RSA Security

From Wikipedia, the free encyclopedia
  (Redirected from RSA Laboratories)
Jump to: navigation, search
RSA Security LLC
Trading name RSA
Type Division of EMC Corporation
Industry Encryption and Network Security
Fate Acquired by EMC Corporation
Founded 1982[1][2]
Founders [1]
Headquarters Bedford, Massachusetts, United States
Key people
  • Thomas P. Heiser (President)
  • Arthur W. Coviello, Jr. (Executive Chairman)
Products Encryption and network security software
Revenue Not separately disclosed by EMC
Employees 1,319 (as of 2007)
Parent EMC Corporation
Website www.rsa.com

RSA Security LLC,[3] formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Len Adleman, after whom the RSA public key cryptography algorithm was also named.[4] Among its products include the RSA BSAFE cryptography libraries and the SecurID authentication token. RSA is known for incorporating backdoors developed by the NSA in its products.[5][6] It also organizes the annual RSA Conference, an information security conference.

Founded as an independent company in 1982, RSA Security, Inc. was acquired by EMC Corporation in 2006 for US$2.1 billion and operates as a division within EMC.[7]

RSA is based in Bedford, Massachusetts, maintaining offices in Australia, Ireland, Israel, the United Kingdom, Singapore, India, China, Hong Kong and Japan.

History[edit]

Ron Rivest, Adi Shamir and Leonard Adleman, who developed the RSA encryption algorithm in 1977, founded RSA Data Security in 1982.[1][2]

  • In 1995, RSA sent a handful of people across the hall to found Digital Certificates International, better known as VeriSign.
  • The company then called Security Dynamics acquired RSA Data Security in July 1996 and DynaSoft AB in 1997.
  • In January 1997, it proposed the first of the DES Challenges which led to the first public breaking of a message based on the Data Encryption Standard.
  • In February 2001, it acquired Xcert International, Inc., a privately held company that developed and delivered digital certificate-based products for securing e-business transactions.
  • In May 2001, it acquired 3-G International, Inc., a privately held company that developed and delivered smart card and biometric authentication products.
  • In August 2001, it acquired Securant Technologies, Inc., a privately held company that produced ClearTrust, an identity management product.
  • In December 2005, it acquired Cyota, a privately held Israeli company specializing in online security and anti-fraud solutions for financial institutions.[8]
  • In April 2006, it acquired PassMark Security.
  • On September 14, 2006, RSA stockholders approved the acquisition of the company by EMC Corporation for $2.1 billion.[7][9][10]
  • On 2007 RSA acquired Valyd Software, a Hyderabad-based Indian company specializing in file and data security .
  • In 2009 RSA launched the RSA Share Project.[11] As part of this project, some of the RSA BSAFE libraries were made available for free. To promote the launch, RSA ran a programming competition with a US$10,000 first prize.[12]
  • In 2011, RSA introduced a new CyberCrime Intelligence Service designed to help organizations identify computers, information assets and identities compromised by trojans and other online attacks.[13]

SecurID security breach[edit]

RSA SecurID security tokens.

On March 17, 2011 RSA disclosed an attack on its two-factor authentication products. The attack was similar to the Sykipot attacks, the July 2011 SK Communications hack, and the NightDragon series of attacks.[14] RSA called it an Advanced Persistent Threat.[15]

Relationship with NSA[edit]

RSA's relationship with the NSA changed over the years. Reuter's Joseph Menn,[16] as well as cybersecurity analyst Jeffrey Carr,[17] have noted that the two once had an adversarial relationship. In the company's early years, RSA and its leaders were prominent advocates of strong cryptography for public use, while NSA and the Bush and Clinton administrations sought to prevent its proliferation.

For almost 10 years, I've been going toe to toe with these people at Fort Meade. The success of this company [RSA] is the worst thing that can happen to them. To them, we're the real enemy, we're the real target. We have the system that they're most afraid of. If the U.S. adopted RSA as a standard, you would have a truly international, interoperable, unbreakable, easy-to-use encryption technology. And all those things together are so synergistically threatening to the N.S.A.'s interests that it's driving them into a frenzy.

—RSA president James Bidzos, June 1994[18]

In the mid-1990s, RSA and Bidzos led a "fierce" public campaign against the Clipper Chip, an encryption chip with a backdoor to allow the U.S. government to decrypt communications. The Clinton administration pressed telecommunications companies to use the chip in their devices, and relaxed export restrictions on products that used it. (Such restrictions had prevented RSA Security from selling its software abroad.) RSA joined civil libertarians and others in opposing the Clipper Chip by, among other things, distributing posters with a foundering sailing ship and the words "Sink Clipper!"[19]

The relationship shifted from adversarial to cooperative after Bidzos stepped down as CEO in 1999, according to Victor Chan, who led RSA's department engineering until 2005: "When I joined there were 10 people in the labs, and we were fighting the NSA. It became a very different company later on."[19] For example, RSA was reported to have accepted $10 million from the NSA in 2004 in a deal to use the NSA-designed Dual_EC_DRBG random number generator in their BSAFE library, despite many indications that Dual_EC_DRBG was both of poor quality and possibly backdoored.[20][21] RSA Security later released a statement about the Dual_EC_DRBG backdoor:

We made the decision to use Dual EC DRBG as the default in BSAFE toolkits in 2004, in the context of an industry-wide effort to develop newer, stronger methods of encryption. At that time, the NSA had a trusted role in the community-wide effort to strengthen, not weaken, encryption. This algorithm is only one of multiple choices available within BSAFE toolkits, and users have always been free to choose whichever one best suits their needs. We continued using the algorithm as an option within BSAFE toolkits as it gained acceptance as a NIST standard and because of its value in FIPS compliance. When concern surfaced around the algorithm in 2007, we continued to rely upon NIST as the arbiter of that discussion. When NIST issued new guidance recommending no further use of this algorithm in September 2013, we adhered to that guidance, communicated that recommendation to customers and discussed the change openly in the media.

—RSA, The Security Division of EMC[22]

In March 2014, it was reported by Reuters that RSA had also adapted the extended random standard championed by NSA. Later cryptanalysis showed that extended random did not add any security, and was rejected by the prominent standards group Internet Engineering Task Force. Extended random did however make NSA's backdoor for Dual_EC_DRBG tens of thousands of times faster to use for attackers with the key to the Dual_EC_DRBG backdoor (presumably only NSA), because the extended nounces in extended random made part of the internal state of Dual_EC_DRBG easier to guess. Only RSA Security's Java version was hard to crack without extended random, since the caching of Dual_EC_DRBG output in e.g. RSA Security's C programming language version already made the internal state fast enough to determine. And indeed, RSA Security only implemented extended random in its Java implementation of Dual_EC_DRBG.[23][24]

NSA Dual_EC_DRBG backdoor[edit]

From 2004 to 2013, RSA shipped security software — BSAFE toolkit and Data Protection Manager — that included a default cryptographically secure pseudorandom number generator, Dual_EC_DRBG that was later suspected to contain an alleged secret National Security Agency backdoor. The backdoor could have made data encrypted with these tools much easier to break for NSA, which had the secret private key to the backdoor.

RSA Security employees had long been aware, at least, that Dual_EC_DRBG might contain a backdoor. Three employees were members of the ANSI X9F1 Tool Standards and Guidelines Group, to which Dual_EC_DRBG had been submitted for consideration in the early 2000s.[25] The possibility that the random number generator could contain a backdoor was "first raised in an ANSI X9 meeting", according to John Kelsey, a co-author of the NIST SP 800-90A standard that contains Dual_EC_DRBG.[26] In January 2005, two employees of the cryptography company Certicom — they were also members of the X9F1 group — wrote a patent application that described a backdoor for Dual_EC_DRBG identical to the NSA one.[27] The patent application also described three ways to neutralize the backdoor. Two of these — ensuring that two arbitrary elliptic curve points P and Q used in Dual_EC_DRBG are independently chosen, and a smaller output length — was added to the standard as an option, though NSA's backdoored version of P and Q and large output length remained as the standard's default option. Kelsey said he knew of no implementers who actually generated their own non-backdoored P and Q,[26] and there have been no reports of implementations using the smaller outlen.

Nevertheless, NIST included Dual_EC_DRBG in its 2006 NIST SP 800-90A standard with the default settings enabling the backdoor, largely at the behest of NSA officials,[21] who had cited RSA Security's early use of the random number generator as an argument for its inclusion.[19] The standard did also not fix the unrelated (to the backdoor) problem that the CSPRNG was slightly predictable, which Gjøsteen had pointed out earlier in 2006, and which lead Gjøsteen to call Dual_EC_DRBG not cryptographically sound.[28]

The ANSI standard group's backdoor suspicion had apparently not been widely publicized, because the potential backdoor was rediscovered in 2007 by Dan Shumow and Niels Ferguson when they implemented Dual_EC_DRBG in Windows.[29] Commenting on Shumow and Ferguson's work in 2007, prominent security researcher and cryptographer Bruce Schneier called the possible NSA backdoor "rather obvious", and wondered why NSA bothered pushing to have Dual_EC_DRBG included, when the general poor quality and possible backdoor would ensure that nobody would ever use it.[21] There does not seem to have been a general awareness that RSA Security had made it the default in some of its products in 2004, until the Snowden leak.[21]

In September 2013, the New York Times, drawing on the Snowden leaks, revealed that the NSA worked to "Insert vulnerabilities into commercial encryption systems, IT systems, networks, and endpoint communications devices used by targets" as part of the Bullrun program. One of these vulnerabilities, the Times reported, was the Dual_EC_DRBG backdoor.[30] With the renewed focus on Dual_EC_DRBG, it was noted that RSA Security's BSAFE used Dual_EC_DRBG by default, which there had not previously been a widespread awareness of.

After the New York Times published its article, RSA Security recommended that users switch away from Dual_EC_DRBG, but denied that they had deliberately inserted a backdoor.[20][31] RSA Security officials have largely declined to explain why they did not remove the dubious random number generator once the flaws became known,[20][31] or why they did not implement the simple mitigation that NIST added to the standard to neutralize the suggested and later verified backdoor.[20] Scientifically speaking, the backdoor employs kleptography, and is, essentially, an instance of the Diffie Hellman kleptographic attack published in 1997 by Adam Young and Moti Yung.[citation needed]

On 20 December 2013, Reuters' Joseph Menn reported that NSA secretly paid RSA Security $10 million in 2004 to set Dual_EC_DRBG as the default CSPRNG in BSAFE. The story quoted former RSA Security employees as saying that "no alarms were raised because the deal was handled by business leaders rather than pure technologists".[19] Interviewed by CNET, Schneier called the $10 million deal a bribe.[32] RSA officials responded that they have not "entered into any contract or engaged in any project with the intention of weakening RSA’s products."[33] Menn stood by his story,[34] and media analysis noted that RSA's carefully worded reply denied only that company officials knew about the backdoor when they agreed to the deal, an assertion Menn's story did not make.[35]

In the wake of the reports, several industry experts cancelled their planned talks at RSA's 2014 RSA Conference.[36] Among them was Mikko Hyppönen, a Finnish researcher with F-Secure who cited RSA's denial of the $10 million payment by the NSA as suspicious.[37] Hyppönen announced his intention to give his talk, "Governments as Malware Authors," at a conference quickly set up in reaction to the reports: TrustyCon, to be held on the same day and one block away from the RSA Conference.[38]

At the 2014 RSA Conference, RSA Security Executive Chairman Art Coviello defended RSA Security's choice to keep using Dual_EC_DRBG by saying "it became possible that concerns raised in 2007 might have merit" only after NIST acknowledged the problems in 2013.[39]

Products[edit]

RSA enVision is a security information and event management (SIEM) platform, with centralised log-management service that claims to "enable organisations to simplify compliance process as well as optimise security-incident management as they occur."[40]

See also[edit]

References[edit]

  1. ^ a b c "Distributed Team Cracks Hidden Message in RSA's 56-Bit RC5 Secret-Key Challenge". October 22, 1997. Retrieved February 22, 2009. 
  2. ^ a b Kaliski, Burt (October 22, 1997). "Growing Up with Alice and Bob: Three Decades with the RSA Cryptosystem". Retrieved February 22, 2009. 
  3. ^ "RSA Security LLC Company Profile". Retrieved May 15, 2013. 
  4. ^ "RSA History". Retrieved June 8, 2011. 
  5. ^ "NSA infiltrated RSA security more deeply than thought - study". Reuters. Retrieved 2014-03-31. 
  6. ^ "RSA endowed crypto product with second NSA-influenced code". Ars Technica. Retrieved 2014-03-31. 
  7. ^ a b "EMC Announces Definitive Agreement to Acquire RSA Security, Further Advancing Information-Centric Security". Rsasecurity.com. 2006-06-29. Retrieved 2012-05-12. 
  8. ^ "RSA buys Cyota for $145 million". 
  9. ^ "EMC Newsroom: EMC News and Press Releases". Emc.com. Retrieved 2012-05-12. 
  10. ^ "EMC Completes RSA Security Acquisition, Announces Acquisition of Network Intelligence". Rsasecurity.com. 2006-09-18. Retrieved 2012-05-12. 
  11. ^ "RSA Share Project". Retrieved 4 January 2013. 
  12. ^ "Announcing the RSA Share Project Programming Contest". 24 Mar 2009. Retrieved 4 January 2013. 
  13. ^ "RSA CyberCrime Intelligence Service". rsa.com. Retrieved 2013-12-19. 
  14. ^ "Command and Control in the Fifth Domain". Command Five Pty Ltd. February 2012. Retrieved February 10, 2012. 
  15. ^ "RSA hit by advanced persistent threat attacks". Computer Weekly. March 18, 2011. Retrieved May 4, 2011. 
  16. ^ Joseph Menn. "Exclusive: Secret contract tied NSA and security industry pioneer". 
  17. ^ Carr, Jeffrey. (2014-01-06) Digital Dao: NSA's $10M RSA Contract: Origins. Jeffreycarr.blogspot.dk. Retrieved on 2014-05-11.
  18. ^ Steven Levy (12 Jun 1994). "Battle of the Clipper Chip". New York Times. Retrieved 8 Mar 2014. 
  19. ^ a b c d Menn, Joseph (December 20, 2013). "Exclusive: Secret contract tied NSA and security industry pioneer". San Francisco. Reuters. Retrieved December 20, 2013. 
  20. ^ a b c d Matthew Green. "RSA warns developers not to use RSA products". 
  21. ^ a b c d Bruce Schneier. "The Strange Story of Dual_EC_DRBG". 
  22. ^ RSA. "RSA Response to Media Claims Regarding NSA Relationship". Retrieved 8 Mar 2014. 
  23. ^ Menn, Joseph (31 March 2014). "Exclusive: NSA infiltrated RSA security more deeply than thought - study". Reuters. Retrieved 4 April 2014. 
  24. ^ http://dualec.org/
  25. ^ Green, Matthew. (2013-12-28) A Few Thoughts on Cryptographic Engineering: A few more notes on NSA random number generators. Blog.cryptographyengineering.com. Retrieved on 2014-05-11.
  26. ^ a b http://cryptome.org/2013/12/800-90-dual-ec-drbg.pdf
  27. ^ Patent CA2594670A1 - Elliptic curve random number generation - Google Patents. Google.com (2011-01-24). Retrieved on 2014-05-11.
  28. ^ http://www.math.ntnu.no/~kristiag/drafts/dual-ec-drbg-comments.pdf
  29. ^ http://rump2007.cr.yp.to/15-shumow.pdf
  30. ^ "Secret Documents Reveal N.S.A. Campaign Against Encryption". New York Times. 
  31. ^ a b "We don’t enable backdoors in our crypto products, RSA tells customers". Ars Technica. 
  32. ^ "Security firm RSA took millions from NSA: report". CNET. 
  33. ^ "RSA Response to Media Claims Regarding NSA Relationship". RSA Security. 
  34. ^ http://www.theregister.co.uk/2013/12/23/rsa_nsa_response/
  35. ^ "RSA's 'Denial' Concerning $10 Million From The NSA To Promote Broken Crypto Not Really A Denial At All". techdirt. 
  36. ^ "C-net news". 
  37. ^ "An Open Letter to the Chiefs of EMC and RSA". 
  38. ^ Gallagher, Sean. (2014-01-21) “TrustyCon” security counter-convention planned for RSA refusniks. Ars Technica. Retrieved on 2014-05-11.
  39. ^ http://uk.emc.com/collateral/corporation/rsa-conference-keynote-art-coviello-feburary-24-2014.pdf
  40. ^ "RSA Envision". EMC. Retrieved 19 December 2012. 

External links[edit]