Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (2024)

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (1)

In the year 2014, we came to know about the NSA's ability to break Trillions of encrypted connections by exploiting common implementations of the Diffie-Hellman key exchange algorithm – thanks to classified documents leaked by ex-NSA employee Edward Snowden.

At that time, computer scientists and senior cryptographers had presented the most plausible theory: Only a few prime numbers were commonly used by 92 percent of the top 1 Million Alexa HTTPS domains that might have fit well within the NSA's $11 Billion-per-year budget dedicated to "groundbreaking cryptanalytic capabilities."

And now, researchers from University of Pennsylvania, INRIA, CNRS and Université de Lorraine have practically proved how the NSA broke the most widespread encryption used on the Internet.


Diffie-Hellman key exchange (DHE) algorithm is a standard means of exchanging cryptographic keys over untrusted channels, which allows protocols such as HTTPS, SSH, VPN, SMTPS and IPsec to negotiate a secret key and create a secure connection.

Since applications that rely on the Diffie-Hellman key exchange algorithm generates ephemeral keys using groups of large prime numbers, it would take hundreds or thousands of years and a nearly unimaginable amount of money to decrypt secure communications directly.

However, it took researchers just two months and as many as 3,000 CPUs to break one of the 1024-bit keys, which could have allowed them to passively decrypt hundreds of millions of HTTPS-based communications and other Transport Layer Security (TLS) channels.

Encrypted communications could have an undetectable backdoor

You might be wondering how the researchers managed to do something which practically takes hundreds of years, with the computational hardware available today.

In a research paper [PDF] published Tuesday, the researchers explained that the Diffie-Hellman algorithm does not contain any backdoor itself, but it has been intentionally weakened in an undetectable way by hiding the fact how various applications generate prime numbers.

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (3)

Additionally, the size of keys (i.e. less than or equals to 1024-bit) chosen to be used in the Diffie-Hellman algorithm also matters a lot.

The researchers created a weak 1024-bit Diffie-Hellman trapdoor function, i.e. randomly selecting large prime number but from a predefined group, and showed that solving the discrete logarithm problem that underpins its security is about 10,000 times easier.

"Current estimates for 1024-bit discrete log in general suggest that such computations are likely within range for an adversary who can afford hundreds of millions of dollars of special-purpose hardware," the researchers wrote in their paper.

So, advanced hackers or well-resourced agencies who are aware of the fact how prime numbers are being generated for trapdoor function and looking to decrypt 1024-bit secured communications can unscramble the discrete logarithm in order to decrypt hundreds of millions of Diffie-Hellman-protected communications.

"The discrete logarithm computation for our backdoored prime was only feasible because of the 1024-bit size, and the most effective protection against any backdoor of this type has always been to use key sizes for which any computation is infeasible," the researchers said.

Researchers also estimate that conducting similar computations for 2048-bit keys, even with backdoored prime numbers, would be 16 Million times harder in comparison to 1024-bit keys and will remain infeasible for many upcoming years.

Despite the U.S. National Institute of Standards and Technology (NIST) recommending a transition to key sizes of at least 2,048 bits since 2010, the 1024-bit keys are still widely used online.

According to a survey performed by the SSL Pulse project, 22% of the Internet's top 140,000 HTTPS-protected sites use 1024-bit keys as of last month, which can be broken by nation-sponsored adversaries or intelligence agencies like NSA.

Therefore, the immediate solution to this issue is to switch to 2048-bit or even 4,096-bit keys, but, according to the researchers, in the future, all standardized prime numbers should be published together with their seeds.

The concept of backdooring primes used in the Diffie-Hellman key exchange algorithm is almost similar to the one discovered in the Dual Elliptic Curve Deterministic Random Bit Generator, better known as Dual_EC_DRBG, which is also believed to have been introduced by the NSA.

Almost three years ago, Snowden leaks revealed that RSA received $10 Million bribe from the NSA to implement their flawed cryptographic algorithm Dual_EC_DRBG in its bSafe Security tool as a default protocol in its products to keep encryption weak.

So, it is not at all surprising if the NSA would be using these undetectable and weakened "trapdoors" in millions of cryptographic keys to decrypt encrypted traffic over the Internet.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (2024)

FAQs

Has the NSA cracked TLS? ›

That's the approach NSA took with the Dual_EC RNG, standardized by NIST in Special Publication 800-90. There's compelling evidence that NSA deliberately engineered this generator with a backdoor — one that allows them to break any TLS/SSL connection made using it.

What encryption does the NSA use? ›

Advanced Encryption Standard (AES): an encryption algorithm, selected by NIST after a public competition. In 2003, NSA certified AES for Type 1 use in some NSA-approved systems. Secure Hash Algorithm: a widely used family of hash algorithms developed by NSA based on earlier designs by Ron Rivest.

Can the NSA tap your phone? ›

BUT — individual NSA analysts can wiretap anyone they want if the data they're accessing in real-time includes the content of everyone's phone calls or emails.

Can the NSA get past a VPN? ›

National Security Agency's XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden.

Can NSA crack 256-bit encryption? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

What is the most secure encryption in the world? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What is the strongest wireless security encryption protocol? ›

WEP, WPA, and WPA2 are Wi-Fi security protocols that secure wireless connections. They keep your data hidden and protect your communications, while blocking hackers from your network. Generally, WPA2 is the best choice, even though it consumes more processing power to protect your network.

Has NSA broken SSL? ›

In fact, if you are using SSL 3.0 you are no longer PCI compliant! This shouldn't really be surprising because SSL was superseded by TLS in 1999. So if you want to say that the NSA is able to break SSL 3.0 connections then you're probably right in most cases since there is a much larger attack surface.

What TLS does NSA recommend? ›

For example, NSA recommends that only TLS 1.2 or TLS 1.3 be used, and that SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 not be used. And even when TLS 1.2 and TLS 1.3 are employed, NSA recommends that cryptographic parameters meet the algorithm requirements in CNSSP 15, referred to as Commercial National Security Algorithms.

Has TLS ever been hacked? ›

The Browser Exploit Against SSL/TLS (BEAST) attack was disclosed in September 2011. It applies to SSL 3.0 and TLS 1.0 so it affects browsers that support TLS 1.0 or earlier protocols.

Is TLS 1.1 broken? ›

The older TLS protocols have known weaknesses that make them susceptible to attacks. Dropping support allows an upgrade to more secure connections. Specifically, TLS 1.0 and 1.1 have flaws like weak ciphers that can be exploited to decrypt traffic.

Top Articles
How to Disable TLS 1.0 and TLS 1.1 on Windows Server?
What's hashrate? | Robinhood
Aberration Surface Entrances
Wisconsin Women's Volleyball Team Leaked Pictures
Senior Tax Analyst Vs Master Tax Advisor
Do you need a masters to work in private equity?
Tx Rrc Drilling Permit Query
Pickswise the Free Sports Handicapping Service 2023
WK Kellogg Co (KLG) Dividends
Geometry Escape Challenge A Answer Key
Daniela Antury Telegram
Mephisto Summoners War
Interactive Maps: States where guns are sold online most
Hilo Hi Craigslist
boohoo group plc Stock (BOO) - Quote London S.E.- MarketScreener
Farmer's Almanac 2 Month Free Forecast
10 Fun Things to Do in Elk Grove, CA | Explore Elk Grove
Invitation Homes plans to spend $1 billion buying houses in an already overheated market. Here's its presentation to investors setting out its playbook.
Military life insurance and survivor benefits | USAGov
Talkstreamlive
Sunset Time November 5 2022
Shadbase Get Out Of Jail
Churchill Downs Racing Entries
Xpanas Indo
Gma' Deals & Steals Today
Nearest Ups Ground Drop Off
How to Use Craigslist (with Pictures) - wikiHow
Greyson Alexander Thorn
Craig Woolard Net Worth
Ellafeet.official
3 Bedroom 1 Bath House For Sale
Xfinity Outage Map Lacey Wa
Solarmovie Ma
Mg Char Grill
Mta Bus Forums
Aliciabibs
Htb Forums
World Social Protection Report 2024-26: Universal social protection for climate action and a just transition
Lake Andes Buy Sell Trade
Newsweek Wordle
Www.craigslist.com Waco
Traumasoft Butler
Greg Steube Height
Xre 00251
3367164101
Bedbathandbeyond Flemington Nj
Craigslist Pets Lewiston Idaho
Mike De Beer Twitter
Haunted Mansion Showtimes Near The Grand 14 - Ambassador
Obituaries in Westchester, NY | The Journal News
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6260

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.