RSA Didn’t Let NSA inAdded: Friday, December 27th, 2013
Category: Bit Torrent Freedom > The Right To Share
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The RSA has denied a claim that it took $10 million from the National Security Agency to use the buggered up Dual Elliptic Curve Deterministic Random Bit Generator in its encryption products. RSA, owned by EMC, started using Dual EC DRBG by default 9 years ago, before the generator was standardized.
Back in 2007, a backdoor in the algorithm weakened the strength of any encryption which relied on it. Only this past September RSA told its clients to stop using the algorithm. The National Security Agency was accused of weakening the random number generator, but the RSA categorically denied the allegation that it knew about the flaw. It said that it could make sense to use the random number generator in an industry-wide effort to develop innovative methods of encryption. At that time, the Agency had a trusted role in strengthening (not weakening) encryption.
The RSA used the algorithm in question as an option within BSAFE toolkits when it gained acceptance as a NIST standard and thanks to its value in FIPS compliance. The RSA admitted that when concern had surfaced around the algorithm 6 years ago, they continued to rely upon NIST as the arbiter of that discussion.
However, the RSA provided no comment about the $10 million figure which appeared in a Snowden leak. It just said that it hadn’t entered into any contract or engaged in any project which could weaken its own products.
December 27th,2013Posted by:
Friday, December 27th, 2013
|The rule in any covert operation once the perps have been found out is to, admit nothing, deny everything and make accusations. It seems to have started|
|posted by (2013-12-28 08:37:47)|
|So from 2007 to last September all data using RSA was compromised. Sorry but I cant believe a word you say.|
Robert D. Silverman, RSA Laboratories
April 8, (((((((((((2002))))))))))))))
Some recent articles have suggested that 1024-bit RSA keys are no longer secure. What's going on?
In a recent research paper , Daniel Bernstein, a mathematics professor at University of Illinois, observed that the cost of breaking an RSA key - the product of the amount of hardware needed and the running time - might not be as great for very large key sizes as previously thought.
Are 1024-bit RSA keys at risk?
They're no more at risk now than before Bernstein's paper appeared.
|unless you personally wrote it and secured it on your own, then it is only as secure as the other person wants it to be for you. Nothing is secure and everything have trap doors built in. Its just the way of things, I am sure someone will flame me and say I'm all wrong. There is an old saying, dead men tell no secrets. Nothing is secure|
|posted by (2013-12-30 06:54:23)|
|debian Linux was have random security encryption on article years above say like in period of replace with security time like several speak letter world languages if some knew it. ..if of course was true.||
Most Popular Stories