Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (2024)

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (1)

In the year 2014, we came to know about the NSA's ability to break Trillions of encrypted connections by exploiting common implementations of the Diffie-Hellman key exchange algorithm – thanks to classified documents leaked by ex-NSA employee Edward Snowden.

At that time, computer scientists and senior cryptographers had presented the most plausible theory: Only a few prime numbers were commonly used by 92 percent of the top 1 Million Alexa HTTPS domains that might have fit well within the NSA's $11 Billion-per-year budget dedicated to "groundbreaking cryptanalytic capabilities."

And now, researchers from University of Pennsylvania, INRIA, CNRS and Université de Lorraine have practically proved how the NSA broke the most widespread encryption used on the Internet.


Diffie-Hellman key exchange (DHE) algorithm is a standard means of exchanging cryptographic keys over untrusted channels, which allows protocols such as HTTPS, SSH, VPN, SMTPS and IPsec to negotiate a secret key and create a secure connection.

Since applications that rely on the Diffie-Hellman key exchange algorithm generates ephemeral keys using groups of large prime numbers, it would take hundreds or thousands of years and a nearly unimaginable amount of money to decrypt secure communications directly.

However, it took researchers just two months and as many as 3,000 CPUs to break one of the 1024-bit keys, which could have allowed them to passively decrypt hundreds of millions of HTTPS-based communications and other Transport Layer Security (TLS) channels.

Encrypted communications could have an undetectable backdoor

You might be wondering how the researchers managed to do something which practically takes hundreds of years, with the computational hardware available today.

In a research paper [PDF] published Tuesday, the researchers explained that the Diffie-Hellman algorithm does not contain any backdoor itself, but it has been intentionally weakened in an undetectable way by hiding the fact how various applications generate prime numbers.

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (3)

Additionally, the size of keys (i.e. less than or equals to 1024-bit) chosen to be used in the Diffie-Hellman algorithm also matters a lot.

The researchers created a weak 1024-bit Diffie-Hellman trapdoor function, i.e. randomly selecting large prime number but from a predefined group, and showed that solving the discrete logarithm problem that underpins its security is about 10,000 times easier.

"Current estimates for 1024-bit discrete log in general suggest that such computations are likely within range for an adversary who can afford hundreds of millions of dollars of special-purpose hardware," the researchers wrote in their paper.

So, advanced hackers or well-resourced agencies who are aware of the fact how prime numbers are being generated for trapdoor function and looking to decrypt 1024-bit secured communications can unscramble the discrete logarithm in order to decrypt hundreds of millions of Diffie-Hellman-protected communications.

"The discrete logarithm computation for our backdoored prime was only feasible because of the 1024-bit size, and the most effective protection against any backdoor of this type has always been to use key sizes for which any computation is infeasible," the researchers said.

Researchers also estimate that conducting similar computations for 2048-bit keys, even with backdoored prime numbers, would be 16 Million times harder in comparison to 1024-bit keys and will remain infeasible for many upcoming years.

Despite the U.S. National Institute of Standards and Technology (NIST) recommending a transition to key sizes of at least 2,048 bits since 2010, the 1024-bit keys are still widely used online.

According to a survey performed by the SSL Pulse project, 22% of the Internet's top 140,000 HTTPS-protected sites use 1024-bit keys as of last month, which can be broken by nation-sponsored adversaries or intelligence agencies like NSA.

Therefore, the immediate solution to this issue is to switch to 2048-bit or even 4,096-bit keys, but, according to the researchers, in the future, all standardized prime numbers should be published together with their seeds.

The concept of backdooring primes used in the Diffie-Hellman key exchange algorithm is almost similar to the one discovered in the Dual Elliptic Curve Deterministic Random Bit Generator, better known as Dual_EC_DRBG, which is also believed to have been introduced by the NSA.

Almost three years ago, Snowden leaks revealed that RSA received $10 Million bribe from the NSA to implement their flawed cryptographic algorithm Dual_EC_DRBG in its bSafe Security tool as a default protocol in its products to keep encryption weak.

So, it is not at all surprising if the NSA would be using these undetectable and weakened "trapdoors" in millions of cryptographic keys to decrypt encrypted traffic over the Internet.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.

Researchers Demonstrated How NSA Broke Trillions of Encrypted Connections (2024)

FAQs

Has the NSA cracked TLS? ›

That's the approach NSA took with the Dual_EC RNG, standardized by NIST in Special Publication 800-90. There's compelling evidence that NSA deliberately engineered this generator with a backdoor — one that allows them to break any TLS/SSL connection made using it.

What encryption does the NSA use? ›

Advanced Encryption Standard (AES): an encryption algorithm, selected by NIST after a public competition. In 2003, NSA certified AES for Type 1 use in some NSA-approved systems. Secure Hash Algorithm: a widely used family of hash algorithms developed by NSA based on earlier designs by Ron Rivest.

Can the NSA tap your phone? ›

BUT — individual NSA analysts can wiretap anyone they want if the data they're accessing in real-time includes the content of everyone's phone calls or emails.

Can the NSA get past a VPN? ›

National Security Agency's XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden.

Can NSA crack 256-bit encryption? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities. However, no encryption standard or system is completely secure.

What is the most secure encryption in the world? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today.

What is the strongest wireless security encryption protocol? ›

WEP, WPA, and WPA2 are Wi-Fi security protocols that secure wireless connections. They keep your data hidden and protect your communications, while blocking hackers from your network. Generally, WPA2 is the best choice, even though it consumes more processing power to protect your network.

Has NSA broken SSL? ›

In fact, if you are using SSL 3.0 you are no longer PCI compliant! This shouldn't really be surprising because SSL was superseded by TLS in 1999. So if you want to say that the NSA is able to break SSL 3.0 connections then you're probably right in most cases since there is a much larger attack surface.

What TLS does NSA recommend? ›

For example, NSA recommends that only TLS 1.2 or TLS 1.3 be used, and that SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1 not be used. And even when TLS 1.2 and TLS 1.3 are employed, NSA recommends that cryptographic parameters meet the algorithm requirements in CNSSP 15, referred to as Commercial National Security Algorithms.

Has TLS ever been hacked? ›

The Browser Exploit Against SSL/TLS (BEAST) attack was disclosed in September 2011. It applies to SSL 3.0 and TLS 1.0 so it affects browsers that support TLS 1.0 or earlier protocols.

Is TLS 1.1 broken? ›

The older TLS protocols have known weaknesses that make them susceptible to attacks. Dropping support allows an upgrade to more secure connections. Specifically, TLS 1.0 and 1.1 have flaws like weak ciphers that can be exploited to decrypt traffic.

Top Articles
The Full Guide to Amazon Salary Levels - Amazon Jobs Near Me
How to "create" an Ethereum account | ethereum.org
SZA: Weinen und töten und alles dazwischen
Mcgeorge Academic Calendar
Danatar Gym
Access-A-Ride – ACCESS NYC
Alan Miller Jewelers Oregon Ohio
Kraziithegreat
Geodis Logistic Joliet/Topco
Dr Doe's Chemistry Quiz Answer Key
Tyrunt
Thotsbook Com
Nitti Sanitation Holiday Schedule
Belle Delphine Boobs
Free Online Games on CrazyGames | Play Now!
Fraction Button On Ti-84 Plus Ce
Jc Green Obits
Deshuesadero El Pulpo
Chicago Based Pizza Chain Familiarly
Jayme's Upscale Resale Abilene Photos
Nottingham Forest News Now
Firefly Festival Logan Iowa
Wolfwalkers 123Movies
Federal Express Drop Off Center Near Me
The Creator Showtimes Near Baxter Avenue Theatres
Gncc Live Timing And Scoring
Bfri Forum
Pfcu Chestnut Street
La Qua Brothers Funeral Home
Fastpitch Softball Pitching Tips for Beginners Part 1 | STACK
Wega Kit Filtros Fiat Cronos Argo 1.8 E-torq + Aceite 5w30 5l
Navigating change - the workplace of tomorrow - key takeaways
B.k. Miller Chitterlings
Trebuchet Gizmo Answer Key
Asian Grocery Williamsburg Va
Naya Padkar Newspaper Today
What Does Code 898 Mean On Irs Transcript
Directions To The Closest Auto Parts Store
Kent And Pelczar Obituaries
Subdomain Finder
Exploring the Digital Marketplace: A Guide to Craigslist Miami
Hanco*ck County Ms Busted Newspaper
Brown launches digital hub to expand community, career exploration for students, alumni
Ehc Workspace Login
Dagelijkse hooikoortsradar: deze pollen zitten nu in de lucht
Zipformsonline Plus Login
Hello – Cornerstone Chapel
The Pretty Kitty Tanglewood
Mlb Hitting Streak Record Holder Crossword Clue
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Bluebird Valuation Appraiser Login
Appsanywhere Mst
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6260

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.