Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Prime Diffie-Hellman Weakness May Be Key to Breaking Crypto
ThreadPost ^ | October 16, 2015 | Michael Mimoso

Posted on 10/18/2015 12:19:56 PM PDT by Mycroft Holmes

The great mystery since the NSA and other intelligence agencies’ cyber-spying capabilities became watercooler fodder has not been the why of their actions, but the how? For example, how are they breaking crypto to decode secure Internet communication?

A team of cryptographers and computer scientists from a handful of academic powerhouses is pretty confident they have the answer after having pieced together a number of clues from the Snowden documents that have been published so far, and giving the math around the Diffie-Hellman protocol a hard look.

The answer is an implementation weakness in Diffie-Hellman key exchanges, specifically in the massive and publicly available prime numbers used as input to compute the encryption key. The team of 14 cryptographers presented their paper, “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice,” this week at the ACM Conference on Computer and Communications Security, which explains that given the budgets at the disposal of the NSA, for example, such an agency could build enough custom hardware and invest the time required to derive an output that would give the attacker “intermediate” information that would eventually lead to the breaking of individual encrypted connections.

“It’s not arriving at the key, instead it’s telling you something about the mathematical structure about that particular choice of the prime number when used in Diffie-Hellman,” said J. Alex Halderman associated professor computer science and engineering at the University of Michigan and one of the authors of the paper. “The analogy is sort of cracking the prime. After you crack the prime, breaking individual Diffie-Hellman connections that use that prime is easy.”

(Excerpt) Read more at threatpost.com ...


TOPICS: Culture/Society; Government; News/Current Events; Russia
KEYWORDS: bigprims; computers; computing; cryptograph; cryptography; diffiehellman; internet; primenumbers; primes
Navigation: use the links below to view more comments.
first 1-2021 next last
Oh happy day...
1 posted on 10/18/2015 12:19:56 PM PDT by Mycroft Holmes
[ Post Reply | Private Reply | View Replies]

To: Mycroft Holmes
After you crack the prime, breaking individual Diffie-Hellman connections that use that prime is easy.”

Easy for you.

2 posted on 10/18/2015 12:23:10 PM PDT by MUDDOG
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mycroft Holmes

I would ask a simple question. While an SSL connection does initially use a key pair, the first thing it does is switch to an asynchronous cipher. Naturally, you could catch the cipher key at the beginning of the handshake, but if you don’t catch it you can’t read the traffic.


3 posted on 10/18/2015 12:29:47 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mycroft Holmes
Coincidence?

The patent for D-H encryption awarded in 1977, the same year Star Wars is released.

In 2015, researchers claim D-H can be compromised, the same year a new Star Wars movie is scheduled for release.

4 posted on 10/18/2015 12:30:24 PM PDT by HonkyTonkMan
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

When you spend all those millions building special hardware you don’t miss the cypher key.


5 posted on 10/18/2015 12:35:16 PM PDT by Mycroft Holmes (The fool is always greater than the proof.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: MUDDOG

Actually, easy for anyone. Cracking the prime gives a look-up table that lets you look up the key the parties are using from the data in the key agreement session, and then using whatever private-key encryption program they are using lets you read the communication the same way as the recipient.


6 posted on 10/18/2015 12:35:23 PM PDT by The_Reader_David (And when they behead your own people in the wars which are to come, then you will know...)
[ Post Reply | Private Reply | To 2 | View Replies]

To: proxy_user

Not quite the right term, but right idea.

The key exchange is to establish a symmetric cipher like 3DES or AES.

https://en.m.wikipedia.org/wiki/Symmetric-key_algorithm


7 posted on 10/18/2015 12:43:57 PM PDT by justlurking
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce; Swordmaker; martin_fierro; AdmSmith; AnonymousConservative; Berosus; bigheadfred; ...
Thanks Mycroft.

8 posted on 10/18/2015 1:25:35 PM PDT by SunkenCiv (Here's to the day the forensics people scrape what's left of Putin off the ceiling of his limo.)
[ Post Reply | Private Reply | View Replies]

To: SunkenCiv
This will allow listening in on conversations and normal text messaging. It will not, however, help with decrypting the 256 bit AES encryption used by Apple in sending the user data from iOS and OS X devices to the cloud or to other devices. Nor will it help with the iMessaging which uses another system of synchronous encrypted communications.

After 38 years, it is time to up the game on communications encryption.

9 posted on 10/18/2015 1:35:21 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: MUDDOG

The enemy just needs to find traitors and there are plenty of democrats who are selling our secrets to whoever for a price.
All the secret stuff on Hillary Clintons computer and the State dept computers were hacked into and I do not think it was an accident.


10 posted on 10/18/2015 1:36:06 PM PDT by minnesota_bound
[ Post Reply | Private Reply | To 2 | View Replies]

To: justlurking

Hmmm. Have to think about this but my initial reaction is that the best target for such an attack would be Verisign. If they can crack Verisign’s private key then a man-in-the-middle attack becomes simply a matter of rerouting packets.


11 posted on 10/18/2015 1:37:43 PM PDT by SeeSharp
[ Post Reply | Private Reply | To 7 | View Replies]

To: Swordmaker
Nor will it help with the iMessaging which uses another system of synchronous encrypted communications.

It's the asynchronous side of SSL that this attack targets. How does iMessage exchange session keys for synchronous ciphers?

12 posted on 10/18/2015 1:41:53 PM PDT by SeeSharp
[ Post Reply | Private Reply | To 9 | View Replies]

To: HonkyTonkMan

So THAT’S how the Rebels were able to get the Death Star plans!


13 posted on 10/18/2015 1:53:12 PM PDT by Rodamala
[ Post Reply | Private Reply | To 4 | View Replies]

To: Mycroft Holmes

That’s why I use Optimus Prime.


14 posted on 10/18/2015 2:54:50 PM PDT by P.O.E. (Pray for America)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mycroft Holmes

Public key encryption was a solution for the key exchange problem.

In times past the encryption in use was excellent but the problem was having to exchange the keys. Sending a courier or transmitting the key via phone or radio has obvious problems.

With Public Key crypto you have a private key and a public key. Anyone can encrypt a message using your public key but only you can decrypt it using your private key.

Public key crypto is not as secure as many symmetric key methods. Symmetric means the same key is used to encrypt and decrypt. Public key is also much slower than symmetric key crypto, this is why on the internet generally only the symmetric key is sent using this method and not the actual data. The data is encrypted using a much faster cipher like AES.

One symmetric method is mathematically proven to be secure against any attack.. only the key can decrypt... no quantum computer could ever have a chance. This method is called a one-time-pad, it’s the system that the old German Enigma was based on. It’s security requires a source of true random numbers to function. Generating random numbers is easy now but the Enigma used a flawed mechanical random number generator and was broken. One-time-pad encryption can be totally secure but it has the key exchange problem in spades because the key is the same length as the message and can be quite large. The key must be stored as it cannot be remembered due to its huge size... of course this means it can be discovered by an adversary.

Public Key cryptography was a great breakthrough. If implemented very carefully it is still secure and will be for a long time. If there are flaws in the implementation of Diffie-Hellman key exchange I’m sure a secure work-around will be created.


15 posted on 10/18/2015 3:55:46 PM PDT by Bobalu (Russians.... not ashamed of being white!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SunkenCiv
Hi SunkenCiv,

Not sure what list you pinged here with comment #8 but I'd like to be on the list.

Thanks, dayglored

16 posted on 10/18/2015 6:15:43 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 8 | View Replies]

To: dayglored

Hey, no problem, it’s not a specific list, really, just a very, very high volume mostly politics list, but other stuff (like this topic) creeps in from time to time.

George Boole topic:
http://www.freerepublic.com/focus/chat/3350083/posts


17 posted on 10/18/2015 8:22:28 PM PDT by SunkenCiv (Here's to the day the forensics people scrape what's left of Putin off the ceiling of his limo.)
[ Post Reply | Private Reply | To 16 | View Replies]

To: HonkyTonkMan

Probably George Lucas is behind it, or C3PO, he’s a hacker, plus he’s easy to ignore as a threat.


18 posted on 10/18/2015 8:26:42 PM PDT by SunkenCiv (Here's to the day the forensics people scrape what's left of Putin off the ceiling of his limo.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: SunkenCiv
> ...very, very high volume mostly politics list...

Ah, then I'm afraid I have to pass, as I'm verging on ping overload as it is. I was thinking it was topics like encryption and such (like the Boolean), but with the election season looming, political pings will send me over the edge! :-)

I note you've kindly put me on already, so I apologize for the trouble to take me off again. I do greatly enjoy being on your APOD list; don't take me off that one! Thanks, dayglored

19 posted on 10/18/2015 9:17:37 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 17 | View Replies]

To: dayglored

Thanks, I’ll take you back off.


20 posted on 10/18/2015 10:18:57 PM PDT by SunkenCiv (Here's to the day the forensics people scrape what's left of Putin off the ceiling of his limo.)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson