NSA Turns To Commercial Software For Encryption 264
Roland Piquepaille writes "According to eWEEK, the National Security Agency (NSA) has picked a commercial solution for its encryption technology needs, instead on relying on its own proprietary code. "The National Security Agency has purchased a license for Certicom Corp.'s elliptic curve cryptography (ECC) system, and plans to make the technology a standard means of securing classified communications. In the case of the NSA deal, the agency wanted to use a 512-bit key for the ECC system. This is the equivalent of an RSA key of 15,360 bits." This summary includes the NIST guidelines for public key sizes and contains more details and links about the ECC technology. Since the announcement, Canadian Press reports that Certicom's shares more than doubled in Toronto."
FUD (Score:4, Funny)
Re:FUD (Score:5, Insightful)
Re:FUD (Score:5, Informative)
This agreement will give the NSA a nonexclusive, worldwide license with the right to grant sublicenses of MQV-based ECC covered by many of Certicom's US patents and applications and corresponding foreign rights in a limited field of use. The field of use is restricted to implementations of ECC that are over GF(p), where p is a prime greater than 2256.
Re:FUD (Score:2)
Who the hell in their right mind is going to license this from the NSA?
The NSA - You Can Trust Us Not To Implement Backdoors(TM).
Re:FUD (Score:5, Insightful)
Uh, anyone who wants to do business with or exchange sensitive info (read: pretty much anything) with the NSA. If that's you, you'll most likely have to use this to talk to them about anything important. So, it seems logical that they've acquired the ability to grant sub-licenses -- that way you can be provided with tools to encrypt and decrypt communication that works with the NSA-specific implemntation of this patented ECC concept.
Maybe you were thinking that the NSA is going to release commercial products based on ECC? I don't think so. They'll probably leave that to Certicom and just use the licensed technology for thier own use rather than resale.
Re:FUD (Score:2)
Re:FUD (Score:5, Informative)
The NSA is not lisencing software, it is lisencing the right to use Certicom's ECC cryptosystem. Cryptosystems now are usually known even when proprietary to allow mathematicians and cryptographers the ability to test the security of it. (The RSA cryptosystem for instance is thoroughly explained on RSA's web-site, but you would still need a lisence to use the algorithm in a program)
I found a tutorial by Certicom on their ECC cryptosystem here [certicom.com].
PS. I could be wrong, but from the article it seems that "intellectual property" and "This is the first time that the NSA has endorsed any sort of public-key cryptography system." that they are not actually lisencing software but are in fact lisencing the cryptosystem. If I am wrong, I humbly apologize.
Re:FUD (Score:3, Interesting)
Well, before they just used it and didn't bother asking for permission. This isn't that big of a deal. The only thing out of the ordinary is they asked before using it. Nothing is stopping the NSA from i
Ummm, well (Score:2)
So say the NSA does take this patented technology and use it without a liscence. Certicom discovers this. Well, then they'll take them to court. Yes, government agencie
Re:FUD, but whose? (Score:4, Insightful)
They could have determined that this is the preferred technology to use publically at this time, and then require the license in order to operate with it in the public domain.
James Bamford's more recent review of the NSA documented an employee's discovery of public-key cryptography prior to Diffie's. They can't patent an invention without public disclosure (I presume), and they can't avoid licensing patented technology without proving prior art, which they must be reluctant to do - they would need to disclose when they discovered it. So, if all this presumption is true, from now on they'll be forced to license technology they they themselves created in order to keep the lid on their capabilities.
What about license abuse? (Score:3, Interesting)
Re:What about license abuse? (Score:2)
Re:What about license abuse? (Score:2)
Re:What about license abuse? (Score:5, Informative)
Certicom Corp. (TSX: CIC), a leading provider of wireless security solutions, today announced that the National Security Agency (NSA) in Maryland has purchased extensive licensing rights to Certicom's MQV-based Elliptic Curve Cryptography (ECC) intellectual property. ECC is becoming a crucial technology for protecting national security information.
This agreement will give the NSA a nonexclusive, worldwide license with the right to grant sublicenses of MQV-based ECC covered by many of Certicom's US patents and applications and corresponding foreign rights in a limited field of use. The field of use is restricted to implementations of ECC that are over GF(p), where p is a prime greater than 2256. Outside the field of use, Certicom will retain all rights to the technology for other industries that require the same levels of security, including state and local government agencies. Certicom will continue its policy of making its intellectual property available to implementers of ECC under normal commercial terms on a non discriminatory basis.
If true it sends a signal. No quantum computer now (Score:2, Interesting)
Re:If true it sends a signal. No quantum computer (Score:3, Insightful)
Re:If true it sends a signal. No quantum computer (Score:2)
-Sam
Re:If true it sends a signal. No quantum computer (Score:2)
Just 'cause you're not paranoid don't mean they're not out to get you!
Where's the money (Score:2, Troll)
Nah, that kind of thing never happens. It's tinfoil-hat thinking. It's as unlikely as the President sexually abusing one of his interns.
Size of key (Score:4, Insightful)
Brute-force decoding of these schemes is not recommended for the faint of heart, but I wonder: how can they tell that a 2 ^ 512 possibility range is as secure as a 2 ^ 15360 probabilities scheme?
If I can reduce a RSA 1024 bits to a new method using only 4 bits, how can my way be as secure?
Re:Size of key (Score:5, Informative)
Re:Size of key (Score:2)
And yes, they both pretty much involve brute forcing the bits to try to crack the message. It just happens that ecc problem is lot harder than large number factorization (computationally and conceptually too). If you know how to factor huge ass numbers without brute forcing let the nobel committee know as you may be eligible for next year.
Re:Size of key (Score:2)
Re:Size of key (Score:2)
Re:Size of key (Score:2)
Re:Size of key (Score:3, Informative)
As a matter of fact, discrete log problem for ordinary numbers has been improving steadily whereas Elliptic curve group discrete log techniques have not seen significant improvement in the past 20 years. This difference accounts for today's reduced key-size requirements for elliptic curves.
Re:Size of key (Score:2, Informative)
Re:Size of key (Score:2, Informative)
for the rsa key in order to find the approximate number of keys possible you use the simple equation 2^k / (ln 2^k) this gives you an 'approximation' for all possible primes you can have in k-bits.
As for the ECC system I cant remeber the exsact computation off the top of my head to calculate key space but it has a much higher key concentration per bit added to key. not as high as a symetric cryptographic system with a 2^k keyspace but pretty high up there.
As f
Re:Size of key (Score:3, Interesting)
You don't brute force either system. Useing the best known mythods to break encryption today (which in the case of both RSA and ECC is not brute force) breaking a 512 bit ECC key is about the same effort of breaking a 15360 bit RSA key. Note that breaking a 512 bit symetric key (something like AES, blowfish, modified to use a 512 bit key) is more effort than breaking either one.
I'm not sure I belive the difference is that great. RSA type encryption has had a lot of effort put into breaking it, ECC gets
Re:Size of key (Score:4, Informative)
Note that both ECC and RSA are NP-complete
This has not been proven, nor is it even commonly believed to be true.
Re:Size of key (Score:2, Informative)
Re:Size of key (Score:2)
And who has done this, and when did they time it?
This isn't an issue of "open" vs "closed" (Score:3, Interesting)
The algorithm they used is patented and very much open for criticism. It would need to be fore NSA to choose it. Think of it like RSA where the algorithm was patented as well (many open source applications use RSA now, since the license has expired).
Dr. Scott A. Vanstone [certicom.com] is a professor at University of Waterloo, so it is kind of neat to see one of my profs in the news (I knew about the company, but they haven't had much going for them for a while). He teaches Coding Theory (CO 331 [uwaterloo.ca]) and is the Executive Director of Centre for Applied Cryptographic Research [uwaterloo.ca]
Damn! (Score:3, Funny)
Attention to the knee-jerkers! (Score:3, Insightful)
Thanks.
This isn't software, it's patents. (Score:5, Informative)
You'll note that they've also got sublicensing rights on those patents. There could be a software component to this deal, but as far I can tell it appears that this is mainly about patents.
Re:This isn't software, it's patents. (Score:2)
For all we know, the sublicensing agreement for the use of the specific parts of the patents may be absolutely up to the NSA (they seem to suggest as much from the Certicom press releases..? Anyone know more?)
If that is the case, the NSA might very well release an open source version th
Re:This isn't software, it's patents. (Score:2)
They've licensed the patent, not the code. The algorithm. No source. No binaries. "It's just an algorithm" as the folks as RSA are fond of saying. They are allowed to use the math. There is probably no programming involved here, as you state yourself. How many times can it be said?
It appears that the NSA have licensed this math in such a manner that they are free to sublicense it however they see
Restrictions on field of use, royalties, etc. (Score:3, Insightful)
The "field of use" is not specified in any of the links provided by the slashdot article (and is probably confidential), nor are the parameters of th
Re:Restrictions on field of use, royalties, etc. (Score:2)
In that case, it would kill any GPL hopes right away.
By "appears" I mean exactly that. It seems to me, on first reading, that they're allowed to do pretty much whatever they want with the (GF(p), p > 2**256) instance of ECC, and that naively I would read that that is the only
Re:This isn't software, it's patents. (Score:2)
This is for the more discerning crypto customer (Score:5, Insightful)
Re:This is for the more discerning crypto customer (Score:2)
But aren't they allowed to mine the patent office? After all they are part of the government - and patents are there only to protect inventors from each other - not to protect inventors from the govt. I've always understood that in exchange for that protection the government is all
Oh my God! (Score:2)
There is a method to the madness... for sure!!! (Score:2)
For it only takes the breaking of one key document at the right time and misuse of the information found, for the NSA to then need to have someone to blame while the damages of the results would still exist.
Encryption, regardless of how big the key is, still has the possibility of someone hitting it, like the lottery.
Not to mention I rea
Re:There is a method to the madness... for sure!!! (Score:2)
Re:There is a method to the madness... for sure!!! (Score:2)
But since there are more possibilities than atoms in the visible universe I guess that means all the rest are in the mind.
It only takes one hit.
Buy Canadian (Score:4, Insightful)
I am not flaming Canada; I work with several Canadians and they are all nice and knowledgable people. I just noticed the inconsistencies in our policies.
Disclaimer: I am a citizen of the USA, and I hope that this trend continues. I would really like all our government agencies to use the best global software, not just our homegrown insecure proprietary systems.
Re:Buy Canadian (Score:2)
You can export strong encryption if you get an export license. The U.S. Government will grant a license if they think it is in the national interest.
The United States and Canada have been cooperating in communications security and intelligence gathering for many years.
key strength (Score:2)
let it be said (Score:3, Funny)
Wait a minute! (Score:2)
Re:Wait a minute! (Score:2)
No, there's No Such Agency. Move along, nothing to see here.
(Actually, for many years even the existence of the Agency was officially not acknowledged. AFAIK most if not all of its budget is still "black", ie doesn't show up in detail in the budget bills.)
So this means there's no easy way to break ECC... (Score:3, Interesting)
Hmm...
Or maybe there *is* a suble weakness, leading to an "easy" way to break ECC. And NSA is licensing this to give it undue creidibility, so more people start using it, while NSA can easily (compared to RSA or whatnot) read everything encrypted with it...
Evidence for Quantum Computer (Score:5, Informative)
So, when we see the NSA not just adding key bits, but adding bits and then doubling them, we see evidence of countermeasures against quantum computers. This doesn't mean they have quantum computers. Remember that they are not just guarding secrets they transmit today against attack now, but against attack ten years from now, when revelation might still be damaging.
Once we all do have quantum computers, I wonder what amusing revelations will come from cracking old ciphertexts. You can bet the NSA will keep busy at it, and so will the Brits, and the French, and the Germans, and the Russians, and the Israelis. (No doubt a few of the biggest corporations go on that list too.)
512 bits? (Score:2)
Re:512 bits? (Score:2, Informative)
No, you don't. You have to find the factors of a prime number of that length. That leaves significantly less than 2^15630 possibilities, especially if you're using a decent factoring algorithm.
Re:512 bits? (Score:2)
Jon
Sun and ECC (Score:3, Informative)
Just a Wild Guess, But... (Score:4, Informative)
512bits (Score:2)
And ECC is _VERY_ heavily encombered by patents, that's why none of us are using it yet out here in the real world, we can't. They could have used RSA for free, so you should be upset with their irresponsible use of tax dollars.
The chart is interesting tho...
Public key vs. symetric (Score:5, Informative)
A lot of times, people will create symetric keys and then use public key systems to distribute them.
Re:OSS ECC? ECC vs AES (Score:4, Informative)
The difference between ECC and algorithms like RSA, for example, is that elliptic algorithms can work with smaller keysizes, and this should have been noticable from the slashdot post that points out the commercial product uses a smaller keysize than the equiviliant strength RSA key.
Re:OSS ECC? ECC vs AES (Score:2, Informative)
Re:OSS ECC? ECC vs AES (Score:2)
Re:OSS ECC? ECC vs AES (Score:5, Informative)
No, DSA != ECC.
DSA and ECC both do encryption by exponentation, relying on the assumtion that the reverse function - the logarithm - is infeasible with the used keylengths. They are both called "Discrete Logarithm Systems".
But the multiplication is done in completly different mathematical contexts: DSA multiplies in the rings Z/p (that are the natural numbers modulo p, p being a prime) where ECC multiplies in suitable "elliptic curve groups over finite fields" . That are finite sets of "numbers" paired with an complicated operation called "multiplication". These "numbers" behave quiet odd.
The main practical difference is the neccessary keylength. Depending on the chosen eliptic curve, ECC keys are 4-8 times smaller than DSA keys. They get much closer to the "no attack is faster than the brute force attack"-paradigm than other public key algorithms like DSA or RSA.
Unfortunatly, huge classes of suitable elliptic curves got patented.
Google for free ECC software. There are at least some libraries published by academic research groups.
Room for prior art on non-patented elliiptics? (Score:2)
On what basis were the different elliptic curves considered different, to allow for the patentability of followups after the first patent was granted?
I ask this because along that dimension of "approved" non-overlapping variance there must be other elliptic curves for which there is no current patent, and if prior art is established for them then we can use that in an ECC implementation for GnuPG without fear of patent claims. Proceedin
Re:Room for prior art on non-patented elliiptics? (Score:2)
After several attacks were published showing that large numbers of elliptic curves were too weak for use in known ECC cryptosystems, software techniques had to be developed which allowed the fast generateion of curves which are known to avoid all of the weak areas. Those methods, to a large extent, are all patented.
It's a similar problem to finding 'safe' primes for use in RSA. You can
Re:OSS ECC? ECC vs AES (Score:4, Informative)
Re:OSS ECC? ECC vs AES (Score:3, Insightful)
Unfortunate? For whom? For the people who spent long hours doing the extensive research which led to the development of advanced encyption systems? Or for the people who read the papers and attended the conferences and say "Great idea...think I'll make the same thing for free in the name of Openness!"
Encryption is not like a 1-click pattent or library compression. It's hard, expensive and risky to devote your time to coming up with t
Re:FINALLY ... (Score:2, Interesting)
- I am happy to see a local business score a large contract in my hometown
- I am confused as to how the American Government ever approved a purchase of an external Intellectual Property
I'm sure alot of Americans will have disagreements on this one!
Re:FINALLY ... (Score:3, Funny)
Re:FINALLY ... (Score:2)
Re:FINALLY ... (Score:2)
"Living next to the US is like sleeping next to an Elephant" In the case of software the Elephant has eaten too much grass and smoked too much crack!
Re:Huh? (Score:2)
Instead of asking why picking a commercial solution when no open one exist is remarkable, ask why it is remarkable that the NSA have selected a commercial solution instead of developing their own version of it.
Re:Huh? (Score:5, Insightful)
It's not like the NSA is buying a binary encryption software package they can't decompile, or shipping the secrets up to Canada for encrypting. This isn't a security concern. The NSA bought the concept of ECC, and Certicom deserves to be paid fairly for it. The NSA can do anything they want with ECC now, including grant sub-licenses without approvasl from Certicom. The only restriction is to require a minimum level of ecryption field size (encryption strength), which isn't a problem for NSA:
This agreement will give the NSA a nonexclusive, worldwide license with the right to grant sublicenses of MQV-based ECC covered by many of Certicom's US patents and applications and corresponding foreign rights in a limited field of use. The field of use is restricted to implementations of ECC that are over GF(p), where p is a prime greater than 2256.
Re:Huh? (Score:3, Interesting)
The difference is that patents on mathematical techniques or softw
Re:Huh? (Score:2)
"They were very interested in getting the best IP out there, and we own a lot of the patents in this area," said Tony Rosati, director of marketing at Certicom, based in Mississauga, Ontario. "If you want t
Re:Canadian code? (Score:5, Funny)
Canada (Score:4, Informative)
Canada has many exceptions to US restrictions. This makes sense. It is cheaper to work together, and we do in many military and space applications.
Our interests are basically very similar, and both countries are generally trustworthy of each other.
The only conflict are on specific policy issues.
It also matters which government is in power in each country.
There have been quite a few times where state and provincial officials have banded together to fight both federal governments.
Plus if it works well, why shouldn't they use it?
Re: Privatization (Score:5, Funny)
> The NSA's job is to make secure codes for government use, and break other people's codes. So they licensed someone else's code, but why are they announcing it for intra-government use? The obvious question is, Can't they roll their own?
Probably just means that they've discovered how to crack it, so now they want everyone else to use it.
Re: Privatization (Score:2)
Probably just means that they've discovered how to crack it, so now they want everyone else to use it.
Yeah, that was my immediate reaction when I saw the article. Not that I actually believe that, but it makes for a good conspiracy theory.
-a
Re:Privatization (Score:3, Insightful)
Re:Privatization (Score:5, Informative)
So what comes out is a solution that was produced much cheaper than a similar inhouse effort, and this will save the tax payers money (which sounds good to this poor college student.) I have to say I'm surprised at the Agency going after a commercial product for classified purposes, but I'm sure they have good reasons.
Re:Privatization (Score:3, Interesting)
You're the premiere intelligence agency in the world. When you need to secure data, you use algorithms that nobody else in the world knows about, designed in secret by some of the greatest mathematical geniuses there are.
When you need to secure an email you're sending to someone not in the agency, you can't (not to mention don't) use your hidden good stuff, because the recipient doesn't have the algorithm. So, you use something publicly available.
Re:Privatization (Score:2, Insightful)
It's blatantly ignorant of the principles of cryptography which state that knowing the algorithm and implementation, or even part of the clear text should not compromise your security.
Re:Privatization (Score:2)
Re:Privatization (Score:2)
good point mr100percent. something don't be adding up here.
the NSA employs more mathmeticians than any other organization in the world. they can grow their own and roll their own.
the thing is they usually bogart it.
what i don't understand is why the NSA just doesn't pinch from someone else's bag - i mean who's gonna know it? they're the friggin's NSA - the government, they can do anything... and only traitors and slanderous villians would criticize the government.
it's a
Re:Privatization (Score:5, Insightful)
on the other hand, you have NSA could use whatever patented technique they wanted and no one would ever know, but they decide to go out and publicly annouce a license
You're wondering why the NSA didn't just go ahead and use Certicom's patented ECC implementation and keep it a secret? Because they're a lot bigger than Rush freakin' Limbaugh, and it only takes one employee to speak up and say, "we knew someone else patented this but we used it anyway" before someone gets in a lot of trouble.
No one wants that kind of a black eye. If that scandal broke, the manager who gave the go-ahead to implement the Certicom solution without licensing it would probably find himself reassigned to a communications post in Afghanistan.
And one thing about the US government... no matter how hard they try to keep things under wraps, they're just not very good at it. There are just too many nosy journalists and authors poking around... everything comes out sooner or later
Re:Privatization (Score:2)
The only thing remarkable about this deal is that it is with a Canadian company.
Re:Privatization (Score:2)
Re:Privatization (Score:2)
Re:someone to take blame (Score:2)
That's right. Now if terrorists crack the launch codes and launch our missiles against our own cities, we'll be able to sue Certicom to recoup our losses.
Re:Great (Score:2, Funny)
Indeed, this will be a major improvement on the hyperbolic overlords we now have.
KFG
Re:How about (Score:2)
Encrypting shouldn't make the resulting code bigger, except for rounding the size up to the next block size of the cypher. Encrypting something over and over with the same algorithm doesn't really have a cryptographic benefit.
Re:Not to burst your bubble, but ..... (Score:2)
So you're saying that the NSA is a Borg operation.
That's such utter BS. (Score:2)
2) TSC uses block-based and stream ciphers just like anything else. For example, KG-75s, CORNFIELD MCM, etc. There are even TSC approved software packages that you can install on a standard PC to create secure links. These are all commercially developed products, Motorola, Harris-Intersil, etc. (but are CCI, so you can only get them through a
SELinux? (Score:2)
Alaska's favorite scientific instrument [alaska-freegold.com]
Twit (Score:2)
Re:Asswipe! (Score:2)
Samuel Clemens said it best: Better to keep one's mouth closed and be thought a fo