Wednesday, October 16, 2013

Week 8 Blog

The NSA and their Backdoor Secrets

One of the most fascinating things about information security is the concept of a backdoor. What is more interesting is the shear idea that the NSA desires to eavesdrop on our internet traffic through the use of a backdoor. (Schneier, 2013) “[NSA] has secret agreements with telcos to get direct access to bulk internet traffic. It has massive systems like TUMULT, TURMOIL, and TURBULENCE to sift through it all. And it can identify ciphertext — encrypted information — and figure out which programs could have created it” (Schneier, 2013). Obviously, it is a little frightening to know that the NSA can easily go through our internet communications and collect our personal information whenever they want. It is even more alarming that the NSA can undercover this encrypted information and which potential program encrypted it to begin with.

Another interesting item to note is that, “The NSA wants is to be able to read that encrypted information in as close to real-time as possible. It wants backdoors, just like the cybercriminals and less benevolent governments do. And we have to figure out how to make it harder for them, or anyone else, to insert those backdoors” (Schneier, 2013). I guess this makes it our duty to prevent the NSA from inserting these backdoors. It seems a little ironic that we have to protect ourselves from the NSA. I thought they were on our side. More specifically, it is the National Security Agency’s motto to state that they are, “Defending our Nation and Securing the Future” (National Security Agency, 2013). I hope the NSA knows exactly what they are doing by wanting to incorporate all of these backdoor “features.”

In order for NSA to design backdoors, a few concepts should be considered. For instance, the concept of low discoverability, high deniability, and lastly the concept of minimal conspiracy should be considered. (Schneier, 2013) More specifically, “Low discoverability [means] the less the backdoor affects the normal operations of the program, the better. Ideally, it shouldn’t affect functionality at all. The smaller the backdoor is the better. Ideally, it should just look like normal functional code” (Schneier, 2013). This makes sense to the idea of low discoverability. You do not want functionality to be affected at all. Next is the concept of high deniability. For instance the concept of high deniability means, “If discovered, the backdoor should look like a mistake” (Schneier, 2013). Lastly, there is the concept of minimal conspiracy. “The more people who know about the backdoor, the more likely the secret is to get out. So any good backdoor should be known to very few people” (Schneier, 2013). These concepts are all just basic ideas of how the NSA could design their backdoors. (Schneier, 2013)


Some great strategies to defend against backdoors include the following: (Schneier, 2013)

·         “Vendors should make their encryption code public, including the protocol specifications. This will allow others to examine the code for vulnerabilities.”

·         “The community should create independent compatible versions of encryption systems, to verify they are operating properly.”

·         “There should be no master secrets. These are just too vulnerable.”

·         “All random number generators should conform to published and accepted standards. Breaking the random number generator is the easiest difficult-to-detect method of subverting an encryption system.”

·         “Encryption protocols should be designed so as not to leak any random information. Nonces should be considered part of the key or public predictable counters if possible. The goal is to make it harder to subtly leak key bits in this information.”


There is no definite method to defend against backdoors. The techniques listed above offer some great techniques to help prevent backdoor problems. For instance, “With these principles in mind, we can list design strategies. None of them is foolproof, but they are all useful. I’m sure there’s more; this list isn’t meant to be exhaustive, nor the final word on the topic. It’s simply a starting place for discussion. But it won’t work unless customers start demanding software with this sort of transparency” (Schneier, 2013). It is clear that this backdoor issue is one that the public needs to be aware of so that we can all work together and try to get these problems resolved.

 

References

National Security Agency. (2013, September 4). National Security Agency Central Security Service. Retrieved October 16, 2013, from National Security Agency Central Security Service: http://www.nsa.gov/

Schneier, B. (2013, October 16). How to Design — And Defend Against — The Perfect Security Backdoor. Retrieved October 16, 2013, from Wired: http://www.wired.com/opinion/2013/10/how-to-design-and-defend-against-the-perfect-backdoor/

No comments:

Post a Comment