Snowden disclosures prompt warning on widely used computer security formula

Published September 20, 2013
RSA SecureID electronic keys are pictured in a photo illustration taken in Singapore June 8, 2011.
RSA SecureID electronic keys are pictured in a photo illustration taken in Singapore June 8, 2011.

San Francisco, Sept 19, 2013 - In the latest fallout from Edward Snowden's intelligence disclosures, a major US computer security company warned thousands of customers on Thursday to stop using software that relies on a weak mathematical formula developed by the National Security Agency.

RSA, the security arm of storage company EMC Corp, told current customers in an email that a toolkit for developers had a default random-number generator using the weak formula, and that customers should switch to one of several other formulas in the product.

Last week, the New York Times reported that Snowden's cache of documents from his time working for an NSA contractor showed that the agency used its public participation in the process for setting voluntary cryptography standards, run by the government's National Institute of Standards and Technology, to push for a formula that it knew it could break.

NIST, which accepted the NSA proposal in 2006 as one of four systems acceptable for government use, this week said it would reconsider that inclusion in the wake of questions about its security.

But RSA's warning underscores how the slow-moving standards process and industry practices could leave many users exposed to hacking by the NSA or others who could exploit the same flaw for years to come.

RSA had no immediate comment. It was unclear how the company could reach all the former customers of its development tools, let alone how those programmers could in turn reach all of their customers.

Developers who used RSA's "BSAFE" kit wrote code for Web browsers, other software, and hardware components to increase their security. Random numbers are a core part of much modern cryptography, and the ability to guess what they are renders those formulas vulnerable.

The NSA-promoted formula was odd enough that some experts speculated for years that it was flawed by design. A person familiar with the process told Reuters that NIST accepted it in part because many government agencies were already using it.

But after the Times report, NIST said it was inviting public comments as it re-evaluated the formula.

"If vulnerabilities are found in these or any other NIST standards, we will work with the cryptographic community to address them as quickly as possible," NIST said on September 10.

Snowden, who is wanted on US espionage charges and is living in temporary asylum in Russia, disclosed secret NSA programs involving the collection of telephone and email data.

Opinion

Rule by law

Rule by law

‘The rule of law’ is being weaponised, taking on whatever meaning that fits the political objectives of those invoking it.

Editorial

Isfahan strikes
20 Apr, 2024

Isfahan strikes

THE Iran-Israel shadow war has very much come out into the open. Tel Aviv had been targeting Tehran’s assets for...
President’s speech
20 Apr, 2024

President’s speech

PRESIDENT Asif Ali Zardari seems to have managed to hit all the right notes in his address to the joint sitting of...
Karachi terror
20 Apr, 2024

Karachi terror

IS urban terrorism returning to Karachi? Yesterday’s deplorable suicide bombing attack on a van carrying five...
X post facto
Updated 19 Apr, 2024

X post facto

Our decision-makers should realise the harm they are causing.
Insufficient inquiry
19 Apr, 2024

Insufficient inquiry

UNLESS the state is honest about the mistakes its functionaries have made, we will be doomed to repeat our follies....
Melting glaciers
19 Apr, 2024

Melting glaciers

AFTER several rain-related deaths in KP in recent days, the Provincial Disaster Management Authority has sprung into...