RSA BSAFE

From Wikipedia, the free encyclopedia
Jump to: navigation, search

RSA BSAFE is a FIPS 140-2 validated cryptography library offered by RSA Security. From 2004 to 2013 the default random number generator in the library contained a backdoor from the American National Security Agency, as part of NSA's secret Bullrun program.[citation needed]

SSL-C[edit]

The SSL-C library is an SSL toolkit in the BSAFE suite. It was originally written by Eric A. Young and Tim J. Hudson, as a fork of the open library SSLeay, that they developed prior to joining RSA.[1][2] Like SSLeay, SSL-C supported SSLv2, SSLv3, TLSv1; while it also supports X.509v1 and X.509v3.[3] SSL-C was first released in 1999.[4]

Dual_EC_DRBG backdoor[edit]

From 2004 to 2013, the default cryptographically secure pseudorandom number generator (CSPRNG) in BSAFE was Dual_EC_DRBG, which contained a backdoor from NSA, in addition to being a biased and slow CSPRNG.[5] The cryptographic community had been aware that Dual_EC_DRBG was a very poor CSPRNG since shortly after the specification was posted in 2005, and by 2007 it had become apparent that the CSPRNG seemed to be designed to contain a hidden backdoor for NSA, usable only by NSA via a secret key.[6] In 2007 Bruce Schneier described the backdoor as too obvious to trick anyone to use it - there does not seem to have been an awareness that RSA Security had made it the default in BSAFE until the Snowden leak.[6] The backdoor was confirmed in the Snowden leaks in 2013, and it was also revealed that NSA had secretly paid RSA Security $10 million to use Dual_EC_DRBG by default in 2004,[7] though RSA Security denied that they knew about the backdoor in 2004. The Reuters article which revealed the secret $10 million contract to use Dual_EC_DRBG described the deal as "handled by business leaders rather than pure technologists".[7] RSA Security has largely declined to explain their choice to continue using Dual_EC_DRBG even after the defects and potential backdoor were discovered in 2006 and 2007, but has denied knowingly inserting the backdoor.[8]

So why would RSA pick Dual_EC as the default? You got me. Not only is Dual_EC hilariously slow — which has real performance implications — it was shown to be a just plain bad random number generator all the way back in 2006. By 2007, when Shumow and Ferguson raised the possibility of a backdoor in the specification, no sensible cryptographer would go near the thing. And the killer is that RSA employs a number of highly distinguished cryptographers! It's unlikely that they'd all miss the news about Dual_EC.

—Matthew Green, cryptographer and research professor at Johns Hopkins University, [5] (from after the backdoor was confirmed, but before the $10 million secret deal was reveal by Reuters)

As a cryptographically secure random number generator is often the basis of cryptography, much data encrypted with BSAFE was not secure against NSA. Specifically it has been shown that the backdoor makes SSL/TLS completely breakable by the party having the private key to the backdoor (i.e. NSA).[6] Since the US government and US companies have also used the vulnerable BSAFE, NSA can potentially have made US data less safe, if NSA's secret key to the backdoor had been stolen. It is also possible to derive the secret key by solving a single instance of the algorithm's elliptic curve problem[6] (breaking an instance of elliptic curve cryptography is considered unlikely with current computers and algorithms, but a breakthrough may occur).

References[edit]

  1. ^ Simson Garfinkel, Gene Spafford (2002). Web Security, Privacy & Commerce. O'Reilly. p. 114. ISBN 0596000456. 
  2. ^ Ivan Ristic (2013). OpenSSL Cookbook: A Guide to the Most Frequently Used OpenSSL Features and Commands. Qualys. p. 1. ISBN 9781907117053. 
  3. ^ RSA Data Security (1999). "RSA Introduces BSAFE SSL-C for Worldwide Markets". PR Newswire. 
  4. ^ RSA Australia (30 March 1999). "Check Point Software Licenses RSA BSAFE™ SSL-C for its Market-Leading VPN". Check Point Software. 
  5. ^ a b Matthew Green. "RSA warns developers not to use RSA products". 
  6. ^ a b c d Bruce Schneier. "The Strange Story of Dual_EC_DRBG". 
  7. ^ a b Menn, Joseph (December 20, 2013). "Exclusive: Secret contract tied NSA and security industry pioneer". San Francisco. Reuters. Retrieved December 20, 2013. 
  8. ^ "We don’t enable backdoors in our crypto products, RSA tells customers". Ars Technica. 

External links[edit]