Bullrun - All Your Encryption Are Belong To Us

Unarmed Gunman

Medium Pimpin'
May 2, 2007
7,339
288
0
The D
www.googlehammer.com
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
....

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
....

The N.S.A. hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
....

“We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.

Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL, virtual private networks, or VPNs, and the protection used on fourth generation, or 4G, smartphones.
....


For at least three years, one document says, GCHQ, almost certainly in close collaboration with the N.S.A., has been looking for ways into protected traffic of the most popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document.

Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip.
And they went and did it anyway, without telling anyone,” Mr. Kocher said.
There is a lot more...
 


Yep. Saw this earlier this evening in NYT. Not surprised at all, and it pisses me off to no end. But I do get a bit of a chuckle thinking back to all of the amateur encryption experts that we so sure the government wasn't even capable of this.

As always, if you allow someone in a position of power to do something in secret, they will find a way to exploit everyone and everything in any way possible.
 
Yep. Saw this earlier this evening in NYT. Not surprised at all, and it pisses me off to no end. But I do get a bit of a chuckle thinking back to all of the amateur encryption experts that we so sure the government wasn't even capable of this.

From the article:

Intelligence officials asked The Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Americans and others.

The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June.

“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.

It seems to me that the NSA is relying on keystroke recording, trickery, backdoors, and weak commercially available closed source encryption to decrypt most data successfully. Encryption for SSL is quite weak and typically only 256-bit at best. This is fine for protecting credit card data, but it doesn't surprise me that they were successful in breaking it.

I have my doubts about the NSA's ability to decrypt an encrypted hard disk using an open source package like TrueCrypt without the reliance of tricks such as freezing the computer's ram in order to try to extract the passphrase. Apparently if the RAM is kept at low temperatures, data stays on it after power is cut for a few precious seconds more. If the PC has been powered down for a while though, this trick is not very helpful.

It's only a matter of time before the NSA starts to have fully functional quantom computers though. So I do think that in a few years it might be possible for the NSA to brute force decrypt even the strongest encryption available today. But it's also only a matter of time before quantom computers are commercially available and capable of offering quantom encryption which can not be decrypted by a quantom computer.
 
Encryption for SSL is quite weak and typically only 256-bit at best. This is fine for protecting credit card data, but it doesn't surprise me that they were successful in breaking it.
...
I have my doubts about the NSA's ability to decrypt an encrypted hard disk using an open source package like TrueCrypt

You know TrueCrypt is is AES-256, right? lol
 
^^^

I don't doubt that what you're saying is correct. I'm not sure that it is, but that's simply because I don't know enough about encryption technologies in the first place. But my statement was primarily relating to online transactions, emails, and what not anyway. In all honesty, I didn't even think about information stored on local hard drives. Though that's obviously a concern as well.

Even if that is the case, that's a minor point. For the vast majority of the population, most of this stuff is beyond the scope of their knowledge. They rely on banks, online checkouts, and the like to ensure their encryption keeps their credit card and purchase information private. That includes keeping it private from the government, at least when there is no search warrant.

It's not realistic or reasonable for every person who shops online or even uses a computer to know the ins and outs of encryption. And it's certainly unreasonable to force them to purchase a solution just because their government can't keep their noses out of their business.

For most people none of this will have any real life implications. But for others it will. The people working for the government are only people. Some have good intentions, some have bad intentions. Some are altruistic and some are out to better themselves by taking from others. But all of that is besides the point. You shouldn't have to worry about a massive government entity having a massive database of everything you purchase, all of your financial information, and tons of other information on you at the tips of their fingers.

If they need that information for a specific purpose, they should have to work to get it and go through the proper legal channels. Those would be the channels that are available for the public at-large to examine and know. Not some nasty backroom special directive that they pass off as law, but in reality isn't law.

Of course, I'm more than old enough to know that's a pipe dream. But it's still horseshit.

Ultimately it's all a part of the larger problem of the surveillance states that we all live in. It's only gotten worse over the years. Hell there was just a report the other day that AT&T has every phone call made in the states stored (meta data) since something like 1986. The only thing the DOJ needs to access that information is an administrative subpoena. That means it just takes some jackass at Justice to decide he wants to look up every phone call his neighbor ever made because his dog pissed in his yard. No judge. No oversight. Not even the appearance of it. Just some asshole with an ax to grind.
 
You know TrueCrypt is is AES-256, right? lol

....?

AES-256 is the exact same encryption the US government uses for some classified information.

Unless you have millions of dollars in funding and insanely fast computers, you aren't cracking that shit if its a strong password.

There are several documented cases where the FBI raids people and they cannot crack their TrueCrypt drives.

Thank the internet gods for Tor and TrueCrypt.
 
But it's also only a matter of time before quantom computers are commercially available and capable of offering quantom encryption which can not be decrypted by a quantom computer.

Unfortunately quantum computers already exist. For example: D-Wave, The Quantum Computing Company.

A few of those machines are likely already in the NSA's hands. So if what that article says is true then brute force is already a very likely capability of the NSA.
 
Thank the internet gods for Tor and TrueCrypt.

Not sure if I'd be in a hurry to trust Tor. One of my clients kept having his Bitcoin wallets wiped, and after a few weeks of pissing around, we're quite confident it's a Tor exit node.
 
Ok then, how about I send you a TrueCrypted AES-256bit flashdrive and you crack it?

PM me address.


the National Security Agency (NSA) has conducted a review and
analysis of AES and its applicability to the protection of national security systems and/or
information.
“The design and strength of all key lengths of the AES algorithm (i.e., 128, 192 and 256) are sufficient to protect classified information up to the SECRET level. TOP SECRET information will require use of either the 192 or 256 key lengths.”
http://csrc.nist.gov/groups/STM/cmvp/documents/CNSS15FS.pdf
 
^AES is also a relatively simple algorithm. It's highly unlikely that it has some unfound weaknesses. The same cannot be said for ECC, which the NSA also recommends. RSA is a bit unknown, but probably secure. All the weaknesses usually lie in the implementation.
 
Unfortunately quantum computers already exist. For example: D-Wave, The Quantum Computing Company.

A few of those machines are likely already in the NSA's hands. So if what that article says is true then brute force is already a very likely capability of the NSA.

Here's a good article about the D-Wave:

Google's Quantum Computer Proven To Be Real Thing (Almost) | Wired Enterprise | Wired.com

The D-wave isn't the kind of general purpose quantom computer that can break open any encrypted hard drive. However that sort of quantom computing is close, and it isn't outside the realm of reality to perhaps consider that maybe the NSA already has a fully functional quantom computer or is a few years away from such a breakthrough.
 
Thank the internet gods for Tor

“Our analysis,” says the report, “shows that 80% of all types of users may be deanonymized by a relatively moderate Tor-relay adversary within six months.” It gets worse. “Our results also show that against a single AS [autonomous system] adversary roughly 100% of users in some common locations are deanonymized within three months.” Infosecurity - Tor is Not as Safe as You May Think

See the quote above.
 
Here's a good article about the D-Wave:

Google's Quantum Computer Proven To Be Real Thing (Almost) | Wired Enterprise | Wired.com

The D-wave isn't the kind of general purpose quantom computer that can break open any encrypted hard drive. However that sort of quantom computing is close, and it isn't outside the realm of reality to perhaps consider that maybe the NSA already has a fully functional quantom computer or is a few years away from such a breakthrough.

Thanks, that was a good read.

Quantum computers do exist and its up to the software developers to expand the basic capabilities so that they can use the processing power. Obviously there are only a handful of these machines in existence so there aren't many "quantum" software developers out there, yet. It would seem however that the most recent version is 512 qubit which is a ridiculous amount of processing power.

I also think Google is full of shit, I'd bet that they bought more than one and as they expand the software, will move theirs brains and algos to these quantum machines. Imagine what 512 qubit algos will be like. It'll make Panda and Penguin updates look like old kids toys at a flee market.
 
There are several documented cases where the FBI raids people and they cannot crack their TrueCrypt drives.

They also can't get into a locked android phone. :hollering: It's all about priorities.

Ok then, how about I send you a TrueCrypted AES-256bit flashdrive and you crack it?

PM me address.
There are a lot of things I can't do that other people /entities can.



Why would you believe the government's publicly given information about their own capabilities? That's just stupid. Even poker players playing for fake money don't show their hand, and you expect the largest, most actively militarized, most secret government in the world to just hand over systems information? :usa: