Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Personal Tech
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
What Enterprises Can Learn from NSA Encryption Cracking
What Enterprises Can Learn from NSA Encryption Cracking

By Jennifer LeClaire
September 6, 2013 11:42AM

    Bookmark and Share
The new revelations about the NSA cracking most Internet encryption tools should be starting a conversation among enterprises around just what constitutes strong cryptography, and how to implement it securely. That includes avoiding vendor-locked encryption that is susceptible to NSA influence, said CloudLock's Kevin O'Brien.
 



With a little help from supercomputers, court orders, arm twisting, and technical prowess, the National Security Agency (NSA) can beat your encryption. So says a report from the New York Times.

Specifically, the paper reports that secret documents show that the NSA has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world.

"Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, designed by a programmer named Phil Zimmermann," Times' reporters Nicole Perlroth, Jeff Larson and Scott Shane wrote in the article they penned together. "The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the NSA always had the key."

Focusing in Network Layer

For insight into the headlines, we turned to Kevin O'Brien, an enterprise solution architect at CloudLock. He told us the lesson here is that the network layer is the principle means of access for the NSA, through its backdoor arrangements to capture data as it flows through various providers' systems.

"In analyzing that data, much of which is encrypted on the wire, their approach is to exploit systemic vulnerabilities rather than attempting brute-force attacks on the encryption keys themselves," O'Brien said.

"Calling these approaches 'groundbreaking analytic capabilities' is a stretch: dictionary attacks on poorly chosen passwords, well-known vulnerabilities in insecure protocols, and other recognized vectors of encryption breaking are not new," he said. "The scale and scope of these attacks by the NSA are noteworthy, however."

Troubling Secret Arrangements

But here is what's more trouble to O'Brien: There appears to be secret arrangements with platform providers. In other words, the NSA is apparently exerting pressure for software companies to design in mechanisms through which the NSA's monitoring network can gain access to data, presumably post-decryption, removing the need to crack the algorithms being used.

"While the full scope of what constitutes 'groundbreaking' is not known, it's probably safe to assume that the NSA is taking advantages of these mechanisms -- likely built-in flaws in random number generators, or software backdoors that externalize data during decryption -- to simply bypass strong cryptography," O'Brien said.

If anything, he noted, this new set of revelations should be starting a conversation around just what constitutes strong cryptography, and how to implement it securely. As he sees it, part of that entails using open standard algorithms from reputable organizations, and avoiding vendor-locked encryption that is susceptible to NSA influence.

"Similarly, making it more difficult to be a target for network-level access is important, as it increases the cost and challenge for the NSA -- or any other interested party -- to obtain the encrypted stream of data in the first place," O'Brien said. "One of the first principles in network and signal security is that defense-in-depth works, the maxim holds true even in light of revealed weaknesses in one layer of -- what should be -- a sophisticated data privacy strategy."
 

Tell Us What You Think
Comment:

Name:

Brandt Hardin:

Posted: 2013-09-06 @ 5:25pm PT
The dystopian fantasies of yesteryear are now a reality. We’ve allowed the coming of an age where the civil liberties our forefathers fought so hard for are being eroded by the day. Freedom of Press, Freedom of Speech and Freedom of Assembly are mere ghostly images of their original intent. We’ve woken up to an Orwellian Society of Fear where anyone is at the mercy of being labeled a terrorist for standing up for rights we took for granted just over a decade ago. Read about how we’re waging war against ourselves at http://dregstudiosart.blogspot.com/2011/09/living-in-society-of-fear-ten-years.html





 Personal Tech
1.   OkCupid Experiments With Daters
2.   Verizon Throttling Data Speeds
3.   'Right To Be Forgotten': 26 Questions
4.   Civil War Battle Sites Get Mobile App
5.   Internet of Things Comes to DIYers


advertisement
Facebook Social Experiment Irks Us
Secretive test was legal, but ethical?
Average Rating:
OkCupid Experiments With Daters
Unethical without user consent?
Average Rating:
Protect Yourself from Identity Theft
Even if your data was compromised.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
BlackBerry Buys German Security Firm
Looking to burnish its business reputation, BlackBerry has agreed to buy a German mobile security company that specializes in voice/data encryption as well as anti-eavesdropping solutions.
 
T-Mobile Calls 'BS' on AT&T's New Promotion
While Verizon Wireless is moving to throttle bandwidth hogs, a scrappy T-Mobile is taking on the giants with a limited-time promotion it hopes will drive up the churn rates of its wireless rivals.
 
Microsoft Update to Windows Phone 8.1 Already Coming
An update to Windows Phone 8.1 is on the way just weeks after the release of the product itself. Microsoft has begun detailing some of the update features to phone manufacturers.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.