新足迹

 找回密码
 注册

精华好帖回顾

· SK 怀旧经典动画片之二 当樱桃小丸子遇上蜡笔小新时。。。。。。 (2008-11-22) steveking · 2004的第一瞥云南 (2005-5-23) patricb
· 也算拿到一offer了. 但面试还去吗?? (2008-5-3) yans · 我的第一次胃镜检查 (2008-1-18) 幽柯
Advertisement
Advertisement
查看: 1448|回复: 9

【RSA】在加密算法中加入后门 [复制链接]

发表于 2013-12-21 18:57 |显示全部楼层
此文章由 Fernando 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 Fernando 所有!转贴必须注明作者、出处和本声明,并保持内容完整
RSA被指收美政府千万美元在加密算法中安后门

新浪科技讯 北京时间12月21日下午消息,美国国安局(NSA)“棱镜门”监听丑闻又有新进展。据路透社报道,NSA曾与加密技术公司RSA达成了1000万美元的协议,要求在移动终端广泛使用的加密技术中放置后门。

  两名知情人士称,RSA收受了1000万美元,将NSA提供的方程式设定为BSafe安全软件的优先或默认随机数生成算法。尽管这一金额看上去不多,但这已经相当于RSA公司有关部门年收入的三分之一。

  此举将让NSA通过随机数生成算法Bsafe的后门程序轻易破解各种加密数据。RSA否认了相关的内容,并声称自己的加密算法只使用了国家认证的协议。而NSA则拒绝发表评论。

  简而言之就是,NSA首先利用NIST(美国国家标准研究所)认证了这种有明显漏洞的算法为安全加密标准,然后再让RSA基于这种算法推出安全软件Bsafe。而企业级用户采购安全软件,则看到的是一个世界级企业采用NIST认证的加密标准开发的软件。

  影响巨大

  RSA此次曝出的丑闻影响非常巨大,作为信息安全行业的基础性企业,RSA的的加密算法如果被安置后门,将影响到非常多的领域。

  据悉,RSA目前在全球拥有8000万客户,客户基础遍及各行各业,包括电子商贸、银行、政府机构、电信、宇航业、大学等。 超过7000家企业,逾800万用户(包括财富杂志排行前百家企业的80%)均使用RSA SecurID认证产品保护企业资料,而超过500家公司在逾1000种应用软件安装有RSA BSafe软件。

  一位要求匿名的互联网安全专家对新浪科技表示,RSA是一种国际上通用的非对阵算法,主要是提供双因素认证功能。即把密码拆分成两部分,一部分是用户设置的固定密码,另外一部分来自每个用户发放的可显示数字的硬件。该硬件基于时间、设备号和种子数计算出一个动态密码。固定密码加动态密码才构成整个认证密码。

  他介绍说,目前在国内RSA产品的应用非常广泛,绝大多数互联网公司都在采用这套认证工具。在国外,不少军工、兵器类公司也都是RSA用户。美国国安局在RSA中设置后门意味着,密码动态密码部分已经被美国政府掌握。

  曝光过程

  RSA公司的行为令全世界震惊。该公司一直是隐私和安全的拥趸。上世纪九十年代,NSA试图通过加密芯片(Clipper Chip),监控大量电脑和通讯产品,RSA公司曾带头抵制。

  《纽约时报》今年9月曾披露,NSA前雇员、泄密人爱德华·斯诺登(Edward Snowden)披露的文件显示,NSA研发了一种随机数生成方程式,能够在加密产品中充当“后门”。此后,RSA公司呼吁用户停用植入了这些方程式的产品。

  路透社随后报道称,RSA是该方程式的主要散播者, 该公司将其植入了一款名为BSafe的电脑安全软件。

  RSA在一份声明中称:“RSA的行为一直符合客户的最大利益,无论如何都不会在产品中设计或植入任何后门。RSA产品的功能和特性完全自行决定。”

  路透社采访了多名RSA公司的现任和前任雇员,大多数人认为该公司接受这份合同是错误的。许多人认为,RSA公司正在偏离专注于加密产品的轨道,是这起丑闻发生的原因之一。

  但也有人认为,RSA公司被政府官员误导,后者将NSA提供的随机数生成方程式描述为一种先进的安全技术。一位知情人士称:“他们(NSA)并未显露真实目的。”该人士声称,政府官员并没有告诉RSA公司,他们知道如何破解加密。

  路透社认为,RSA公司的这份合同表明,NSA加强监控的一大关键策略是:系统性破坏安全工具。斯诺登最近几个月披露的文件显示,NSA正利用“商业关系”推进这一目标,但并未指明哪家安全公司充当合作伙伴。

  本周,美国白宫任命了一个委员会,调查美国监控政策,这一标志性的事件让NSA成为众矢之的。该委员会称“加密是互联网信任的核心基石”,并呼吁NSA停止任何破坏这一基石的行为。

  传奇历史

  RSA Security公司由RSA算法的发明者Ron Rivest, Adi Shamir和Len Adleman在1982年创立,随后在2006年以21亿美元的价格被EMC公司收购。

  RSA加密算法可以看作是随机数生成器,但是有些数字是固定的,密码学家能够将其作为万能钥匙通过一些内置的算法进行破解。该算法最有名的一个缺陷是DUAL_EC_DRBG,密码学家几年前就发现了这个问题。

  分析人士认为,RSA算法本身没什么问题,因为密钥理论上随机产生,猜对密钥如同大海捞针。但是,如果NSA确实放置了后门,那么这个算法的安全性将不复存在。

  20世纪70年代,麻省理工学院的教授发起了RSA加密算法的研究,前海军陆战队员Jim Bidzos负责领导。RSA及其核心算法是由三位创始人名字的开头字母组成,这一算法的彻底改变了密码学。虽然RSA很少为公众知晓,这一加密工具已经被大多数大型科技公司使用来保护数亿人使用的电脑。

  RSA算法的核心是公众密钥加密技术。在为信息编码和解码的过程中,RSA使用了两只以数学关系联系在一下的密钥,而非使用同一密钥。编码器使用一支密钥生成信息,而解码器使用另一只来解读信息。

  早期,美国情报机关担心这一算法可能会打击建构完好的既有公众密钥加密技术。斯坦福大学前研究员Martin Hellman当时负责调查这一技术,他说美国国家安全局试图说服他和其他研究人员相信这一技术没有必要推广。

  随着越来越多的科技公司使用RSA算法,并且互联网发展迅猛,使用该算法的商业风险逐步增加。克林顿政府接受了加密芯片,并且强制在手机和电脑中加入了此芯片,使得官员能够以正当理由破解加密技术。RSA公司发起了一次反对该做法的公众运功,向参与者发放印有一只沉船的海报,配以“击沉解密芯片”的文字。

  反对使用该芯片的关键在于,海外消费者会因为装有此芯片的美国科技产品可以用来从事间谍活动而拒绝购买。一些公司表示,斯诺登泄密事件之后,外国消费者就是这么想的。

  白宫放弃了解密芯片,转而依赖出口控制来阻止最好的密码技术出口到国外。RSA又一次联合这个行业,并且在澳大利亚建立了一家分支机构来保证公司可以出口其想出口的东西。“我们已经成为了反抗政府活动的的箭头人物,” Bidzos在一段口述历史中回忆道。

  RSA的发展

  当美国政府的出口限制令解除时,RSA和业内其他公司共同庆祝了斗争的胜利。但是,NSA不会放弃对用户数据的监控。2001年的911袭击发生后,这一需求变得更加迫切。

  与此同时,RSA也在变化。1999年,Bidzos不在担任CEO一职,转而专注于从RSA脱离出来的一家名为VeriSign的安全认证公司的管理。据RSA前员工称,Bidzos在硅谷创立的RSA随后办公地点搬到麻省东部,很多顶尖工程师也纷纷离职。

  同时,BSafe安全软件在该公司的地位日渐衰落。到2005年,BSafe其他开发工具总共为RSA带来2.75亿美元营收,不及公司总营收的9%。

  RSA一位于2005年离职的前员工Victor Chan告知路透社,当他加入时该公司时,实验室里还只有10名员工,大家都在与NSA抗争。但后来,RSA发生了巨大的变化。

  到2006年上半年,RSA和美国大多数科技公司一样,把NSA看作共同抵御海外黑客的伙伴。据RSA前员工透露,该公司新CEO Art Coviello及其团队依然希望被视为科技先锋,NSA正好给了他们这个机会。

http://d1.sina.com.cn/201312/06/526492_news-200300.gif
  NSA内部开发的一种名为双椭圆曲线(Dual Elliptic Curve)的算法当时即将获得NIST(美国国家标准研究所)认证为可用于生成随机数的四种算法之一。对于面向政府客户的产品来说,NSA的认证是必不可少的,很多其它行业也行看重这一认证。

  一位熟悉事件进展的内部人士称,在双椭圆曲线算法还没有通过NIST认证时,RAS就已经将这一算法用于自己的产品,随后,NSA开始向美国政府内部推行这种算法,从而促使NIST通过认证。

  从此,双椭圆算法成为了RSA安全软件中生成随机数的默认算法。该公司前员工称,决策者商业领袖而非技术人员,因此并未觉得其中有何不妥。

  一年之中,对于双椭圆算法的质疑声从未间断。密码学权威Bruce Schneier在一篇文章中称,该算法公式中的弱点“只能被称为后门”。在今年9月“棱镜门”事件曝光后,RSA公司呼吁用户停用包含双椭圆算法的产品。(彦飞、天恒、夏乙)

  持续更新中……
like hell
Advertisement
Advertisement

发表于 2013-12-21 18:57 |显示全部楼层
此文章由 Fernando 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 Fernando 所有!转贴必须注明作者、出处和本声明,并保持内容完整
(Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.

Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.

Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.

The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.

RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.

RSA and EMC declined to answer questions for this story, but RSA said in a statement: "RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own."

The NSA declined to comment.

The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.

The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.

Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA's corporate evolution away from pure cryptography products as one of the reasons it occurred.

But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.

"They did not show their true hand," one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.

STORIED HISTORY

Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA's encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.

At the core of RSA's products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.

From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.

The stakes rose when more technology companies adopted RSA's methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.

RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words "Sink Clipper!"

A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.

The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.

"We became the tip of the spear, so to speak, in this fight against government efforts," Bidzos recalled in an oral history.

RSA EVOLVES

RSA and others claimed victory when export restrictions relaxed.

But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.

RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.

And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $27.5 million of RSA's revenue, less than 9% of the $310 million total.

"When I joined there were 10 people in the labs, and we were fighting the NSA," said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. "It became a very different company later on."

By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.

New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.

An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST's blessing is required for many products sold to the government and often sets a broader de facto standard.

RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.

RSA's contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.

"The labs group had played a very intricate role at BSafe, and they were basically gone," said labs veteran Michael Wenocur, who left in 1999.

Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula "can only be described as a back door."

After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.

But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.

The White House, meanwhile, says it will consider this week's panel recommendation that any efforts to subvert cryptography be abandoned.

(Reporting by Joseph Menn; Editing by Jonathan Weber and Grant McCool)
like hell

发表于 2013-12-21 19:11 |显示全部楼层
此文章由 牵黄擎苍 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 牵黄擎苍 所有!转贴必须注明作者、出处和本声明,并保持内容完整
两年内RSA已经是第二次危机了,上次是技术危机,这次是信任危机。估计会影响很大。
头像被屏蔽

禁止发言

发表于 2013-12-21 23:50 |显示全部楼层
此文章由 future2521 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 future2521 所有!转贴必须注明作者、出处和本声明,并保持内容完整
这也行啊。。。哎。

发表于 2013-12-21 23:54 |显示全部楼层
此文章由 gifox 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 gifox 所有!转贴必须注明作者、出处和本声明,并保持内容完整
屁民无需紧张,谁有兴趣用那个后门来研究你的账号。而且你的金融机构用你也没选择。

发表于 2013-12-21 23:59 |显示全部楼层
此文章由 Fernando 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 Fernando 所有!转贴必须注明作者、出处和本声明,并保持内容完整
上次RSA发现问题的时候公司群发了邮件,告诉大家如果客户问怎么回答。这次不知道会怎么说了。好在都是澳洲客户的环境,也没大必要担心美国政府走后门,就算要担心也轮不到我们
like hell
Advertisement
Advertisement

发表于 2013-12-22 00:20 来自手机 |显示全部楼层
此文章由 xxj04 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 xxj04 所有!转贴必须注明作者、出处和本声明,并保持内容完整
有钱能使鬼推磨 一点不假

退役斑竹

发表于 2013-12-22 15:38 来自手机 |显示全部楼层
此文章由 garysu 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 garysu 所有!转贴必须注明作者、出处和本声明,并保持内容完整
呵呵,这给其他厂商打开了一扇门

发表于 2013-12-26 11:45 |显示全部楼层
此文章由 wszhangxuan 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 wszhangxuan 所有!转贴必须注明作者、出处和本声明,并保持内容完整
刚部署了个RSA +ASA 2 factor auth...

退役斑竹

发表于 2014-1-9 11:10 |显示全部楼层
此文章由 大饼 原创或转贴,不代表本站立场和观点,版权归 oursteps.com.au 和作者 大饼 所有!转贴必须注明作者、出处和本声明,并保持内容完整
其他厂商有替代软件了吗?

发表回复

您需要登录后才可以回帖 登录 | 注册

本版积分规则

Advertisement
Advertisement
返回顶部