An Overview of Cryptographic Backdoors
Full text | |||
Source | Journal of Information Systems Security Volume 13, Number 3 (2017)
Pages 175–183
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Chuck Easttom — Independent Consultant, Plano, Texas, USA | ||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
Cryptographic backdoors are a mechanism whereby one can alter a specific algorithm, providing the perpetrator with a means to break the resulting cipher in significantly less time than would normally be required. Such mechanisms can be created within a variety of cryptographic algorithms, including pseudo-random number generators.
Keywords
Kleptography, Cryptography, Cryptography Backdoors
Crepeau, C., Slakmon, A. (2003). Simple backdoors for RSA key generation. CT-RSA'03 Proceedings of the 2003 RSA conference on ‘The cryptographers' track’. pp. 403-416.
Gjosteen, K. (2006). Comments on Dual-EC-DRBG/NIST SP 800-90
Brown, R.L., Gjosteen, K. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. http://eprint.iacr.org/2007/048.pdf
Schneier, B., Fredrikson, M., Kohno, T. Ristenpart, T. (2015). Surreptitiously Weakening Cryptographic Systems.https://eprint.iacr.org/2015/097.pdf
Scott, M. (2013). Backdoors in NIST elliptic curves. https://www.certivox.com/blog/bid/344797/Backdoors-in-NIST-elliptic-curves
Snyder, B. (2014). Snowden: The NSA planted backdoors in Cisco products. InfoWorld. http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html
Sullivan, N. (2014). How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer. http://arstechnica.com/security/2014/01/how-the-nsa-may-have-put-a-backdoor-in-rsas-cryptography-a-technical-primer/
Shumow, D., Ferguson, N. (2007). On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng. http://rump2007.cr.yp.to/15-shumow.pd
Young, A., and Yung, M. (2002). Kleptography: Using Cryptography against Cryptography. http://cryptome.org/2013/09/klepto-crypto.pdf
Young, A., Yung, M. (2005). Malicious Cryptography: Kleptographic Aspects. Lecture Notes in Computer Science Volume 3376, pp 7-18