We need to talk about mathematical backdoors in encryption algorithms (2024)

Security researchers regularly set out to find implementation problems in cryptographic algorithms, but not enough effort is going towards the search for mathematical backdoors, two cryptography professors have argued.

Governments and intelligence agencies strive to control and bypass or circumvent cryptographic protection of data and communications. Backdooring encryption algorithms is considered as the best way to enforce cryptographic control.

In defence of cryptography, researchers have set out to validate technology that underpins the secure exchange of information and e-commerce. Eric Filiol,head of research at ESIEA, the operational cryptology and virology lab, argued that only implementation backdoors (at the protocol/implementation/management level) are generally considered. Not enough effort is being put into looking for mathematical backdoors or by-design backdoors, he maintains.

During a presentation at Black Hat Europe last week, titled By-design Backdooring of Encryption System - Can We Trust Foreign Encryption Algorithms?, Filiol and his colleague Arnaud Bannier, explained how it is possible to design a mathematical backdoor.

We need to talk about mathematical backdoors in encryption algorithms (1)

RSA: That NSA crypto-algorithm we put in our products? Stop using that

READ MORE

During a presentation, the two researchers presented BEA-1, a block cipher algorithm which is similar to the AES and which contains a mathematical backdoor enabling an operational and effective cryptanalysis. “Without the knowledge of our backdoor, BEA-1 has successfully passed all the statistical tests and cryptographic analyses that NIST and NSA officially consider for cryptographic validation,” the French crypto boffins explain. “In particular, the BEA-1 algorithm (80-bit block size, 120-bit key, 11 rounds) is designed to resist linear and differential crypto-analyses. Our algorithm [was] made public in February 2017 and no one has proved that the backdoor is easily detectable [nor] have shown how to exploit it.”

How they did it

During the Black Hat talk, Filiol and Bannier went on to lift the lid on the backdoor they had deliberately planted and how to exploit it to recover the 120-bit key in around 10 seconds with only 600kB of data (300kB of plaintexts + 300kB of corresponding ciphertexts). This was a proof-of-concept exercise, they added, saying that more complex backdoors might be constructed.

“There is a strong asymmetry (based on the mathematics) between inserting a backdoor into an algorithm (what we did and which is supposed to be feasible and easy, at least from a computational aspect) and being able to prove its existence, detect and extract a backdoor,” Filiol told El Reg. “In a sense we have to create some sort of conceptual one-way function.”

The researcher has been looking into the topic of mathematical backdoors in crypto algorithms for years. His previous work has included a paper looking into possible issues in block encryption algorithms, which was published earlier this year.

Why, even in these circles, maths is uncool

“Research on mathematical backdoors is much more difficult (mathematical stuff) – and does not attract researchers that need to publish quickly and regularly on fashionable topics,” Filiol added. “This is the reason why this kind of research is essentially done in R&D lab of intelligence agencies (GCHQ, NSA...) and [is designed] more for designing backdoors than detecting them.”

Revelations from papers leaked by former NSA sysadmin Edward Snowden that the NSA paid RSA Security $10m to use the weak Dual_EC_DRBG technology by default in its cryptographic toolset show that concerns about mathematical or by-design backdoors are far from theoretical. The Dual_EC_DRBG example is not isolated, according to Filiol.

“There are a lot of examples but only a few are known,” Filiol said. “This was precisely the purpose of the 'History' part in my slides [PDF].

"I am convinced that all export versions of encryption system contain backdoors in one way or another. This is a direct constraint from the Wassenaar agreement. In this respect, the crypto AG and other companies (revealed by the Hans Buehler case) are the best examples. There are other less known [examples].

“In this context and when analysing the different documents, standardisation process the Dual_EC_DRBG precisely IS a known but certain case,” he added.

How many mathematical backdoors are out there?

Filiol admitted it was difficult to know or even gain some sense of the mix between the prevalence and importance of implementation backdoors (at the protocol/implementation/management level) versus mathematical backdoors.

“This is a difficult question to answer, since proving that there may be a backdoor is an intractable mathematical issue,” Filiol responded. "Analyzing the international regulations clearly proves that at least export versions contains backdoors.

"What is more concerning is that now we have to fear that [this] is also the case for domestic use, in the context of population [level] and mass surveillance."

Asked whether the peer-review process weeded out mathematical backdoors, Filiol argued for reform.

"Defending (proving security) is far more difficult than attacking (proving insecurity)," Filiol said. "And the big issue lies in the fact that academic ignorance [of it has] had as [its] result that we consider the absence of proof of insecurity as a proof of security.

NSA mathematicians and proving a negative

"We are in a realm where the attacker does not publish everything they can do (especially in cryptography where the activity of intelligence entities is still prevalent). So the experts and academics can only work with the known attacks as a working reference. Just imagine what the NSA (300 of the most brilliant mathematicians working for nearly four decades) can have produced: a mathematical corpus of knowledge."

Filiol does not accept the industry-standard and widely reviewed AES algorithm is necessarily secure, even though he doesn’t have evidence to the contrary at hand.

“If I cannot prove that the AES has a backdoor; no one can prove that there is none,” Filiol told El Reg. “And honestly, who would be mad enough to think that the USA would offer a strongly secure, military grade encryption algorithm without any form of control?"

He added: “I do not. The AES contest has been organised by the NIST with the technical support of the NSA (it is of public knowledge). Do you really think that in a time of growing terrorist threat, the USA would have been so stupid not to organise what is known as ‘countermeasures’ in conventional weaponry? Serious countries (USA, UK, Germany, France) do not use foreign algorithms for high-security needs. They mandatorily have to use national products and standards (fromthe algorithm to its implementation),” he added.

Filiol concluded that reforms were needed in the way that cryptographic algorithms are selected, analysed and standardised. “It should be a fully open process mainly driven by the open crypto community,” he maintains. ®

We need to talk about mathematical backdoors in encryption algorithms (2024)

FAQs

Does encryption require math? ›

The primary job duty of cryptography professionals is to analyze current security systems for any vulnerabilities that may be targeted by outside attackers. As cryptographers identify weaknesses, they apply mathematics and computer coding to strengthen the encryption.

What are backdoors in encryption? ›

A backdoor is a method for bypassing the required authorization and accessing secured data. An encryption backdoor uses an entry point into the encryption mechanism, or a weakness, put in place on purpose by the service provider to allow access to the information that would otherwise be protected from all entities.

What are the mathematical concepts used in cryptography? ›

In symmetric cryptography, a single secret key is used for both encryption and decryption. The mathematics behind symmetric encryption algorithms, such as the Advanced Encryption Standard (AES), involve operations like substitution, permutation, and modular arithmetic.

Does the NSA have backdoors for encryption? ›

Rob Joyce, the NSA's director of cybersecurity, told Bloomberg this week, “There are no backdoors." The NSA has been implicated in schemes to backdoor encryption before, including in a situation in the early 2010s in which the US removed an NSA-developed algorithm as a federal standard over backdoor concerns.

Is AES mathematically secure? ›

Is AES encryption secure? AES encryption is secure; however, its security varies according to its variants. For example, using brute-force methods, the 256-bit is virtually impenetrable, while the 52-bit DES key can be cracked in less than a day.

What is the math behind RSA encryption? ›

The Mathematics behind RSA. In RSA, we have two large primes p and q, a modulus N = pq, an encryption exponent e and a decryption exponent d that satisfy ed = 1 mod (p - 1)(q - 1). The public key is the pair (N,e) and the private key is d. C = Me mod N.

What are backdoors coding? ›

A backdoor is a piece of software or hardware that is planted on a target and has the purpose of granting elevated access to the system in question. The target for such an attack can be a personal computer or phone, a network, a router, a smartphone, or even a more specific piece of code or program.

What are the problems with backdoors? ›

Attackers make use of backdoors that software developers install, and they also install backdoors themselves as part of a computer exploit. Whether added as an administrative tool, a means of attack or a mechanism allowing the government to access encrypted data, all backdoor installation is a security risk.

Can backdoors be removed? ›

The challenge of backdoor shell removal

Once installed, backdoors are very hard to weed out. Traditionally, detection involves using software scanners to search for known malware signatures in a server file system. This process is error prone, however.

What math is most important for cryptography? ›

Perhaps the main mathematical background needed in cryptography is probability theory since, as we will see, there is no secrecy without randomness. Luckily, we only need fairly basic notions of probability theory and in particular only probability over finite sample spaces.

What is encryption with mathematical formulas? ›

An encryption algorithm is a mathematical formula used to transform plaintext (data) into ciphertext. An algorithm will use the key to alter the data in a predictable way. Even though the encrypted data appears to be random, it can actually be turned back into plaintext by using the key again.

What is a mathematical function used in cryptography? ›

Hash functions are mathematical functions that transform or "map" a given data set into a bit string of fixed size, also known as the "hash value." Hash functions are used in cryptography and have variable levels of complexity and difficulty.

Does AES have a backdoor? ›

Q: Are there any backdoors in the Advanced Encryption Standard (AES) that allow the National Security Agency (NSA) to access encrypted data? So as long as you implement it correctly in your hardware or software, (such as how Apple does it) then it is secure and has no back doors.

What encryption does the US military use? ›

Military grade encryption often refers to a specific encryption type, AES-256 (Advanced Encryption Standard). Currently, the U.S. government has named this algorithm the standard for encryption and most cybersecurity organizations today use this form of military grade encryption.

Can the NSA crack AES? ›

The AES made its first appearance in 2001 and is expected to remain strong and durable for at least a decade. But if the NSA has secretly built a computer that is considerably faster than machines in the unclassified arena, then the agency has a chance of breaking the AES in a much shorter time.

What is needed for encryption? ›

How encryption works. Encryption works by encoding “plaintext” into “ciphertext,” typically through the use of cryptographic mathematical models known as algorithms. To decode the data back to plaintext requires the use of a decryption key, a string of numbers or a password also created by an algorithm.

Is there a lot of math in cryptography? ›

Mathematics is at the heart of cryptography, which is the study of techniques for secure communication in the presence of third parties.

What is the encryption requirement? ›

The PCI DSS encryption requirements include one-way hash functions, strong cryptography, truncation, securely stored data pads and index tokens, and the use of AES (128-bit or higher), RSA (2048 bits or higher), TDES/TDEA, DSA/D-H (2048/224 bits or higher), and ECC (224 bits or higher).

Does cybersecurity require math? ›

Cybersecurity majors with a computer science focus often need a strong background in math, particularly in areas like calculus, discrete mathematics, and statistics. On the other hand, cybersecurity-focused degrees like information technology may have fewer math requirements, occasionally skipping advanced calculus.

Top Articles
Justifying Strict Liability: A Comparative Perspective, by Marco Cappelletti
eSIM - Terms and Conditions
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Davita Internet
Hawkeye 2021 123Movies
RuneScape guide: Capsarius soul farming made easy
2022 Apple Trade P36
Goteach11
When Is the Best Time To Buy an RV?
Savage X Fenty Wiki
Hope Swinimer Net Worth
Love In The Air Ep 9 Eng Sub Dailymotion
London Ups Store
Imagetrend Inc, 20855 Kensington Blvd, Lakeville, MN 55044, US - MapQuest
Costco Gas Foster City
Vandymania Com Forums
Project Reeducation Gamcore
E32 Ultipro Desktop Version
Cb2 South Coast Plaza
Papa Johns Mear Me
Studentvue Calexico
Bfsfcu Truecar
HP PARTSURFER - spare part search portal
2487872771
Issue Monday, September 23, 2024
+18886727547
Rogold Extension
Bursar.okstate.edu
Shiftwizard Login Johnston
Mg Char Grill
Kagtwt
Ma Scratch Tickets Codes
Moses Lake Rv Show
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Lovely Nails Prices (2024) – Salon Rates
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Mississippi weather man flees studio during tornado - video
Weekly Math Review Q2 7 Answer Key
At Home Hourly Pay
13 Fun & Best Things to Do in Hurricane, Utah
The Great Brian Last
War Room Pandemic Rumble
Gabrielle Abbate Obituary
Tyco Forums
Unblocked Games 6X Snow Rider
Marcel Boom X
Page 5747 – Christianity Today
Oefenpakket & Hoorcolleges Diagnostiek | WorldSupporter
Sleep Outfitters Springhurst
Public Broadcasting Service Clg Wiki
Karen Kripas Obituary
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 5822

Rating: 4.1 / 5 (52 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.