Post-Snowden Cryptography
Total Page:16
File Type:pdf, Size:1020Kb
Post-Snowden Crypto June 2016 Bart Preneel Post-Snowden Cryptography Bart Preneel COSIC KU Leuven and iMinds, Belgium Bart.Preneel(at)esat.kuleuven.be June 2016 1 2 NSA calls the iPhone users public 'zombies' who pay for their own surveillance 3 4 Outline NSA: • Snowden revelation and mass surveillance “Collect it all, • Going after crypto know it all, • The end of crypto exploit it all” • Security research www.wired.com 5 6 1 Post-Snowden Crypto June 2016 Bart Preneel Snowden revelations Snowden revelations (2) most capabilities could have been extrapolated from open Most spectacular: active defense sources • networks But still… – Quantum insertion: answer before the legitimate website massive scale and impact (pervasive) – inject malware in devices level of sophistication both organizational and technical • devices – redundancy: at least 3 methods to get to Google’s data – malware based on backdoors and 0-days (FoxAcid) – many other countries collaborated (beyond five eyes) – supply chain subversion – industry collaboration through bribery, security letters*, … Translation in human terms: complete control of networks and • including industrial espionage systems, including bridging the air gaps undermining cryptographic standards with backdoors No longer deniable (Bullrun) … and also the credibility of NIST Oversight weak * Impact of security letters reduced by Freedom Act (2 June 2015) 7 8 Rule #1 of cryptanalysis: search for plaintext [B. Morris] AliceEve/NSA Bob CRY Clear Clear CRY Clear Clear PTO PTO text text text text BOX BOX 9 10 Where do you find plaintext? SSO: Special Source Operations 1. PRISM (server) 2. Upstream (fiber) 11 12 2 Post-Snowden Crypto June 2016 Bart Preneel Muscular (GCHQ) 3. Traffic data (meta data) (DNR) help from not plaintext itself, but Level 3 • URLs of websites, MAC and IP addresses, location information,… (LITTLE) • it allows to map networks and reveals social relations 6 June 2013: NSA collecting phone records of millions of Verizon customers daily • Nov. 2015: USA Freedom act: “Final temporary reauthorization of the Section 215 bulk telephony metadata data program in the US expires” • Information stored at telcos – can be obtained via FISA court EU: data retention directive (2006/24/EC) – April 2014: direct is declared illegal by EU Court of Justice: Jan 9 2013: In the preceding 30 days, field collectors had processed and sent back disproportionate and contrary to some fundamental rights protected 181,280,466 new records — including “metadata,” which would indicate who sent or received e-mails and when, as well as content such as text, audio and video (from by the Charter of Fundamental Rights, in particular to the principle Yahoo! and Google) of privacy 13 DNR: Dial number recognition 14 4. Client systems: Quantum + TAO TEMPORA architecture (1) Gain “access” to raw content: intercept (cable, satellite), hack, buy, ask. • sophisticated malware based on 0-days (or Turbulence 3 days:125 Petabyte Tempora/Xks subversion of the update mechanism) (US$ 200M) • e.g. FOXACID – quantum insertion (2) “Selector” based Ring (3) Standard MetaMeta- Queries • hardware devices (air-gapped “promotion” Buffer Data machines) • radio interfaces and radar Selectors (4) “Map Reduce” activation Target Queries Selectors Promoted Traffic Promoted Enrichment • supply chain interception Signals Intelligence Traffic Promoted Queries Translation, Target Collation, Selectors Long Term Intel. Database Analysis, products TAO: Tailored Access Operations 15 Slide credit: George Danezis, UCL * Tempora ~ Deep Dive Xkeyscore (NSA) 16 Which questions can one answer with mass surveillance systems/bulk data collection? NSA is not alone Tempora (GCHQ) ~ Deep Dive Xkeyscore (NSA) • I have one phone number – find all the devices of this person, his surfing behavior, the location where he has travelled to and his closest collaborators • Find all Microsoft Excel sheets containing MAC addresses in Belgium • Find all exploitable machines in Panama • Find everyone in Austria who communicates in French and who use OTR or Signal BND has spied on EU (incl. German) companies and targets in exchange for access to these systems 17 18 3 Post-Snowden Crypto June 2016 Bart Preneel Mass Surveillance panopticon If data is the new oil, data mining yields the rocket fuel [Jeremy Bentham, 1791] industry discrimination fear conformism - stifles dissent oppression and abuse users government 19 20 Mass Surveillance Outline Economy of scale Pervasive surveillance requires pervasive collection • Snowden revelation and mass surveillance and active attacks • Going after crypto – implicates everyone - also innocent bystanders • The end of crypto – emphasis moving from COMSEC to COMPUSEC (from network security to systems security) • Security research – undermines integrity of and trust in computing infrastructure Human rights do not stop at your border 21 22 NSA foils much internet encryption If you can’t get the plaintext NYT 6 September 2013 The National Security Agency is winning its long- running secret war on encryption, using AliceEve/NSA Bob supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine CRY CRY %^C& %^C& Clear the major tools protecting the privacy of Clear PTO PTO @&^( @&^( text everyday communications in the Internet age text BOX BOX [Bullrun] Ask for the key! 23 24 4 Post-Snowden Crypto June 2016 Bart Preneel Find the Private Key (Somehow) Asking for the key • Logjam: TLS fallback to 512-bit export control legacy • (alleged) examples – through security letters? systems • Lavabit email encryption • 1024-bit RSA and Diffie-Hellman widely used default • CryptoSeal Privacy VPN option not strong enough • SSL/TLS servers of large companies? • GCHQ Flying Pig program • Silent Circle email? • Truecrypt?? [Adrian+] Imperfect Forward Secrecy: How Diffie- Source: SSL Pulse Hellman Fails in Practice, CCS 2015 25 26 If you can’t get the private key, If you can’t get the key substitute the public key 12M SSL/TLS servers make sure that the key is generated using a fake SSL certificates or SSL person-in-the-middle as random number generator with trapdoor commercial product or government attack – 650 CA certs trustable by common systems Pseudo- – Comodo, Diginotar, Turktrust, ANSSI, China Internet Network Information Center (CNNIC), Symantec random – Flame: rogue certificate by cryptanalysis seed number live since November 2015 generator https://letsencrypt.org/isrg/ (PRNG) [Holz+] TLS in the Wild, NDSS 2016 trapdoor allows to predict keys [Stevens] Counter-cryptanalysis, Crypto’13 27 28 Dual_EC_DRBG Dual_EC_DRBG Dual Elliptic Curve Deterministic Random Bit Generator • 10 Sept. 2013, NYT: "internal memos leaked by a former NSA • ANSI and ISO standard contractor suggest that [..] the Dual EC DRBG standard […] • 1 of the 4 PRNGs in NIST SP 800-90A contains a backdoor for the NSA." • draft Dec. 2005; published 2006; revised 2012 • 16 Sept. 2013: NIST “strongly recommends" against the use of Dual_EC_DRBG, as specified in SP 800-90A (2012) • Two “suspicious” parameters P and Q • Nov. 2013: RSA’s BSAFE library chooses DUAL_EC as default • Many warnings and critical comments • Dec. 2015: Juniper announces Dual_EC problems for Netscreen • before publication [Gjøsteen05], [Schoenmakers-Sidorenko06] • 08: 6.2.r01 uses Dual_EC in a way it can be exploited • after publication [Ferguson-Shumov07] • 12: someone changed the backdoor (6.2.r015) Appendix: The security of Dual_EC_DRBG requires that the [Checkoway+] On the Practical Exploitability of Dual EC in TLS points P and Q be properly generated. To avoid using Implementations, Usenix Security 2014 potentially weak points, the points specified in Appendix A.1 [Checkoway+] A Systematic Analysis of the Juniper Dual EC Incident, should be used. Cryptology ePrint Archive, Report 2016/376 29 30 5 Post-Snowden Crypto June 2016 Bart Preneel NSA can (sometimes) break Cryptovirology [Young-Yung] SSL/TLS, IPsec, SSH, PPTP, Skype http://www.cryptovirology.com/cryptovfiles/research.html • ask for private keys • implementation weaknesses • weak premaster secret (IPsec) • end 2011: decrypt 20,000 secure VPN connections/hour • http://www.spiegel.de/international/germany/inside-the-nsa-s-war-on-internet-security-a-1010361.html • http://blog.cryptographyengineering.com/2014/12/on-new-snowden-documents.html 31 32 Fighting cryptography Outline • Weak implementations • Going after keys • Undermining standards • Snowden revelation and mass surveillance • Cryptanalysis • Going after crypto • Increase complexity of standards • The end of crypto • Export controls • Security research • Hardware backdoors • Work with law enforcement to promote backdoor access and data retention We are going dark 33 34 Encryption to protect industry ~18.3B Not Encryption to protect user data ~12.5B end to (not meta data) Browser end log10 http:// https:// SSL 12 Transport System log10 HTTP over SSL 6.2B 6B 12 10 3B 2.4B 250M 6.3B 200M 200M 10 3.5B 1B 37M 700M 500M 500M 8 20- 8 50M? 12 M 6 6 ? ? 4 4 2 2 0 0 Mobile Browsers WhatsApp iMessage Skype Harddisk IPsec SSL/TLS © Bart Preneel 35 © Bart Preneel 36 6 Post-Snowden Crypto June 2016 Bart Preneel Deployment of cryptography Cryptography that seems to work • most crypto in volume and market serves for data and entity authentication • code updates • payments: credit/debit/ATM/POS and SSL/TLS • access cards • confidentiality • government/military secrets • DRM/content protection • telco: not end-to-end or with a backdoor • hard disk encryption: backdoored? • most data in