NSA Paid Security Firm $10 Million to Distribute Bad Encryption
A new Reuters report explains how the National Security Agency was able to get its backdoor encryption onto so many machines.
A new Reuters report explains how the National Security Agency was able to get its backdoor encryption onto so many machines:
Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.
Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
As The Verge explains, this answers a key question raised by the Snowden leaks:
When leaked documents claimed to have caught the NSA inserting bad protocols into the national standards board NIST, it raised more questions than answers. Why would the NSA go to the trouble of inserting a inferior standard into NIST’s set of four, when most cryptographers would simply ignore the bad algorithm in favor of the others? Even if foul play had occurred, what was the agency getting out of the deal?
Now, a Reuters exclusive report is showing the other side of the story. The report details a secret deal between the NSA and respected encryption company RSA, in which the agency paid $10 million for RSA to incorporate the weaker algorithm into an encryption product called BSafe. Because of the earlier work, the algorithm had been approved by NIST, so RSA could claim their encryption used only nationally certified protocols. At the same time, BSafe’s encryption was defaulting to a fundamentally flawed encryption algorithm, which the NSA could subvert whenever they needed to.
— Posted by Peter Z. Scheer
Your support is crucial...As we navigate an uncertain 2025, with a new administration questioning press freedoms, the risks are clear: our ability to report freely is under threat.
Your tax-deductible donation enables us to dig deeper, delivering fearless investigative reporting and analysis that exposes the reality behind the headlines — without compromise.
Now is the time to take action. Stand with our courageous journalists. Donate today to protect a free press, uphold democracy and uncover the stories that need to be told.
You need to be a supporter to comment.
There are currently no responses to this article.
Be the first to respond.