TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How do we build encryption backdoors?

82 pointsby michael_finealmost 9 years ago

4 comments

cypharalmost 9 years ago
&gt; A final, and salient feature on the key distribution approach is that it allows only prospective eavesdropping -- that is, law enforcement must first target a particular user, and only then can they eavesdrop on her connections. There&#x27;s no way to look backwards in time.<p>Actually, its even weaker of an attack than that. Signal (for example) stores a copy of the keys locally on the other person&#x27;s device after a conversation has been initiated (and notifies users if they&#x27;ve changed). You could augment this with TUF or some other updating system to make additions of new devices (or removal of old ones) also secure. So really the distribution attack only works for <i>first connection</i>. And this is why PGP key signing parties are a thing (and why I ask for two forms of government ID before signing their keys).
评论 #12259835 未加载
评论 #12259788 未加载
Animatsalmost 9 years ago
He&#x27;s missed the real approach - &quot;work reduction&quot;. This is giving the cryptosystem or the random number generator some hidden property which reduces the amount of work required to break the key. We&#x27;ve seen this repeatedly in cryptosystems deployed with bad random number generators.[1][2]<p>[1] <a href="https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2012&#x2F;02&#x2F;lousy_random_nu.html" rel="nofollow">https:&#x2F;&#x2F;www.schneier.com&#x2F;blog&#x2F;archives&#x2F;2012&#x2F;02&#x2F;lousy_random_...</a> [2] <a href="https:&#x2F;&#x2F;umaine.edu&#x2F;scis&#x2F;files&#x2F;2014&#x2F;10&#x2F;The-Sad-History-of-Random-Bits.pdf" rel="nofollow">https:&#x2F;&#x2F;umaine.edu&#x2F;scis&#x2F;files&#x2F;2014&#x2F;10&#x2F;The-Sad-History-of-Ran...</a>
评论 #12257874 未加载
评论 #12259336 未加载
reppardalmost 9 years ago
I believe the master key sharding he mentions based on this <a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Shamir%27s_Secret_Sharing" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Shamir%27s_Secret_Sharing</a> and has actually been implemented(though I&#x27;m not sure if it is at the scale he implies) here <a href="https:&#x2F;&#x2F;www.vaultproject.io&#x2F;docs&#x2F;concepts&#x2F;seal.html" rel="nofollow">https:&#x2F;&#x2F;www.vaultproject.io&#x2F;docs&#x2F;concepts&#x2F;seal.html</a>
评论 #12259841 未加载
mike_hearnalmost 9 years ago
That&#x27;s good timing, given the discussion yesterday on a similar topic:<p><pre><code> https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=12254960 </code></pre> There are a couple of things in the article I&#x27;m not sure Matt got quite right.<p>WhatsApp does let you compare key fingerprints, believe it or not. At least you can scan QR codes to check. I don&#x27;t know if doing that triggers a key change warning in future.<p>End-to-end encryption doesn&#x27;t seem to impact whether law enforcement can look backwards in time or not. Simply not logging message content is sufficient to prevent this. WhatsApp couldn&#x27;t provide law enforcement with message content prior to a tap being requested even before they integrated the Signal protocol because they didn&#x27;t log message content at all (or so they say). Introducing E2E crypto in the style of WhatsApp solves only one specific threat model as far as I can tell - if someone is capable of hacking your datacenter to the extent that they can siphon off and log messages by themselves without you noticing, but they aren&#x27;t also capable of doing a key switcheroo. This would be a strange but possible kind of hack. Note that this assumes the users aren&#x27;t storing their device keys and comparing them by hand and that the hacker can&#x27;t influence the code that gets shipped.<p>He assumes the user can detect key mismatches. Even if users can compare keys, this assumes that their client does what they think it does. It&#x27;s noted in another comment here but all it takes to undo this assumption is getting Google or Apple to push a dummy binary to the specific devices of interest that claims things are encrypted even when they aren&#x27;t.<p>You wouldn&#x27;t need to deploy threshold crypto &#x27;at scale&#x27; for the proposed scheme to work. Some schemes like Shoup threshold RSA result in a normal public key:<p><pre><code> http:&#x2F;&#x2F;www.shoup.net&#x2F;papers&#x2F;thsig.pdf </code></pre> So the only part that&#x27;s non standard is the software for working with the shares to decrypt, which only has to work and exist between the various agencies.<p>But I&#x27;m not actually even sure you need special threshold crypto schemes. I guess you could also take the session key(s) and encrypt them with key 1, then encrypting that value with key 2, etc, to build up an onion of encryptions. The various participants then have to pass around the value in the same order hard-coded into the software to get it back. The advantage of this approach is you can use ordinary HSMs to protect the keys, i.e. the hardware itself enforces that the private key may never leave the hardware unless it&#x27;s being cloned to another HSM.<p>But these are all minor details. The point Matt makes is well made, which is that you can build backdoors into cryptographic systems, and the reasons people don&#x27;t want to do this are primarily political rather than technical. I continue to be concerned that the tech community may be about to burn its credibility with the mainstream population for no reason by claiming this stuff is impossible to do or is completely unthinkable, when it&#x27;s actually not. Opinion polling showed that there was no general consensus behind Apple&#x27;s refusal to unlock the phone in the FBI case: many people don&#x27;t support the tech industries absolutist position here (perhaps because they don&#x27;t understand the potential mass surveillance has).<p>Moreover, governments will generally not accept an answer of &quot;you are imperfect thus should not have the law enforcement capability you want&quot;. Lawmakers understand and accept that civil servants will make mistakes or be openly abusive and only generally want to control the levels of error&#x2F;abuse, not eliminate it. Certainly the sorts of positions the Obama administration is looking for would accommodate key revocation procedures if the government agencies in question somehow did screw up and their private key leaked out of their HSMs. I suspect they&#x27;d happily agree to temporarily losing their capability to restore system integrity if there was a procedure for restoring their access once a neutral third party had re-audited the relevant offices. This sort of detail isn&#x27;t where lawmakers are at: they think in broad strokes rather than the details of procedures.
评论 #12281641 未加载