<<

Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

Outline and Information Security in • Snowden revelation: the essentials the Post-Snowden Era • Snowden revelations: some details • Backdoors in crypto standard Bart Preneel • Impact on cryptology and information security COSIC KU Leuven and iMinds, Belgium Bart.Preneel(at)esat.kuleuven.be research October 2014

© KU Leuven COSIC, Bart Preneel 1 2

National Security Agency Snowden revelations cryptologic intelligence agency of the USA DoD NSA: “Collect it all, know it all, exploit it all” – collection and analysis of foreign communications and foreign signals intelligence – most capabilities could have been extrapolated from open – protecting government communications and information systems sources But still… massive scale and impact level of sophistication both organizational and technical – redundancy: at least 3 methods to get to Google’s data – many other countries collaborated (beyond five eyes) – industry collaboration through bribery, security letters, … • including industrial espionage undermining cryptographic standards with backdoors (Bullrun) … and also the credibility of NIST

3 4

Snowden revelations (2)

Most spectacular: active defense • networks – Quantum insertion: answer before the legitimate website – FoxAcid: specific malware • devices –malware – supply chain subversion Translation in human terms: complete control of networks and systems, including bridging the air gaps

No longer deniable

5 6

1 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

NSA surveillance by country Rule #1 of : search for plaintext [B. Morris]

AliceEve/NSA Bob

CRY Clear Clear CRY Clear Clear PTO PTO text text text text BOX BOX

7 8

Muscular Where do you find plaintext? (GCHQ) help from Level 3 1. PRISM (server) 2. Upstream (fiber) (LITTLE)

Jan 9 2013: In the preceding 30 days, field collectors had processed and sent back 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video (from Tempora Yahoo! and Google)

9 10

Upstream (continued) 3. Traffic data (meta data) (DNR) • What if you want the upstream in other countries? • traffic data is not plaintext itself, but it is very • Echelon (European Parliament 2001) informative • submarines (underwater cables) • it may contain URLs of websites • satellites • fiber • it allows to map networks • reroute traffic– who ever believed that internet • location information reveals social relations routing was secure? 6 June 2013: NSA collecting phone records of • hack the telcos (Belgacom?) millions of Verizon customers daily

EU: data retention directive (2006/24/EC) – declared illegal by EU Constitutional Court in April 2014

11 12

2 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

3. Traffic data (DNR) – phone location 3. The meta data debate

• NSA collects It’s only about 5B records a day meta data on cell phone location • Co-traveler We kill people based on meta data

… but that’s not Former National Security Agency (NSA) and what we do with Central Intelligence Agency (CIA) Director Michael Hayden (Reuters/Larry Downing) this metadata 13 14

4. Client systems 4. Client systems: TAO • hack the client devices • Tailored Access Operations • many technologies • use unpatched weaknesses (disclosed by • large number on bridging air gaps vendors or by update mechanism?) • number of targets is limited by cost/effort • sophisticated malware •Examples: • use radio interfaces and radar activation • get plaintext • supply chain interception • FOXACID: A system for installing spyware with a "quantum insert" that infects spyware at the packet level • it is well known that any mobile phone can be converted into a remote microphone

15 16

Lessons learned

Never underestimate a motivated, well-funded and competent attacker Emphasis moving from COMSEC to COMPUSEC (from network security to systems security) Economics of scale play a central role It is not about the US or US/UK or even five eyes – other nations have similar capabilities – more are developing them – organized crime and terrorists will follow Need for non-proliferation treaties

17 18

3 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

Outline NSA foils much internet

NYT 6 September 2013 • Snowden revelation: the essentials The National Security Agency is winning its long- • Snowden revelations: some details running secret war on encryption, using supercomputers, technical trickery, court orders • Backdoors in crypto standard and behind-the-scenes persuasion to undermine • Impact on cryptology and information security the major tools protecting the privacy of research everyday communications in the Internet age

19 20

If you can’t get the plaintext Asking for the

• (alleged) examples • Lavabit email encryption • CryptoSeal Privacy VPN Eve/NSA Alice Bob • SSL/TLS servers of large companies • Truecrypt?

CRY This experience has taught me one very important lesson: Clear CRY %^C& %^C& Clear PTO PTO without congressional action or a strong judicial precedent, text @&^( @&^( text BOX BOX I would strongly recommend against anyone trusting their private data to a company with physical ties to the United Ask for States.

the key! Ladar Levison, Owner and Operator, Lavabit LLC

21 22

If you can’t get the private key, If you can’t get the key substitute the public key make sure that the key is generated using a fake SSL certificates or SSL person-in-the-middle random number generator with trapdoor

• Flame: rogue certificate by cryptanalysis* Pseudo- • Comodo, Diginotar, Turktrust random • TLS data stored by GCHQ FLYING PIG number (Google, Hotmail, Yahoo!) generator (PRNG) * Stevens, Counter-cryptanalysis, Crypto 2013 trapdoor allows to predict keys

23 24

4 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

Dual_EC_DRBG Dual_EC_DRBG Dual Elliptic Curve Deterministic Random Bit Generator • NSA Bullrun program: NSA has been actively working to • ANSI and ISO standard "Insert vulnerabilities into commercial encryption systems, • 1 of the 4 PRNGs in NIST SP 800-90A IT systems, networks, and endpoint communications • draft Dec. 2005; published 2006; revised 2012 devices used by targets." • 10 Sept. 2013, NYT: "internal memos leaked by a former NSA contractor suggest that the NSA generated one of the • Two “suspicious” parameters P and random number generators used in a 2006 NIST standard • Many warnings and critical comments — called the Dual EC DRBG standard — which contains a • before publication [Gjøsteen05], [Schoenmakers-Sidorenko06] for the NSA." • after publication [Ferguson-Shumov07] • 9 Sept. 2013: NIST “strongly recommends" against the use of dual_EC_DRBG, as specified in the January 2012 Appendix: The security of Dual_EC_DRBG requires that the version of SP 800-90A. points P and Q be properly generated. To avoid using potentially weak points, the points specified in Appendix A.1 Why was the slowest and least secure of the 4 PRNGs chosen should be used. as the default algorithm in BSAFE?

25 26

Cryptanalysis on Quantum If a large quantum computer can Computers? be built...

exponential parallelism n coupled quantum bits all schemes based on factoring (RSA) and DLOG will be insecure n 2 degrees of freedom ! same for elliptic curve cryptography symmetric key sizes: x2 Shor 1994: perfect for hash sizes: unchanged (for collisions) factoring but: can a quantum computer alternatives: postquantum crypto – McEliece, NTRU,… be built? – so far it seems very hard to match performance of current systems while keeping the against conventional attacks

27 28

2001: 7-bit quantum computer factors 15 COMSEC - Communication Security 2007: two new 7-bit quantum computers 2012: 143 has been factored Protecting data in transit: (authenticated) encryption – effective when done right (encryption works) 2012: 10 to 15 years for a large quantum computer – ok (but complex) standards: TLS, IPsec, S/MIME – weak legacy systems: GSM, Bluetooth Quantum Computing: An IBM Perspective – not end-to-end: WLAN, 3G Steffen, M.; DiVincenzo, D. P.; Chow, J. M.; Theis, T. N.; Ketchen, M. B. – lack of transparency: Skype Quantum – weak implementations: Dual EC DRBG The implementation of a functioning quantum computer poses tremendous scientific and – weak governance and key management: DigiNotar technological challenges, but current rates of progress suggest that these – insecure routing and domain name services challenges will be substantively addressed over the next ten years. We – backdoors likely provide a sketch of a quantum computing system based on superconducting circuits, which are the current focus of our research. A realistic vision emerges concerning the form of a future scalable fault-tolerant quantum computer. Limited fraction(a few %) of traffic is protected. News in January 2014: NSA has spent 85 M$ on A very small fraction of traffic is protected end-to-end building a quantum computer with a high security level

29 30

5 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

COMSEC - Communication Security COMSEC - Communication Security

Do not move problems to a single secret key Secure channels – example: Lavabit email studied in CAESAR – solution: threshold cryptography; proactive cryptography http://competitions.cr.yp.to/caesar.html Do not move problems to the authenticity of a single public key Simplify internet protocols with security by default: DNS, BGP, TCP, IP, http, SMTP,…

31 32

COMSEC - Communication Security COMPUSEC - Computer Security meta data

Hiding communicating identities Protecting data at rest – few solutions – need more – well established solutions for local encryption: – largest one is TOR with a few million users Bitlocker, Truecrypt – well managed but known limitations – infrequently used in cloud • e.g. security limited if user and destination are in same country – Achilles heel is key management

Location privacy: problematic

33 34

COMPUSEC - Computer Security COMPUSEC - Computer Security

Complex ecosystem developed over 40 years by thousands of people that has many weaknesses • Simplify to reduce attack surface • Errors at all levels leading to attacks (think ) – governments have privileged access to those weaknesses • Secure local computation • Continuous remote update needed • with minimal trusted computing base – entity that controls updates is in charge • with threshold security • Current defense technologies (firewall, anti-virus) not very strong • MPC, (F)HE, .. in practice – cannot resist a motivated attacker • hardware support: TPM, SMART, Sancus, SGX,… • Not designed to resist human factor attacks: coercion, bribery, blackmail • Secure and open implementations • Supply chain of software and hardware vulnerable and • Community driven open audit hard to defend • backdoors are hard to detect 35 36

6 Cryptography and Information Security in the October 2014 post-Snowden era Bart Preneel

Reconsider every stage Architecture is politics [Mitch Kaipor’93]

Crypto design

Hardware/software design Hardware backdoors Hardware production

Firmware/sw impl. Software backdoors

Device assembly Adding/modifying Device shipping hardware backdoors

Device configuration Configuration errors

Device update Backdoor insertion

37 © 38 13 38

Governance and architectures Governance and Architectures

Governments: want access for themselves but preclude this for others – seems elusive with current state of the art Back to principles: minimum disclosure Industry: conflicting requirements – stop collecting massive amounts of data 1. government requirements for access and backdoors 2. DRM for content and software – if we do collect data: encrypt with key outside control 3. privacy of consumer of host Individual: cannot manage complex tradeoffs – with crypto still useful operations Bring “cryptomagic” to use without overselling Need to rethink centralized architectures with massive – zero-knowledge, oblivious transfer, functional storage of raw data encryption • avoid single point of trust that becomes single point of failure – road pricing, smart metering, health care • data minimization through infrastructure

39 40

IACR Copenhagen Declaration Conclusions May 2014 • Keep improving cryptographic algorithms, secure channels and meta-data protection The membership of the IACR repudiates mass • Shift from network security to system security surveillance and the undermining of cryptographic • Rethink architectures solutions and standards. Population-wide • Increase robustness against powerful opponents surveillance threatens democracy and human who can subvert many subsystems during several dignity. We call for expediting research and lifecycle stages deployment of effective techniques to protect personal privacy against governmental and • Open technologies and review by open corporate overreach. communities

41 42

7