Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Communications Encryption Government Privacy United States

Ask Slashdot: Can We Still Trust FIPS? 138

First time accepted submitter someSnarkyBastard writes "It has already been widely reported that the NSA has subverted several major encryption standards but I have not seen any mention of how this affects the FIPS 140-2 standard. Can we still trust these cyphers? They have been cleared for use by the US Government for Top-Secret clearance documents; surely the government wouldn't backdoor itself right?...Right?"
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Can We Still Trust FIPS?

Comments Filter:
  • by Skiron ( 735617 ) on Thursday September 12, 2013 @04:25PM (#44834171)
    Depends who runs the Government. Which is always the same people no matter who gets voted in, so the answer is YES.
  • How can anyone trust (Score:5, Interesting)

    by i kan reed ( 749298 ) on Thursday September 12, 2013 @04:26PM (#44834175) Homepage Journal

    How could anyone trust an encryption algorithm provided by an organization whose purpose is decryption and interception? That will always be the craziest part.

  • No. (Score:3, Interesting)

    by Narcocide ( 102829 ) on Thursday September 12, 2013 @04:40PM (#44834353) Homepage

    No, and you never actually should have trusted it. None of us did, we all stopped using it the moment the NSA advocated it, just like we stopped trusting every single crypto standard and favorite security tool they promoted, merely because they promoted it so suspiciously, long long before it was public knowledge the agency had gone rouge.

    It still makes me chuckle when I hear people worryingly speculate whether SELinux has backdoors. SELinux doesn't have backdoors, SELinux IS A BACK DOOR!!! *Actually read the instructions* for configuration of this tool and you'll see what I mean. Its security-through-obscurity at its worst. At best you can increase the illusion of security to untrained staff members. Anyone who has read the manual though knows there's one command anyone can use to gain root access more easily than if SELinux had not enabled or installed.

  • by bill_mcgonigle ( 4333 ) * on Thursday September 12, 2013 @04:47PM (#44834431) Homepage Journal

    If there are "good guys" at the NSA, they need to be moved to NIST instead. Nobody will ever trust the NSA to do good work again.

  • TS is not SCI (Score:5, Interesting)

    by Anonymous Coward on Thursday September 12, 2013 @05:01PM (#44834571)

    "Up to Top Secret" does not include Sensitive Compartmented Information (SCI). The ciphers under discussion, backdoored or not, are not suitable for use on SCI.

  • by Anonymous Coward on Thursday September 12, 2013 @05:16PM (#44834721)

    The FIPS 140-2 standard is for "protecting sensitive but unclassified information". It is not for top secret. Also the body of the FIPS 140-2 standard is algorithm agnostic. The part that mandates specific algorithms is Annex A and can be updated to add and remove algorithms without changing the standard.

    In terms of how bad the situation actually is.... I refer to Bruce:
    The math is good, but math has no agency. Code has agency, and the code has been subverted.

  • by Anonymous Coward on Thursday September 12, 2013 @05:29PM (#44834861)

    Too much enciphering could be a threat to world peace. 0,1% of population must work against 99,9% to ensure 100% survive.

    That's why they did not have encrypted radio on the B52s raiding Vietnam. Nuclear weapons (and carriers) with the potential for a sneaky strike are dangerous, so they did not equip them with ciphers.

    I would not be surprised to find out the Russian and the American SIGINT service are actually working closely with each other to clamp down on any attempt of modern-day LeMays to destroy humanity. For the 99,9% they put up a good show of antagonism, though. So that you can sleep healthily.

  • by PolygamousRanchKid ( 1290638 ) on Thursday September 12, 2013 @05:45PM (#44835009)

    I think we've reached peak encryption. No matter what you come up with, the NSA has more than enough resources to crack your encryption method. And if you're using one-time pads, they or their retinue will just crack one of the holders of the one-time pads. Crack, like the holder's skull, knuckles or testicles.

    So we need to dump the idea that encryption can be used to transmit our secrets. And come up with entirely new ideas.

    A radical thought? Hell, yeah. Do I myself have any ideas how to do this? Hell, no. And even if I did, I wouldn't dare to talk about it. The first person to publish an idea on this will be taken by the government on a ride with Hans Reiser.

    But I think that we're stuck in a rut with encryption. We've been using it for so long, we can't even broaden our horizons to even consider other ways to get secret information from one place to another, without it getting snooped on. At the very least, the message should self destruct if someone tries to snoop on it. As to the rest . . . by my guest, and let your imagination run wild . . .

  • by BitZtream ( 692029 ) on Thursday September 12, 2013 @07:21PM (#44835697)

    As someone who writes cryptography software (I'm not a cryptologist, I just implement known algorithms, and verify they produce was I'm told they should produce), the solution for us is to provide software with multiple algorithms and let the user pick. Our core library supports DES, Blowfish, Twofish, and two separate implementations of AES, one of which is from outside the US. We also support a handful of lesser known algorithms, such as variants of the different Russian GOST standards.

    Unless everyone is collaborating, some part of the software is secure. I don't think Russia, the USA, Germany ... and Bruce Schiener are all in cahoots with each other. Maybe one or two of them, but not all of them.

    I don't know that, but thats my theory.

    Slashvertisement: http://www.rtsz.com/products/cryptolock/ [rtsz.com]

    Its years old now and I haven't updated in in at least 5, so its a bit out of date compared to current UIs and updated cryptography features and such, but functionally, it works. When used with properly long keys, you aren't going to crack its AES implementation, I'm confident of that.

  • by cheater512 ( 783349 ) <nick@nickstallman.net> on Thursday September 12, 2013 @10:15PM (#44836825) Homepage

    Yeah but they wouldn't shoot themselves in the foot by giving out unbreakable encryption to the people they are trying to spy upon.

    If they got a very secure algorithm, weakened it in a hard to detect way which makes it easier for the NSA and nobody else then that would be perfectly fine to both use for government documents and to give out to other nations.

Solutions are obvious if one only has the optical power to observe them over the horizon. -- K.A. Arsdall

Working...