Standards

NIST looks to strengthen crypto backbone

Shutterstock image. Copyright: McIek.

The National Institute of Standards and Technology is looking to make the backbone of cryptography -- random bit generators -- less predictable.

NIST has released the second draft of a publication that specifies design principles for sources of entropy, which measure the randomness of generated numbers. Without a reliably random RBG, hackers can slice through a user's communications.

"Security flaws in random number generators have been a significant source of vulnerabilities in cryptographic systems over many years, so it's crucially important to have random number generators that work well," said Paul Kocher, chief scientist at the Cryptography Research Division of Rambus, an IT manufacturer.

Among the disclosures of former National Security Agency contractor Edward Snowden was evidence that the National Security Agency had subverted a NIST RBG standard known as Dual_EC_DRBG.

In a recent interview, Curt Dukes, head of the NSA's Information Assurance Directorate, declined to comment on that allegation, instead saying generally that his agency "does not intentionally weaken cryptographic standards."

The NIST draft specifies data that cryptographers can submit for entropy testing, and describes the process of calculating initial entropy estimates. It also details how multiple noise sources of entropy can be factored into the entropy calculation.

"The validation of an entropy source presents many challenges," the NIST document states. "No other part of an RBG is so dependent on the technological and environmental details of an implementation."

The document assumes that cryptographers consulting it understand "the behavior of the noise source within the entropy source and [have] made a good-faith effort to produce a consistent source of entropy."

Elaine Barker, one of the publication's authors, said the group coordinated closely with those in charge of validating entropy sources. "We don't want to require anything that they can't validate" in the testing lab, she told FCW.

A public workshop on the entropy specifications told NIST officials that more flexibility was needed in how specifications would be implemented, Barker added. "As we deal with the various vendors, we get an idea of what they can and cannot do," she said.

The NIST entropy recommendation is one of three related cryptographic documents that mesh together. Another document specifies random number-generation algorithms, while a third demonstrates how to pair the algorithms with entropy sources into sound random-number generators. That latter exercise has been a challenge for some users, according to Barker.

Barker said NIST still works closely with NSA specialists in building cryptographic standards because of the NSA's expertise in the field. Asked whether NIST was regaining its reputation as an independent standards body in light of the Snowden revelations, Barker said, "depends on who you talk to. Some people are very negative, no matter what you do; others understand what we're trying to."

"NIST knows it needs to rebuild credibility after the Dual EC DRBG controversy, and seems to be doing the right things," Kocher told FCW.  "These drafts from NIST are uncontroversial, and don't have controversial constructions of the sort found in Dual EC DRBG that can harbor backdoors."

The comment period on the document lasts through May 9, and will include a public workshop. The institute is fielding comments via email.

About the Author

Sean Lyngaas is an FCW staff writer covering defense, cybersecurity and intelligence issues. Prior to joining FCW, he was a reporter and editor at Smart Grid Today, where he covered everything from cyber vulnerabilities in the U.S. electric grid to the national energy policies of Britain and Mexico. His reporting on a range of global issues has appeared in publications such as The Atlantic, The Economist, The Washington Diplomat and The Washington Post.

Lyngaas is an active member of the National Press Club, where he served as chairman of the Young Members Committee. He earned his M.A. in international affairs from The Fletcher School of Law and Diplomacy at Tufts University, and his B.A. in public policy from Duke University.

Click here for previous articles by Lyngaas, or connect with him on Twitter: @snlyngaas.


Featured

  • Cybersecurity

    DHS floats 'collective defense' model for cybersecurity

    Homeland Security Secretary Kirstjen Nielsen wants her department to have a more direct role in defending the private sector and critical infrastructure entities from cyberthreats.

  • Defense
    Defense Secretary James Mattis testifies at an April 12 hearing of the House Armed Services Committee.

    Mattis: Cloud deal not tailored for Amazon

    On Capitol Hill, Defense Secretary Jim Mattis sought to quell "rumors" that the Pentagon's planned single-award cloud acquisition was designed with Amazon Web Services in mind.

  • Census
    shutterstock image

    2020 Census to include citizenship question

    The Department of Commerce is breaking with recent practice and restoring a question about respondent citizenship last used in 1950, despite being urged not to by former Census directors and outside experts.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.