in brief
TRANSCRIPT
NEWS
7NOVEMBER/DECEMBER 2007
IN BRIEF
SANS: crooks turn fire on users and custom softwareCyber criminals have shifted their aim
from flaws in commonly-used software to
problems with custom-built applications,
and are also targeting easily-misled
users, according to the SANS Institute’s
revised top 20 internet security risks. It
said vulnerabilities in web applications
represented the greatest risk, but this
was closely followed by “gullible, busy,
accommodating computer users,”
particularly those with privileged access,
which SANS called “the most challenging
risk”. It added that training could help tackle
the latter problem, but also recommended
organisations launch benign spear
phishing attacks against users as a form of
inoculation – and to see who falls for them.
inf-sec.com/news/071207_sans20.html
Spies greater danger than terrorists, says CPNIThe UK government’s Centre for the
Protection of the National Infrastructure
(CPNI) is more worried about espionage
than terrorists when it comes to
cyberattacks. Mark Oram, senior manager of
knowledge development at the CPNI, said it
was particularly concerned that cyberspies
were using social engineering tricks to
persuade people to give them sensitive
data, circumventing IT security systems.
According to press reports, the CPNI wrote
to 300 top businesses warning that Chinese
hackers are particularly active and to take
special precautions against them.
inf-sec.com/news/071203_cpni_cw.html
RSA standard vulnerableThe RSA data encryption standard could
be vulnerable to hacking attacks following
the discovery of a flaw in a popular
microprocessor by one of the standard’s
founders. In a research note, Adi Shamir
revealed that if an intelligence organisation
discovered the mathematical error in
a well-known and widely used make of
microprocessor, then security software on a
computer with that chip could be “trivially
broken with a single chosen message”.
inf-sec.com/news/071126_rsa_vulnerable_
cw.html
German pips Bletchley Park’s ColossusSA Mathieson
A man in Bonn cracked a message encrypted with wartime Germany’s most-secure Lorenz
equipment within hours of its release on 15 November, beating a rebuilt Colossus machine
within Britain’s Bletchley Park code-breaking centre – which was delayed in its task by solar
activity disrupting radio signals.
It sounds like several twists in the plot of a Second World War thriller. But Joachim Schüth,
who wrote special software to meet the challenge, will be invited to visit Bletchley to receive a
prize from the nascent National Museum of Computing.
“We really want to congratulate him,” said Andy Clark, a director and trustee of the museum.
Schüth cracked the hardest of three signals transmitted by radio enthusiasts in Germany from
11am on 15 November, although Bletchley Park only managed to receive them at 5.40pm.
Using the Colossus, the Bletchley Park team cracked the same message as Joachim Schüth
at 1.15pm on 16 November, having started at 8.55am – although a spokesperson said 45
minutes should be subtracted for injury time, as they had to change a valve.
Bletchley Park, the war-time base of the UK’s signal interception and decryption organisation
now known as Government Communications Headquarters (GCHQ), is best-known for cracking
Nazi Germany’s widely-used secure communications equipment, the Enigma machine, with
pioneering mechanical computers known as bombes. The Colossus, which broke the Lorenz
traffic and is regarded as the world’s first programmable computer, is less famous than the
bombes. Britain told its wartime allies about breaking Enigma, but not about breaking Lorenz,
and Colossus machines stayed in service after the end of the Second World War.
Tony Sale, a computer expert and former employee of the UK security service MI5, started
campaigning for Bletchley Park to be saved from demolition in 1991, and operated the fully-
working Colossus computer – which is now a listed object in a listed building, representing the
success of his campaign – on 16 November.
He told Infosecurity that it has been possible to rebuild a Colossus as the design used
standard components from Post Office telephone exchanges. Tommy Flowers, who worked
alongside Alan Turing in designing the Colossus, worked for the Post Office before and after the
war, and plenty of exchange components were available second-hand.
A few parts were made from scratch, but the machine also includes nine original
components, Sale added: eight photo-cells and a mains transformer, all of which were retained
by engineers. “When the engineers were dismantling Colossi at the end of the war, photo-cells
were a very nice thing to put in your pocket,” he said, as these are two inches high and 1.5
inches in diameter. However, the rebuilt machine normally uses modern silicon photo diodes, as
the older photo-cells are fragile and need resting after prolonged use.
The Colossus machine does not break Lorenz messages, but attempts to find the wheel-
settings – mechanical encryption keys – used by the Germans (in this case, volunteers from
Heinz Nixdorf Museum Forum in Paderborn). It does so by repeatedly running the paper loop
into which the message is punched through the machine, trying different positions of a pair of
Lorenz machine wheels one after another in a brute-force attack.
Sale said the operator has to mark the start and end positions of the message on the tape,
then the Colossus reports likely matches, using a scoring process. “Colossus doesn’t ‘know’
when it has a good thing,” said Sale, but it recognises when a match looks more likely. The
operator then has to use the possible wheel positions to attempt to decode the message using a
Tunny machine – the British named German war-time codes after fish. “If you’ve got it right, out
comes German,” said Sale.
Andy Clark said that although the Colossus processes 5000 characters a second (5 kilohertz),
and employs extensive parallel processing, he assumes that the fastest machines doing this kind
of code-breaking are capable of working in Terahertz, processing trillions of characters a second.
GCHQ, now based in Cheltenham, said that it had no involvement in the work beyond
loaning equipment including a Lorenz machine to the museum. “We applaud and support the
ingenuity in rebuilding Colossus – a fantastic piece of work,” said a spokesperson.