not known, it's probably safe to assume that the NSA is taking advantages of these mechanisms -- likely built-in flaws in random number generators, or software backdoors that externalize data during decryption -- to simply bypass strong cryptography," O'Brien said.

If anything, he noted, this new set of revelations should be starting a conversation around just what constitutes strong cryptography, and how to implement it securely. As he sees it, part of that entails using open standard algorithms from reputable organizations, and avoiding vendor-locked encryption that is susceptible to NSA influence.

"Similarly, making it more difficult to be a target for network-level access is important, as it increases the cost and challenge for the NSA -- or any other interested party -- to obtain the encrypted stream of data in the first place," O'Brien said. "One of the first principles in network and signal security is that defense-in-depth works, the maxim holds true even in light of revealed weaknesses in one layer of -- what should be -- a sophisticated data privacy strategy."

Tell Us What You Think
Comment:

Name:

Brandt Hardin:
Posted: 2013-09-06 @ 5:25pm PT
The dystopian fantasies of yesteryear are now a reality. We’ve allowed the coming of an age where the civil liberties our forefathers fought so hard for are being eroded by the day. Freedom of Press, Freedom of Speech and Freedom of Assembly are mere ghostly images of their original intent. We’ve woken up to an Orwellian Society of Fear where anyone is at the mercy of being labeled a terrorist for standing up for rights we took for granted just over a decade ago. Read about how we’re waging war against ourselves at http://dregstudiosart.blogspot.com/2011/09/living-in-society-of-fear-ten-years.html

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
ISACA® offers a global community of more than 115,000 IS/IT constituents in over 180 countries. We develop and deliver industry-leading certifications, education, research and business frameworks. We equip individuals to be leaders in the fast-changing world of information systems and IT - Learn More>
MORE IN ENTERPRISE I.T.
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
Microsoft has some bitter rivals in the technology industry, but when it comes to thwarting government intrusion on customer privacy the software giant has plenty in common with its rivals.

ENTERPRISE HARDWARE SPOTLIGHT
Almost half of consumer, industry and life sciences manufacturers are expected to be using 3D printers within three years and now 3D printing services are aiming to help companies experiment.

© Copyright 2014 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.