https://www.atlasobscura.com/articles/a-brief-history-of-the-nsa-attempting-to-insert-backdoors-into-encrypted-data * * Trips [aoa_logo_a] Take your next trip with Atlas Obscura! Our small-group adventures are inspired by our Atlas of the world's most fascinating places, the stories behind them, and the people who bring them to life. Visit Adventures Trips Highlight Macchu Picchu Peru * 10 days, 9 nights Peru: Machu Picchu and the Last Incan Bridges from $6,120 USD [blank-f2c3] Slovenia * 6 days, 5 nights Forest to Table in Alpine Slovenia from $4,090 USD View all trips * Experiences Upcoming Experiences View All Experiences >> [blank-f2c3] Members only Solar Power: The Science, Myth & Art of the Sun [blank-f2c3] Members only Monster of the Month w/ Colin Dickey: The Marquis de Sade [blank-f2c3] Members only Accidental Discoveries [blank-f2c3] Members only Antiques and Their Afterlives: Inside the Bone Museum [blank-f2c3] Hot Springs Atlas Obscura's Ecliptic Festival * Courses Upcoming Courses View All Courses >> [blank-f2c3] Historical Nonfiction: Research-Based Writing With Hadley Meares [blank-f2c3] Making Scents: Experimental Perfumery With Saskia Wilson-Brown [blank-f2c3] Solar Power: The Science, Myth & Art of the Sun [blank-f2c3] Mating Rituals of the Animal Kingdom With Dr. Sarah McAnulty [blank-f2c3] Designing Immersive Gatherings With Zach Morris of Third Rail Projects * Places + Top Destinations + Latest Places + Most Popular Places + Random Place + Lists + Itineraries + ------------------------------------------------------------- Add a Place ------------------------------------------------------------- + Download the App Latest Places View All Places >> Medora Covered Bridge Medora, Indiana Medora Covered Bridge 38.8186, -86.1474 This building is a re-creation of the Main Gate used during the Los Alamos Project. Los Alamos, New Mexico Main Gate Park 35.8761, -106.2542 [blank-f2c3] Velha Goa, India The Arch of Conception 15.5045, 73.9152 Hotel Natura Patagonia in Peulla, Chile Peulla, Chile Peulla -41.0858, -72.0205 Top Destinations View All Destinations >> Countries + Australia + Canada + China + France + Germany + India + Italy + Japan Cities + Amsterdam + Barcelona + Beijing + Berlin + Boston + Budapest + Chicago + London + Los Angeles + Mexico City + Montreal + Moscow + New Orleans + New York City + Paris + Philadelphia + Rome + San Francisco + Seattle + Stockholm + Tokyo + Toronto + Vienna + Washington, D.C. * Foods Latest Places to Eat & Drink View All Places to Eat >> [blank-f2c3] Culture + Co. This Tampa bakery famed for Cuban loaves was opened by a veteran of the Spanish-American War. La Segunda Central Bakery Harry Waugh's Dessert Room features decadent desserts like the popular peanut butter truffle. Harry Waugh Dessert Room at Bern's Steak House Wat Mongkolratanaram Wat Mongkolratanaram The Sami peoples have herded reindeer for generations. Jokkmokk Market * Stories + Recent Stories + All Stories + Puzzles + Video + Podcast Most Recent Stories View All Stories >> High-altitude archaeologist Constanza Ceruti climbs towards the highest archaeological site on Earth at the top of the 22,110-foot-tall Mount Llullaillaco in Argentina. In High Altitude Archaeology, One Woman Isn't Scared of Heights--Or Mummies [blank-f2c3] Brooklyn's 'River Hag' Searches for Life in One of America's Most Toxic Waterways The deep, loud mating calls of black drum fish may be the source of mysterious sounds keeping residents up at night in Tampa Bay, Florida. Could Fish Sex Be Keeping Floridians Up at Night? Lava from Mount Etna could hit 10 different municipalities. Europe's Most Active Volcano Is Also the World's Only Decipoint * Newsletters * Sign In Join * Explore Newsletters * Sign In ----------------------------------------------------------------- Join * Places near me Random place A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data by Jessie Guy-Ryan February 21, 2016 A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data Copy Link Facebook Twitter Reddit Flipboard Pocket [blank-f2c3] A government agent uses an NSA IBM 360/85 console in 1971 (Photo: Wikimedia Commons/NSA). It's been a weird week for America's most valuable company--a firm whose tech products have such consumer goodwill they got away with forcing us to listen to U2--who is poised to go to court against its own government over its users' right to privacy. The government is invoking an obscure law dating back almost to the founding of the country to force the company to comply. It'd be a pretty good movie. But it's just the most dramatic flare-up in a lengthy battle between government officials, cybersecurity experts, and the tech industry over how consumer's technical data is protected, and whether or not the government has a right to access that information. In fact, the government has actually won this fight before--secretly. Throughout 2015, U.S. politicians and law enforcement officials such as FBI director James Comey have publicly lobbied for the insertion of cryptographic "backdoors" into software and hardware to allow law enforcement agencies to bypass authentication and access a suspect's data surreptitiously. Cybersecurity experts have unanimously condemned the idea, pointing out that such backdoors would fundamentally undermine encryption and could exploited by criminals, among other issues. While a legal mandate or public agreement would be needed to allow evidence obtained via backdoors to be admissible in court, the NSA has long attempted--and occasionally succeeded--in placing backdoors for covert activities. [blank-f2c3] An Enigma machine at Bletchley Park, long-rumored to be one of the first backdoored devices (Photo: Flickr/Adam Foster). One of the most important developments in cryptography was the Enigma machine, famously used to encode Nazi communications during World War II. For years, rumors have persisted that the NSA (then SSA) and their British counterparts in the Government Communications Headquarters collaborated with the Enigma's manufacturer, Crypto AG, to place backdoors into Enigma machines provided to certain countries after World War II. Crypto AG has repeatedly denied the allegations, and in 2015 the BBC sifted through 52,000 pages of declassified NSA documents to find the truth. The investigation revealed that while no backdoors were placed in the machines, there was a "gentlemen's agreement" that Crypto AG would keep American and British intelligence appraised of "the technical specifications of different machines and which countries were buying which ones," allowing analysts to decrypt messages much more quickly. Consider it a security "doggy-door." Next, in 1993, the NSA promoted "Clipper chips," which were intended to protect private communications while still allowing law enforcement to access them. In 1994, researcher Matt Blaze uncovered significant vulnerabilities in the "key escrow" system that allowed law enforcement access, essentially making the chips useless. By 1996, Clipper chips were defunct, as the tech industry adopted more secure, open encryption standards such as PGP. In more recent years, the NSA was unequivocally caught inserting a backdoor into the Dual_EC_DRBG algorithm, a cryptographic algorithm that was supposed to generate random bit keys for encrypting data. The algorithm, developed in the early aughts, was championed by the NSA and included in NIST Special Publication 800-90, the official standard for random-number generators released in 2007. Within a matter of months, researchers discovered the backdoor, and awareness that the algorithm was insecure quickly spread, although it continued to be implemented in consumer software Windows Vista. What was really odd, as crypto expert Bruce Schneier explained in a 2007 essay published in Wired, was that Dual_EC_DRBG wasn't even worth the NSA's effort: It makes no sense as a trap door: It's public, and rather obvious. It makes no sense from an engineering perspective: It's too slow for anyone to willingly use it. And it makes no sense from a backwards-compatibility perspective: Swapping one random-number generator for another is easy. [blank-f2c3]A Chipper clip--one of the NSA's unsuccessful backdoor attempts (Photo: Wikimedia Commons/Travis Goodspeed). Although the NSA's effort puzzled crypto experts, documents leaked by Edward Snowden in 2013 proved that the NSA did indeed build a backdoor into Dual_EC_DRBG and paid RSA, a computer security company, to include the compromised algorithm in its software. These are the incidents that have been proven. There are, of course, numerous theories and insinuations that the NSA has made many more efforts along these lines--from backdoors in Lotus Notes to persistent allegations that Microsoft routinely includes backdoors in its software. Additionally, the Snowden leak proved that the NSA is constantly working to decrypt common encryption standards. As our lives become more and more dominated by the digital, security experts have become increasingly vocal in their calls for truly secure encryption, and some governments have begun to listen. Holland's government has agreed not to use backdoors and support open encryption standards, and despite calls to do so in response to the Paris terrorist attacks, France refuses to implement a backdoor mandate. Even former NSA director Michael Hayden has said that backdoors are a bad idea (and he would know). As Apple vs. FBI wends its way through the courts, we are probably far from the end of this public battle. Whatever the results of this landmark case, the NSA's classified efforts to subvert cryptography will likely continue. Read next The 21st Century Indiana Jones is a Woman Crowdsourcing Space Archaeology [blank-f2c3] cybersecuritycryptographynews Want to see fewer ads? Become a Member. Want to see fewer ads? Become a Member. Using an ad blocker? We depend on ad revenue to craft and curate stories about the world's hidden wonders. Consider supporting our work by becoming a member for as little as $5 a month. Continue Using Ad-Block Support Us Keep Exploring The manuscript is currently held at Yale University. medieval Has Artificial Intelligence Cracked the Voynich Manuscript's Mysterious Code? Send in the bots. Natasha Frost February 1, 2018 The manuscript is currently held at Yale University. medieval The World's Most Mysterious Medieval Manuscript May No Longer Be a Mystery But we're not reading the Voynich manuscript quite yet. Natasha Frost September 8, 2017 [blank-f2c3] secret Found: Nodes in an Anonymity-Protecting Network That Are Actually Spying on Users Tor is used for anonymity, so it's a problem if parts of it are collecting data. Sarah Laskow July 26, 2016 [blank-f2c3] libraries The Library of Congress is in the Midst of a Cyberattack Websites are down. Erik Shilling July 19, 2016 Want to see fewer ads? Become a Member. From Around the Web ATLAS OBSCURA COURSES Learn with Us! Check out our lineup of courses taught by world-class experts from around the world. See Courses Gastro Obscura Book See Fewer Ads Become an Atlas Obscura member and experience far fewer ads and no pop-ups. Learn More Get Our Email Newsletter [ ] Thanks for subscribing! View all newsletters >> [Submit] Follow Us * * * * * * Get the app Download on the Apple App Store Get it on Google Play Download the App Places * All Places * Latest Places * Most Popular * Places to Eat * Random * Nearby * Add a Place Editorial * Stories * Food & Drink * Itineraries * Lists * Puzzles * Video * Podcast * Newsletters Trips * All Trips * Trips Blog * Art & Culture Trips * Food Trips * Hidden City Trips * History Trips * Wildlife & Nature Trips * FAQ Experiences * Experiences * Online Courses * Online Experience FAQ * Online Course FAQ * Eclipse Festival 2024 Community * Membership * Feedback & Ideas * Community Guidelines * Product Blog * Unique Gifts * Work With Us Company * About * Contact Us * FAQ * Invest In Us * Advertise With Us * Advertising Guidelines * Press * Privacy Policy * Cookie Policy * Terms of Use (c) 2024 Atlas Obscura. All rights reserved. Questions or Feedback? Contact Us Thanks for sharing! Follow us on Twitter to get the latest on the world's hidden wonders. Like us on Facebook to get the latest on the world's hidden wonders. Follow us on Twitter Like us on Facebook Want a Free Book? Sign up for our newsletter and enter to win the second edition of our book, Atlas Obscura: An Explorer's Guide to the World's Hidden Wonders. [ ] Subscribe No Thanks Visit AtlasObscura.com Atlas Obscura: An Explorer's Guide to the World's Hidden Wonders Stay in Touch! Follow us on social media to add even more wonder to your day. Follow us on Twitter Like us on Facebook Follow Us on Instagram No Thanks Visit AtlasObscura.com No purchase necessary. Winner will be selected at random on 03/01/ 2024. Offer available only in the U.S. (including Puerto Rico). Offer subject to change without notice. See contest rules for full details. Add Some Wonder to Your Inbox Every weekday we compile our most wondrous stories and deliver them straight to you. [ ] Subscribe No Thanks We'd Like You to Like Us Like Atlas Obscura and get our latest and greatest stories in your Facebook feed. No Thanks [p] Quantcast **