20 points

I know someone in this field and sent him this article. He said the “NIST isn’t being transparent” claim isn’t true

https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927303 https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8309.pdf https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934458

He also responded with “of course the NSA would try and mess with it, but if it’s peer reviewed properly I don’t see how they would be successful”

permalink
report
reply
51 points
*

We know for a fact that they have done it in the past and managed to hide it until it was too late, what makes you think they can’t do it again?

https://en.wikipedia.org/wiki/Dual_EC_DRBG

permalink
report
parent
reply
13 points
*

Looking at the history of the any of the Clandestine US orgs should probably remind us these people will do literally anything that they can, like give people LSD in an attempt to control their mind, or put microphones in Russian cats.

permalink
report
parent
reply
24 points

peer reviewed properly

Is the important bit here. The timeline from that Wikipedia article shows it was published in 2005 and work disproving it’s claim came around in 2006.

If a scientists work is retracted it really kills any more funding they receive. They use examples like the DRBG one as what not to be.

permalink
report
parent
reply
12 points
*

Did you send him Bernstein’s original blog post?

https://blog.cr.yp.to/20231003-countcorrectly.html

Unless he’s just making all of this up, it does seem pretty damning. I would love to see an in-depth rebuttal.

permalink
report
parent
reply
14 points

but if it’s peer reviewed properly

Is it?

permalink
report
parent
reply
34 points
*

Yeah you can observe this with letsencrypt failing to generate a certificate if you change the elliptic curve from an NSA generated curve to a generic/known safe one. Changing between different NSA curves are functionally fine. Forces all signed certificates to use curves that are known to have issues, deliberate or otherwise - i.e. backdoored.

permalink
report
reply
8 points
*

That’s worrying if true. However I couldn’t find a source. Even if true Let’s encrypt is probably the most secure option

permalink
report
parent
reply
1 point
4 points

Thanks, I am extremely skeptical and I might just reach out to let’s encrypt for clarification

permalink
report
parent
reply
8 points

You can’t use arbitrary curves with certificates, only those which are standardized because the CA will not implement anything which isn’t unambiguously defined in a standard with support by clients.

https://community.letsencrypt.org/t/tls-1-2-and-tls-1-3-need-curve25519-and-curve448-ssl-certificates/200775/3

permalink
report
parent
reply
10 points
*

My point is that there is a documented listed of supported curves for ECDSA but attempting to use any other safe curve in the list results in a failure. I am not trying to use some arbitrary curve.

If your point is that no safe curve is permitted because the powers that be don’t permit it, TLS is doomed.

https://eff-certbot.readthedocs.io/en/latest/using.html#using-ecdsa-keys

The default is a curve widely believed to be unsafe, p256, with no functioning safe alternative.

https://safecurves.cr.yp.to/

That’s Bernstein’s website if anyone was wondering, showing p256 is unsafe.

permalink
report
parent
reply
4 points
*

I run a cryptography forum, I know this stuff, and the problem isn’t algorithmic weakness but complexity of implementation.

All major browsers and similar networking libraries now have safe implementations after experts have taken great care to handle the edge cases.

It’s not a fault with let’s encrypt. If they allowed nonstandard curves then almost nothing would be compatible with it, even the libraries which technically have the code for it because anything not in the TLS spec is disabled.

https://security.stackexchange.com/questions/42088/can-custom-elliptic-curves-be-used-in-common-tls-implementations

https://cabforum.org/baseline-requirements-certificate-contents/

CAB is the consortium of Certificate Authorities (TLS x509 certificate issuers)

With that said curve25519 is on its way into the standards

permalink
report
parent
reply
21 points

Can you elaborate on this? Which curves does it happen with? Is there some source that you’ve seen?

permalink
report
parent
reply
39 points

Before, elliptical curve encryption has been hailed as the new golden standard, only too bad there is a serious weakness where if you know the seed you can crack the code. And guess who has the seed? Starts with N and ends with SA.

permalink
report
reply
61 points

Goddamn NASA and their meddling!

permalink
report
parent
reply
3 points

And here I thought it was the National Emergency Services Academy.

permalink
report
parent
reply

Curve25519 should be fine.

permalink
report
parent
reply
-2 points

#Bitcoin

permalink
report
reply
0 points

What

permalink
report
parent
reply
101 points

Interesting article and discussion.

The way Signal is addressing post-quantum encryption is by layering Crystals-KYBER over their current encryption. I initially thought it was overkill, but it’s a great decision.

permalink
report
reply
10 points

My phone has a Kyber crystal?! Awesome!

permalink
report
parent
reply
14 points

There is np such thing as overkill while some governments actively funding quantum computing projects for the sole purpose of code cracking

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 12K

    Posts

  • 556K

    Comments