17-11-2007, 07:38
|
|
|
חבר מתאריך: 03.09.06
הודעות: 3,486
|
|
האפשרות ש NSA "שתלה" דלת-אחורית בתקן ההצפנה NIST SP 800-90 ?
ציטוט חלקי,
ציטוט:
This is how it works: There are a bunch of constants -- fixed numbers -- in the standard used to define the algorithm's elliptic curve. These constants are listed in Appendix A of the NIST publication, but nowhere is it explained where they came from.
What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.
|
wired מקור
|