Categories: SecurityWorkspace

Another NSA Tool ‘Exposes Weaknesses Of RSA Encryption’

Security firm RSA has had to cope with yet more criticism over its alleged ties with the National Security Agency, after a second tool was found in its products that was co-developed by the under-fire intelligence body.

Last year, a Reuters report claimed RSA had accepted $10 million to include a flawed encryption method, known as Dual Elliptic Curve Deterministic Random Bit Generation (Dual-EC-DRBG) , in its BSAFE line of encryption libraries. RSA has denied it knowingly included backdoors in its products.

Now researchers from a number of US universities have claimed another NSA-developed tool, known as Extended Random, would make exploitation of the Dual-EC-DRBG far easier.

RSA + NSA = insecurity?

Extended Random is an extension that is supposed to improve the security of Transport Layer Security (TLS) or Secure Sockets Layer (SSL) encryption, something widely used to make websites and internet services like email more secure. BSAFE libraries can be used to set up SSL connections.

The researchers found that instead of adding security, as it was supposed to, Extended Random actually made an attack simpler by exposing streams of data that would make it easier to predict the random numbers needed for encryption keys. That made decrypting SSL connections using BSAFE a considerably quicker process, they said.

“This extension, co-written at the request of the National Security Agency, allows a client to request longer TLS random nonces from the server, a feature that, if it enabled, would speed up the Dual EC attack by a factor of up to 65,000,” they wrote in an online post for their research.

They also claimed to have found a range of other problems across the BSAFE range of products, again leaking information that would help in the decrypting process.

“The RSA BSAFE implementations of TLS make the Dual EC back door particularly easy to exploit compared to the other libraries we analysed,” the researchers added.

“The C version of BSAFE makes a drastic speedup in the attack possible by broadcasting long contiguous strings of random bytes and by caching the output from each generator call. The Java version of BSAFE includes fingerprints in connections, making it relatively easy to identify them in a stream of network traffic.”

RSA did not deny any of the claims in the research, due to be outlined in full later this year. RSA chief technologist Sam Curry told Reuters the company could have been more distrustful of the NSA and its code.

“We trusted them because they are charged with security for the US government and US critical infrastructure,” Curry added.

Are you a security pro? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

5 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

7 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

8 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

9 hours ago