Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Backdoors, Trust and Scalable Solutions

Backdoors, Trust and Scalable Solutions

In this presentation I talk primarily about backdoors by going into to the details of Dual EC DRBG works and the underline math behind it. I then discuss the difficulty of detecting such backdoors, its effects on trust.

Ashutosh Ahelleya

August 14, 2019
Tweet

More Decks by Ashutosh Ahelleya

Other Decks in Technology

Transcript

  1. Some questions 1. How is the key generated? 2. What

    are the consequences of seed being predictable? 3. Where does the security of PRNGs lie in? 4. How do we generate “true random” values for the seed? a. How do modern systems compute “true random” values? 5. Why not generate the key using a TRNG? 6. Properties of PRNGs a. How can these features be useful? 7. Assumption that forms the basis of our model for security 8. How is the key sent over the same insecure channel?
  2. How is the key generated? Deterministic function 1. Outputs random

    looking numbers using an algorithm 2. Takes few “true random” bits and outputs much larger “pseudo random” bits Trivial examples: log(x), sin(x) etc.
  3. What happens if the seed is predictable? PRNG is public

    → Attacker also has access Conclusion: seed should not be predictable
  4. Security-decisive factors of a PRNG 1. Seed should be truly

    random and should not be predictable 2. Given a set of outputs of a PRNG, attacker should not be able to guess seed
  5. True Random Number Generators A function that generates outputs from

    physical sources such as temperature, thermal noise etc. that are known to produce non-predictable outputs. Hence, they are called True Random Number Generators.
  6. Present day: usage of lava lamps in Cloudflare More about

    it here Youtube video: https://www.youtube.com/watch?v=1cUUfMeOijg
  7. Dual EC DRBG: abstract CSPRNG published by NIST SP 800-90A

    in 2006 P, Q → Points on an EC S 0 → Seed S 2 → Updated seed 1. Operation: S i * P is computationally hard to reverse, similar to large integer multiplication 2. Security model: P, Q should be generated independently
  8. What if P, Q are not independent? Assertion: Only we

    know the relation between P and Q, no one else does
  9. Inference Dual EC PRNG has the potentiality of a backdoor

    if P, Q are not generated independently
  10. What is a backdoor? An intentional flaw in an algorithm

    or an implementation that allows an individual to bypass the security mechanism the system was designed to enforce.
  11. Why would someone do it? Organisations can inject a backdoor

    without others knowing about it, for reasons of importance to their state, such as surveillance etc.
  12. End of Dual EC DRBG 1. Withdrawn in 2014 2.

    Stayed a CSPRNG for 7 years!
  13. Incentivising trustworthy behaviour 1. Morals 2. Reputation 3. Institutions 4.

    Security Systems Reference: Liars and Outliers by Bruce Schneier
  14. “We, as humans, trust the established rules that induce organisations

    to behave according to a norm, imposing sanctions to those who do not, more than the system itself.” Reference: There’s no good reason to trust blockchain technology Who do we trust then?