{"id":6522,"date":"2013-12-21T18:29:46","date_gmt":"2013-12-21T23:29:46","guid":{"rendered":"http:\/\/www.math.columbia.edu\/~woit\/wordpress\/?p=6522"},"modified":"2018-02-04T16:00:52","modified_gmt":"2018-02-04T21:00:52","slug":"trust-the-math-an-update","status":"publish","type":"post","link":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/?p=6522","title":{"rendered":"Trust the math? An Update"},"content":{"rendered":"<p>Back in September, I wrote <a href=\"http:\/\/www.math.columbia.edu\/~woit\/wordpress\/?p=6243\">here<\/a> about the news that Snowden&#8217;s revelations that confirmed suspicions that back in 2005-6 NSA mathematicians had compromised an NIST standard for elliptic-curve cryptography.  The new standard was promoted as an improvement using sophisticated mathematical techniques, when these had really just been used to introduce a backdoor allowing the NSA to break encryption using this standard.   There still does not seem to have been much discussion in the math community of the responsibility of mathematicians for this (although the AMS this month is running <a href=\"http:\/\/www.ams.org\/notices\/201401\/rnoti-p7.pdf\">this opinion piece<\/a>).<\/p>\n<p>After my blog post, some nice detailed descriptions of how this was done and the mathematics involved appeared.  See for instance <a href=\"http:\/\/blog.cryptographyengineering.com\/2013\/09\/the-many-flaws-of-dualecdrbg.html?\">The Many Flaws of Dual_EC_DRBG<\/a> by Matthew Green, and <a href=\"http:\/\/jiggerwit.wordpress.com\/2013\/09\/25\/the-nsa-back-door-to-nist\/\">The NSA back door to NIST<\/a> by Thomas Hales.   The Hales piece will appear soon in the AMS Notices.  Hales also has a more recent piece, <a href=\"http:\/\/jiggerwit.wordpress.com\/2013\/11\/04\/formalizing-nist-standards\/\">Formalizing NIST Standards<\/a>, which argues for the use of formal verification methods to check such standards. Also appearing after my blog post was the <a href=\"http:\/\/arstechnica.com\/security\/2013\/09\/stop-using-nsa-influence-code-in-our-product-rsa-tells-customers\/\">news<\/a> that RSA Security was now advising people not to use one of its products in default mode, the BSAFE toolkit.<\/p>\n<p>One mystery that remained was why the NIST had promulgated a defective standard, knowing full well that experts were suspicious of it.  Also unclear was why RSA Security would include a suspicious standard in their products. Back in September they told people that (see <a href=\"http:\/\/arstechnica.com\/security\/2013\/09\/we-dont-enable-backdoors-in-our-crypto-products-rsa-tells-customers\/\">here<\/a>) they had done this because:<\/p>\n<blockquote><p>The hope was that elliptic curve techniques\u2014based as they are on number theory\u2014would not suffer many of the same weaknesses as other techniques<\/p><\/blockquote>\n<p>and issued a <a href=\"https:\/\/blogs.rsa.com\/news-media-2\/nist-guidance-statement\/\">statement<\/a> saying:<\/p>\n<blockquote><p>RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any backdoors in our products. Decisions about the features and functionality of RSA products are our own.<\/p><\/blockquote>\n<p>Today there are <a href=\"http:\/\/www.reuters.com\/article\/2013\/12\/20\/us-usa-security-rsa-idUSBRE9BJ1C220131220\">new revelations about this<\/a> (it&#8217;s unclear from what source), which explain what helped make RSA swallow the bogus mathematics: a payment from the NSA of \\$10 million. I guess there&#8217;s a lesson in this: when you can&#8217;t figure out why someone went along with a bad mathematical argument, maybe it&#8217;s because someone else gave them \\$10 million&#8230;<br \/>\n<strong><br \/>\nUpdate<\/strong>: For another explanation of the math behind this, see videos <a href=\"https:\/\/www.youtube.com\/watch?v=ulg_AHBOIQU\">here<\/a> and <a href=\"https:\/\/www.youtube.com\/watch?v=1O69uBL22nY\">here<\/a> featuring Edward Frenkel.<\/p>\n<p><strong>Update:<\/strong>  There&#8217;s a response to the Reuters story from RSA <a href=\"https:\/\/blogs.rsa.com\/news-media-2\/rsa-response\/\">here<\/a>.  As I read it, it says <\/p>\n<ul>\n<li>They do have a secret contract with the NSA that they cannot discuss<\/li>\n<li>They used the NSA back-doored algorithm in their product because they trust the NSA<\/li>\n<li>They didn&#8217;t remove it when it became known because they really are incompetent, not because the NSA was paying them to act incompetent<\/li>\n<\/ul>\n<p>It&#8217;s hard to see why anyone would now trust their products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in September, I wrote here about the news that Snowden&#8217;s revelations that confirmed suspicions that back in 2005-6 NSA mathematicians had compromised an NIST standard for elliptic-curve cryptography. The new standard was promoted as an improvement using sophisticated mathematical &hellip; <a href=\"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/?p=6522\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6522","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/6522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6522"}],"version-history":[{"count":9,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/6522\/revisions"}],"predecessor-version":[{"id":10052,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/6522\/revisions\/10052"}],"wp:attachment":[{"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.math.columbia.edu\/~woit\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}