NSA Says ‘No Backdoor’ For Spies In New US Encryption Scheme
The US is readying new encryption standards that will be so ironclad that even the nation’s top code-cracking agency says it won’t be able to bypass them. NSA Says ‘No Backdoor’ For Spies In New US Encryption Scheme
* NIST Agency Running Competition For New Encryption Standards
* Quantum Computing Comes With Risks For Modern Data Protection
The National Security Agency has been involved in parts of the process but insists it has no way of bypassing the new standards.
“There are no backdoors,” said Rob Joyce, the NSA’s director of cybersecurity at the National Security Agency, in an interview.
A backdoor enables someone to exploit a deliberate, hidden flaw to break encryption. An encryption algorithm developed by the NSA was dropped as a federal standard in 2014 amid concerns that it contained a backdoor.
The new standards are intended to withstand quantum computing, a developing technology that is expected to be able to solve math problems that today’s computers can’t. But it’s also one that the White House fears could allow the encrypted data that girds the U.S. economy – and national security secrets – to be hacked.
Scientists estimate viable quantum computing could arrive anywhere from five to 50 years from now, if ever.
The contest by the National Institute of Standards and Technology, or NIST, is intended to update the algorithms that underpin widespread public-key cryptography that secures emails, online banking, medical records, access to control systems, some national security work and more.
That system, developed in the 1970s, allows for the private exchange of information by relying on publicly accessible algorithms. Announcement of the winners is imminent, officials said.
The Biden administration last week unveiled a plan to switch the entire US economy to quantum-resistant cryptography, which will rely on new NIST algorithms, as much “as is feasible by 2035.”
Joyce, of the NSA, said it was a question of “when, not if.” He is among those who worry U.S. adversaries are stealing and stockpiling encrypted data intended to remain secret for decades or more in anticipation of being able to unlock it when viable quantum computing arrives. China, for one, is pouring billions of dollars of investment into developing quantum computing, according to US researchers.
NIST, which started the post-quantum contest in 2016, has taken pains to stress independence in overseeing the public competition, which is now down to seven finalists from 69 initial viable submissions “from all over the world.”
While the NSA has helped design and edit NIST standards in the past, this time the institute has made all decisions about the new algorithms internally, relying on the expertise of its post-quantum cryptography team, a NIST spokesperson told Bloomberg.
The NSA already has classified quantum-resistant algorithms of its own that it developed over many years, said Joyce. But it didn’t enter any of its own in the contest. The agency’s mathematicians, however, worked with NIST to support the process, trying to crack the algorithms in order to test their merit.
“Those candidate algorithms that NIST is running the competitions on all appear strong, secure, and what we need for quantum resistance,” Joyce said. “We’ve worked against all of them to make sure they are solid.”
The purpose of the open, public international scrutiny of the separate NIST algorithms is “to build trust and confidence,” he said.
Leaked documents from former NSA contractor Edward Snowden in 2013 revealed some of the NSA’s techniques for penetrating encryption and lent credence to allegations that the algorithm it created included a backdoor. Afterward, NIST revoked its support for the algorithm.
Choosing the algorithm is only a first step. NIST will then oversee an effort to turn the winning algorithms into public standards. The plan is to make them available in 2024 so that government and industry can adopt them.
The NIST spokesperson said the final standard will also be open to scrutiny for any weakness or flaws.
“The reason they take so long to standardize is our confidence in them is a function of how many hours really smart people are taking to try to break them,” said Charles Tahan, director of the national quantum coordination office at the White House, in an interview.
Related Articles:
What Is Apple’s “Private Relay” And How Does It Compare To A VPN?
AI Experts Warn of Potential Cyberwar Facing Banking Sector vs Bitcoin Which Can Be Stored Off-line
Researchers Use GPU Fingerprinting To Track Users Online
Vast Troves of Classified Info Undermine National Security, Spy Chief Says
San Francisco’s Historic Surveillance Law May Get Watered Down
Teen Cyber Prodigy Stumbled Onto Flaw Letting Him Hijack Teslas
Vast Troves of Classified Info Undermine National Security, Spy Chief Says
Ultimate Resource On Solana Outages And DDoS Attacks
Japan Defense Ministry Finds Security Threat In Hack
Alibaba Admits It Was Slow To Report Software Bug After Beijing Rebuke
US Ransomware Attack Suspect Hails From A Small Ukrainian Town
Google Issues Warning For 2 Billion Chrome Users
Can The IRS Be Trusted With Your Data?
Homeland Security Offers Hackers A Bounty To Find Bugs
Tech Giants Apple, Microsoft, Amazon And Others Warn of Widespread Software Flaw
Apple Sues NSO Group To Curb The Abuse Of State-Sponsored Spyware
How Crypto Vigilantes Are Hunting Scams In A $100 Billion Market
Verizon is Tracking iPhone Users by Default And There’s Nothing Apple Can Do. How to Turn It Off
Massive Encrypted Cellphone Hack Gave Police A Window On Cocaine, Cash And Killers
GoDaddy Breached – Plaintext Passwords – 1.2M Affected!!
Amazon’s Twitch Hack Shows Top Gamers Rake In Six-Figure Payouts
The Mercenary Threat of U.S. Hackers-for-Hire
A Hospital Hit By Hackers, A Baby In Distress: The Case Of The First Alleged Ransomware Death
Google’s Chrome Browser Is Under Active Attack, Patch Now!!!!
How Hackers Use Our Brains Against Us And How We Can Fight Back
AT&T 5G Upgrade Risks Silencing Home Alarms Reliant On Old Tech
Coinbase Users Angry With Customer Support After Funds Disappear From Accounts
Apple Cyber Flaw Allows Silent iPhone Hack Through iMessage
Biden Urges CEOs To Improve U.S. Cybersecurity After Attacks
How Hackers Hammered Australia After China Ties Turned Sour
Electric Vehicle Infrastructure Push Brings Cyber Concerns
Hacker Claims To Steal Data Of 100 Million T-Mobile Customers
Accenture Confirms Hack After LockBit Ransomware Data Leak Threats
CIA Weighs Creating Special China Unit In Bid To Out-Spy Beijing
Israel’s Mossad Intelligence Agency Is Seeking To Hire A Crypto Expert
US Taps Amazon, Google, Microsoft, Others To Help Fight Ransomware, Cyber Threats
US Drops Visa Fraud Cases Against Five Chinese Researchers
Want To Invest In Cybersecurity? Here Are Some ETFs To Consider
How To Protect Your Online Privacy While Working From Home
What Hackers Can Learn About You From Your Social-Media Profile
Biden Administration Blames Hackers Tied To China For Microsoft CyberAttack Spree
US Fights Ransomware With Crypto Tracing, $10 Million Bounties
Faces Are The Next Target For Fraudsters
Russia ‘Cozy Bear’ Breached GOP As Ransomware Attack Hit
Advertising Company Will Use Its Billboards To Track Passing Cellphones
REvil Ransomware Hits 200 Companies In MSP Supply-Chain Attack
What It Will Take To Protect Cities Against Cyber Threats
Home Security Company ADT Betting On Google Partnership To Build Revenue
Carnegie Cyber Kids Academy. World’s Most Prestigious Cyber Defense Training Facility
How To Opt Out Of Amazon’s Bandwidth-Sharing Sidewalk Network
Carnival Discloses Breach of Personal Data On Guests And Crew
UK Cyber Chief Cameron Says Ransomware Key Online Threat
The FBI Secretly Ran The Anom Messaging Platform, Yielding Hundreds Of Arrests In Global Sting
Federal Reserve Hacked More Than 50 Times In 4 Years
All of JBS’s US Beef Plants Were Forced Shut By Cyberattack
It Wasn’t Until Anonymous Payment Systems That Ransomware Became A Problem
A New Ransomware Enters The Fray: Epsilon Red
This Massive Phishing Campaign Delivers Password-Stealing Malware Disguised As Ransomware
Biden Proposes Billions For Cybersecurity After Wave of Attacks
Mobile Crypto ‘Mining’ App Possibly Connected To Personal Data Leak
Ireland Confirms Second Cyber Attack On Health System
US Unveils Plan To Protect Power Grid From Foreign Hackers
Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals
A Hacker Was Selling A Cybersecurity Exploit As An NFT. Then OpenSea Stepped In
Clubhouse And Its Privacy & Security Risk
Using Google’s ‘Incognito’ Mode Fails To Prevent Tracking
Kia Motors America Victim of Ransomware Attack Demanding $20M In Bitcoin, Report Claims
The Long Hack: How China Exploited A U.S. Tech Supplier
Clubhouse Users’ Raw Audio May Be Exposed To Chinese Partner
Hacker Changed Chemical Level In Florida City’s Water System
UK Merger Watchdog Suffers 150 Data Breaches In Two Years
KeepChange Foils Bitcoin Theft But Loses User Data In Sunday Breach
Hacker Refuses To Hand Police Password For Seized Wallet With $6.5M In Bitcoin
SonicWall Says It Was Victim of ‘Sophisticated’ Hack
Tor Project’s Crypto Donations Increased 23% In 2020
Armed Robbers Steal $450K From Hong Kong Crypto Trader
Is Your iPhone Passcode Off Limits To The Law? Supreme Court Ruling Sought
Researchers Warn 3 Apps Have Been Stealing Crypto Undetected For A Year
Ways To Prevent Phishing Scams In 2020
The Pandemic Turbocharged Online Privacy Concerns
US Treasury Breached By Foreign-Backed Hackers
FireEye Hack Portends A Scary Era Of Cyber-Insecurity
How FinCEN Became A Honeypot For Sensitive Personal Data
Apple And Google To Stop X-Mode From Collecting Location Data From Users’ Phones
Surge In Physical Threats During Pandemic Complicates Employee Security Efforts
Imagine A Nutrition Label—for Cybersecurity
Cybercriminals Attack GoDaddy-based Cryptocurrency Platforms
Biden Team Lacks Full U.S. Cybersecurity Support In Transition Fracas
Nasdaq To Buy Anti-Financial Crime Firm Verafin For $2.75 Billion
Mysterious Software Bugs Were Used To Hack iPhones and Android Phones and No One Will Talk About It
Dark Web Hackers Say They Hold Keys To 10,000 Robinhood Accounts #GotBitcoin
Hackers Steal $2.3 Million From Trump Wisconsin Campaign Account
Crypto Scammers Deface Trump Campaign Website One Week From Elections
Telecoms Protocol From 1975 Exploited To Target 20 Crypto Executives
With Traders Far From Offices, Banks Bring Surveillance To Homes
A Millionaire Hacker’s Lessons For Corporate America
Container Shipping Line CMA CGM Says Data Possibly Stolen In Cyberattack
Major Hospital System Hit With Cyberattack, Potentially Largest In U.S. History
Hacker Releases Information On Las Vegas-Area Students After Officials Don’t Pay Ransom
Russian Troll Farms Posing As African-American Support For Donald Trump
US Moves To Seize Cryptocurrency Accounts Linked To North Korean Heists
These Illicit SIM Cards Are Making Hacks Like Twitter’s Easier
Uber Exec Allegedly Concealed 2016 Hack With $100K BTC ‘Bug Bounty’ Pay-Off
Senate Panel’s Russia Probe Found Counterintelligence Risks In Trump’s 2016 Campaign
Bockchain Based Surveillance Camera Technology Detects Crime In Real-Time
Facebook Offers Money To Reel In TikTok Creators
How A Facebook Employee Helped Trump Win—But Switched Sides For 2020
Facebook Rebuffs Barr, Moves Ahead on Messaging Encryption
Facebook Ad Rates Fall As Coronavirus Undermines Ad Spending
Facebook Labels Trump Posts On Grounds That He’s Inciting Violence
Crypto Prediction Markets Face Competition From Facebook ‘Forecasts’ (#GotBitcoin?)
Coronavirus Is The Pin That Burst Facebook And Google Online Ads Business Bubble
OpenLibra Plans To Launch Permissionless Fork Of Facebook’s Stablecoin (#GotBitcoin?)
Facebook Warns Investors That Libra Stablecoin May Never Launch (#GotBitcoin?)
FTC Approves Roughly $5 Billion Facebook Settlement (#GotBitcoin?)
How Facebook Coin’s Big Corporate Backers Will Profit From Crypto
Facebook’s Libra Is Bad For African Americans (#GotBitcoin?)
A Monumental Fight Over Facebook’s Cryptocurrency Is Coming (#GotBitcoin?)
Alert! 540 Million Facebook Users’ Data Exposed On Amazon Servers (#GotBitcoin?)
Facebook Bug Potentially Exposed Unshared Photos of Up 6.8 Million Users (#GotBitcoin?)
Facebook Says Millions of Users’ Passwords Were Improperly Stored in Internal Systems (#GotBitcoin?)
Advertisers Allege Facebook Failed to Disclose Key Metric Error For More Than A Year (#GotBitcoin?)
Ad Agency CEO Calls On Marketers To Take Collective Stand Against Facebook (#GotBitcoin?)
Thieves Can Now Nab Your Data In A Few Minutes For A Few Bucks (#GotBitcoin?)
New Crypto Mining Malware Beapy Uses Leaked NSA Hacking Tools: Symantec Research (#GotBitcoin?)
Equifax, FICO Team Up To Sell Your Financial Data To Banks (#GotBitcoin?)
Cyber-Security Alert!: FEMA Leaked Data Of 2.3 Million Disaster Survivors (#GotBitcoin?)
DMV Hacked! Your Personal Records Are Now Being Transmitted To Croatia (#GotBitcoin?)
Lithuanian Man Pleads Guilty In $100 Million Fraud Against Google, Facebook (#GotBitcoin?)
Hack Alert! Buca Di Beppo, Owned By Earl Enterprises Suffers Data Breach Of 2M Cards (#GotBitcoin?)
SEC Hack Proves Bitcoin Has Better Data Security (#GotBitcoin?)
Maxine Waters (D., Calif.) Rises As Banking Industry’s Overseer (#GotBitcoin?)
Leave a Reply
You must be logged in to post a comment.