The Mathematics Community and the NSA

The Mathematics Community and the NSA

The Mathematics Community and the NSA POST-PUBLICATION EDITOR'S NOTE: This article is a part of the ongoing series "Mathematicians Discuss the Snowden Revelations". At the time of the writing of this piece Michael Wertheimer was the Director of Research at the NSA; he recently retired from that position. He can be reached at [email protected]. This is the latest installment in the Notices discus- Over the past several months a discussion about sion of the National Security Agency (NSA). Previ- the role of mathematics, mathematicians, and ous Notices pieces on this topic are: the activities of the National Security Agency has been hosted on the pages of the Notices. As an “AMS Should Sever Ties with the NSA” (Letter NSA mathematician I would like to provide some to the Editor), by Alexander Beilinson (December context to what has been reported in the press and 2013); “Dear NSA: Long-Term Security Depends share with the American Mathematical Society im- on Freedom”, by Stefan Forcey (January 2014); portant facts and information. In particular I would “The NSA Backdoor to NIST”, by Thomas C. Hales like to address two hot-button issues shaping this (February 2014); “The NSA: A Betrayal of Trust”, by conversation: “weakening” Internet encryption and Keith Devlin (June/July 2014); “The Mathematical impacts of data on privacy. Community and the National Security Agency”, by Andrew Odlyzko (June/July 2014); “NSA and the The US National Institute for Standards and Tech- Snowden Issues”, by Richard George (August 2014); nology (NIST), the American National Standards “The Danger of Success”, by William Binney (Sep- Institute (ANSI), the Internet Engineering Task tember 2014); “Opposing an NSA Boycott” (Letter Force (IETF), and the International Standards Orga- to the Editor), by Roger Schlafly (November 2014). nization (ISO) are the four main bodies with which the NSA participates in developing standards for See also the Letters to the Editor in this issue. cryptography. NSA has worked with each of these for over twenty-five years. We value and are com- Unsolicited submissions on this topic are wel- mitted to the important work of these groups in come. Inquiries and submissions may be sent to producing secure cryptographic standards that [email protected]. Articles of 800 words protect global communications. NSA has a long and or less are preferred. Those of 400 words or less documented record of providing security enhance- can be considered as Letters to the Editor and ments to openly published international standards. should be sent to [email protected]. However, recently our work has been questioned in several standards that are elliptic curve based, — Allyn Jackson the most significant of which is an NIST-proposed Notices Deputy Editor random number generator that I discuss below. [email protected] NSA mathematicians remain steadfast in ad- vocating secure international standards. Nev- ertheless, we are mindful that there has been Encryption and considerable discussion regarding NIST publi- cation SP 800-90A. This publication is entitled “Recommendation for Random Number Genera- the NSA Role in tion Using Deterministic Random Bit Generators” and contains specifications for four pseudoran- International Standards dom number generations for use in cryptographic applications. One of these describes a particular Michael Wertheimer random number generator associated with NSA: the Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG). The discussion centers Michael Wertheimer is Director of Research at the National on NSA’s role in the design and advocacy for this Security Agency. His email address is [email protected]. algorithm despite a mathematical demonstration DOI: http://dx.doi.org/10.1090/noti1213 of the potential for a trapdoor. FEBRUARY 2015 NOTICES OF THE AMS 165 A trapdoor, simply put, is information that al- With hindsight, NSA should have ceased sup- lows the inverse of a seemingly one-way function porting the dual EC_DRBG algorithm immediately to be computed easily. In other words, compute x after security researchers discovered the potential from f(x). In cryptographic applications, functions for a trapdoor. In truth, I can think of no better f are specifically designed to make the x to f(x) way to describe our failure to drop support for the computation very fast but the inverse computation Dual_EC_DRBG algorithm as anything other than intractable (hence, the term one-way). If an attacker regrettable. The costs to the Defense Department knows “secret” information about f that allows to deploy a new algorithm were not an adequate an inverse to be calculated, the attacker might reason to sustain our support for a questionable be able to decrypt messages or, in the case of the algorithm. Indeed, we support NIST’s April 2014 Dual_EC_DRBG, predict future outputs. decision to remove the algorithm. Furthermore, we During the development of the ANSI standard realize that our advocacy for the DUAL_EC_DRBG based on the NIST publication, members of X9F1 casts suspicion on the broader body of work NSA (the ANSI-approved working group responsible for has done to promote secure standards. Indeed, cryptographic tools) raised concerns about the po- some colleagues have extrapolated this single ac- tential that elliptic curve points used as parameters tion to allege that NSA has a broader agenda to for the Dual_EC_DRBG could harbor a trapdoor “undermine Internet encryption.” A fair reading secret known only to, and exploitable only by, the of our track record speaks otherwise. Neverthe- person who generated the points. As a result, the less, we understand that NSA must be much more X9F1 committee expanded the standard to include transparent in its standards work and act accord- verifiable random point generation. Since the NSA ing to that transparency. That effort can begin with was using the algorithm at the time and had gen- the AMS now. erated elliptic curve points for protecting Depart- NSA strongly endorses the NIST outline for ment of Defense users, the NSA-generated points cryptographic standards development, which were included in the standard. In other words, can be found at csrc.nist.gov/groups/ST/ any implementation that used the NSA-generated crypto-review/process.html. One significant, points would be deemed compliant. Shortly there- and correct, change is that all NSA comments will after, NIST negotiated with ANSI to use the ANSI be in writing and published for review. In other Random Number Generation Standard as the basis words, we will be open and transparent about our for an NIST Random Number Generation Standard. cryptographic contributions to standards. In ad- ANSI also approved submitting a version of this dition, we will publish algorithms before they are standard to the ISO. considered for standardization to allow more time In 2007 several Microsoft researchers, includ- for public scrutiny (as we did recently with the ing Microsoft’s representative to the ANSI X9F1 new SIMON and SPECK algorithms, eprint.iacr. committee that created the ANSI version of the org/2013/404.pdf). With these measures in place, standard, raised concerns in a talk at a crypto- even those not disposed to trust NSA’s motives can graphic conference about the trapdoor potential determine for themselves the appropriateness of in the Dual_EC_DRBG. These concerns were picked our submissions, and we will continue to advocate up by the media and widely disseminated. NIST for better security in open-source software, such as and ANSI reviewed this information and elected to Security Enhancements for Linux and Security En- retain both the verifiable point generation scheme hancements for Android (selinuxproject.org). and the NSA-generated points. We hope this open affirmation and our adher- In 2013 the same concerns were again raised ence to it will chart a course that all mathemati- and promulgated by the media. This time NSA’s cians will agree is appropriate and correct. actions were portrayed as a subversion of stan- dards. However, the facts remain: Data and Privacy •The Dual_EC_DRBG was one of four NSA mathematicians carry on a long and storied random number generators in the NIST tradition of making and breaking codes and ci- standard; it is neither required nor the phers. Perhaps most celebrated are feats that our default. forebearers, American and Allied, made in break- ing German and Japanese ciphers in World War •The NSA-generated elliptic curve II. Ironically, less than 5 percent of the encrypted points were necessary for accreditation material collected during that war was successfully of the Dual_EC_DRBG but only had to decrypted, and of that amount only a scant fraction be implemented for actual use in cer- contributed to any sort of measurable action. Such tain DoD applications. is the nature of intelligence. Today’s communications environment makes •The trapdoor concerns were openly 5 percent appear staggeringly large. The simple studied by ANSI X9F1, NIST, and by the act of using a particular encryption algorithm no public in 2007. longer identifies the sender or receiver (as the 166 NOTICES OF THE AMS VOLUME 62, NUMBER 2 ENIGMA cipher did in World War II); the variety by a complex set of laws, policies, and implement- of protocols, products, and services for secure ing rules. This type of data, lawfully obtained and communications numbers in the thousands; and properly evaluated, helps us to avoid surprise. It the ease and frequency of changing identifiable is used to discover new threats, refine both our features is unprecedented. To achieve our foreign filters and selectors, and ultimately create a rising intelligence mission lawfully and effectively, NSA tide that lifts our intelligence insights and privacy mathematicians lead efforts that determine how protections. Mathematicians are leading the way we “filter,” “select,” and “process” data while to design and implement the algorithms that cre- continuously verifying that our processes and pro- ate this rising tide.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us