{"id":171534,"date":"2015-01-03T20:04:29","date_gmt":"2015-01-04T01:04:29","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/nsas-penetration-of-rsa-security-was-two-pronged-researchers.php"},"modified":"2015-01-03T20:04:29","modified_gmt":"2015-01-04T01:04:29","slug":"nsas-penetration-of-rsa-security-was-two-pronged-researchers","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsas-penetration-of-rsa-security-was-two-pronged-researchers.php","title":{"rendered":"NSA&#39;s penetration of RSA security was two-pronged: researchers"},"content":{"rendered":"<p><p>      Infiltrated: Two NSA tools exacerbated the RSA software's      vulnerability. Photo: Reuters    <\/p>\n<p>    Security industry pioneer RSA adopted not just one but two    encryption tools developed by the US National Security Agency    (NSA), greatly increasing the spy agency's ability to eavesdrop    on some internet communications, according to researchers.  <\/p>\n<p>    In December it was reported the NSA had paid RSA $US10 million    ($10,800,000) to make a now-discredited cryptography system the    default in software used by a wide range of internet and    computer security programs. The system, called Dual Elliptic    Curve, was a random-number generator, but it had a deliberate    flaw or \"back door\" that allowed the NSA to crack    the encryption.  <\/p>\n<p>    A group of professors from Johns Hopkins, the University of    Wisconsin, the University of Illinois and elsewhere now say    they have discovered that a second NSA tool exacerbated the RSA    software's vulnerability.  <\/p>\n<p>    The professors found that the tool, known as the Extended    Random extension for secure websites, could help crack a    version of RSA's Dual Elliptic Curve software tens of thousands    of times faster, according to an advance copy of their research    shared with Reuters.  <\/p>\n<p>    Advertisement  <\/p>\n<p>    While Extended Random was not widely adopted, the new research    sheds light on how the NSA extended the reach of its    surveillance under cover of advising companies on protection.  <\/p>\n<p>    RSA, now owned by EMC, did not dispute the research when    contacted by Reuters for comment. The company said it had not    intentionally weakened security on any product and noted that    Extended Random did not prove popular and had been removed from    RSA's protection software in the past six months.  <\/p>\n<p>    \"We could have been more sceptical of NSA's intentions,\" RSA    chief technologist Sam Curry said. \"We trusted them because    they are charged with security for the US government and US    critical infrastructure.\"  <\/p>\n<p>    Mr Curry declined to say if the government had paid RSA to    incorporate Extended Random in its BSafe security kit, which    also housed Dual Elliptic Curve.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/rss.feedsportal.com\/c\/34697\/f\/644136\/s\/38d51cd9\/sc\/46\/l\/0L0Ssmh0N0Bau0Cit0Epro0Csecurity0Eit0Cnsas0Epenetration0Eof0Ersa0Esecurity0Ewas0Etwopronged0Eresearchers0E20A140A40A10Ezqp6o0Bhtml\/story01.htm\/RK=0\/RS=s66s9RlXXnDVIOevSQoP.7tutT8-\" title=\"NSA&#39;s penetration of RSA security was two-pronged: researchers\">NSA&#39;s penetration of RSA security was two-pronged: researchers<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Infiltrated: Two NSA tools exacerbated the RSA software's vulnerability. Photo: Reuters Security industry pioneer RSA adopted not just one but two encryption tools developed by the US National Security Agency (NSA), greatly increasing the spy agency's ability to eavesdrop on some internet communications, according to researchers <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/nsas-penetration-of-rsa-security-was-two-pronged-researchers.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-171534","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/171534"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=171534"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/171534\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=171534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=171534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=171534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}