DMT-Nexus member
Posts: 559 Joined: 24-Dec-2011 Last visit: 03-Nov-2020
|
Quote:The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.
The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.
The N.S.A. hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
“For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!”
An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.
In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s broad reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects.
The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features.
The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say.
Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by Qaeda leaders about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work. read the rest of the article here.further information can be read at the Guardian.Long story short, it appears NSA has backdoored or cracked both HTTPS and SSL.
|
 "No, seriously"

Posts: 7324 Joined: 18-Jan-2007 Last visit: 09-Feb-2025 Location: Orion Spur
|
alert wrote:Long story short, it appears NSA has backdoored or cracked both HTTPS and SSL.
That is not what I read. They state that before encryption starts the systems are already infiltrated through backdoors in the programs used, like Skype for example. Also the assumption they make about the encryption used and that the NSA put weaknessess into it shows a lot of ignorance about how those encryption protocols like AES were actually created (hint: NOT by the NSA at all). So for the time being be aware about USA made software with backdoors in it and use multiple layers of defence like TOR and VPN on top of SSL. I did not see any information that showed that the HTTPS/SSL encryption was cracked. Kind regards, The Traveler
|
DMT-Nexus member
Posts: 559 Joined: 24-Dec-2011 Last visit: 03-Nov-2020
|
The Traveler wrote:alert wrote:Long story short, it appears NSA has backdoored or cracked both HTTPS and SSL.
That is not what I read. From the Guardian article... Quote:"Project Bullrun deals with NSA's abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive." The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking. Quote:Also the assumption they make about the encryption used and that the NSA put weaknessess into it shows a lot of ignorance about how those encryption protocols like AES were actually created (hint: NOT by the NSA at all). They weren't claiming that AES or PGP was created by the NSA. The article was referring to the 2007 NIST official standard for random-number generators.Quote: The controversy revolves around DUAL_EC_DRBG, the random-number generator based on elliptic curves. DUAL_EC_DRBG was first shown to have problems in 2006, where Daniel Brown and Kristian Gjosteen pointed out that DUAL_EC_DRBG generates random numbers with a small bias. At the 2007 CRYPTO conference, Dan Shumow and Niels Ferguson presented a weakness in the DUAL_EC_DRBG technique which they claimed was an intentional backdoor. Shumow and Ferguson demonstrated that constants used within the DUAL_EC_DRBG standard have a relationship with a secret set of numbers. Anyone who knows these numbers can predict DUAL_EC_DRBG's output, and consequently can break encryption schemes using DUAL_EC_DRBG.
What does the NSA have to do with DUAL_EC_DRBG? As the nation's cryptologic expert, the NSA has always contributed to the NIST standard. DUAL_EC_DRBG was much slower than the other three techniques described in the standard, and was demonstrated to have a huge weakness. People wondered why DUAL_EC_DRBG was included in the NIST standard until cryptology expert Bruce Schneier pointed out that the NSA made the initial proposal for DUAL_EC_DRBG and was the main lobbyist for its inclusion. Schneier makes no conclusions, but implies that it is possible that the NSA pushed so hard for DUAL_EC_DRBG because they wanted to easily crack encryption schemes. Schneier's editorial making this accusation ends with a sober note:
"I don't understand why the NSA was so insistent about including Dual_EC_DRBG in the standard... My recommendation, if you're in need of a random-number generator, is not to use Dual_EC_DRBG under any circumstances. If you have to use something in SP 800-90, use CTR_DRBG or Hash_DRBG. In the meantime, both NIST and the NSA have some explaining to do." Here is a Wired article from 2007 discussing it as well. I think this is partly why specific details are lacking Quote:Intelligence officials asked the Guardian, New York Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.
The three organisations removed some specific facts but decided to publish the story because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of internet users in the US and worldwide.
|