securitay iv comey crypto · pdf file• us govt offered export easing if you included key...

58
Comey Crypto Michael Jack

Upload: doankhuong

Post on 18-Mar-2018

221 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Comey CryptoMichael Jack

Page 2: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

mikey$ whoami• Michael Jack

• 2nd Year Ethical Hacking BSc @ Abertay

• Member Abertay Ethical Hacking Society

• I <3 Cryptography

• @MikeyJck

• mikeyjck.io

Page 3: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Few Things

• Not a Lawyer or Cryptographer

• ‘classified/ top secret’ leaked material warning

• Nothing new, all info is public domain

• Objective as possible

Page 4: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

What’s all this then?

Page 5: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Correcting Misconceptions“misconception that building a lawful intercept solution… requires a so-called “back door,” one that foreign adversaries and hackers may try to exploit.

But that isn’t true. We aren’t seeking a back-door approach. We want to use the front door, with clarity and transparency, and with clear guidance provided by law.”James Comey Oct 2014 -

Page 6: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

– David Cameron January 2015

“One is communications data, that is not the content of a phone call. It is just who made which call to which

person and when… And what matters, in simple terms is that we can access this data [on all platforms]… I have a very simple principle to apply here… in our country do

we want to allow a means of communication that in extremis we can’t read with a signed warrant…”

Page 7: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://firstlook.org/theintercept/2015/02/19/great-sim-heist/

Page 8: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://s3.amazonaws.com/s3.documentcloud.org/documents/1670893/where-are-these-keys.pdf

❤ Adam Boylan

Page 9: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/

Page 10: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

• Never roll your own crypto!

• Crypto is a tool not a security silver bullet

• Security of crypto is not binary

Cryptography 101

Page 11: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf
Page 12: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Modern Cryptography

Page 13: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

World War II Crypto• Enigma

(electromechanical)

• Broken by Marian Rejewski

• Continued decryption by Alan Turning et al @ Bletchley Park

Page 14: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Modern Cryptography

• post World War II

• more accurately 1970s >

• NSA, GCHQ, IBM

Page 15: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Modern Crypto - Timeline• 1971 - IBM Lucifer Block Cipher (Watson Lab)

• 1973 - NBS asks for Data Encryption Standard (DES) designs

• 1973-4 - IBM develop & submit DES candidate

• 1976 - Diffie & Hellman publish “New Directions in Cryptography”

• 1976 - After alterations by NSA IBMs design chosen as DES

• 1977 - “Method for Obtaining Digital Signatures and Public-Key Cryptosystems" by Rivest, Shamir & Adleman (RSA) @ MIT

Page 16: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

• 1984 - RC4 Stream Cipher RSA Labs (Rivest)

• 1991 - Pretty Good Privacy (PGP) Phil Zimmerman

• 1994 - Secure Sockets Layer (SSL) conceived @ Netscape

• 1999 - SSL Standardised by IETF becomes Transport Layer Security (TLS)

• 1999 - NIST wants successor to DES asks for public input for Advanced Encryption Standard (AES)

• 1999 - Wired Equivalent Privacy (WEP) uses RC4

• 2001 - NIST approves AES (Rijndael) for use as FIPS 197

• 2004 - Wi-fi Protected Access 2 (WPA2)

Modern Crypto - Timeline

Page 17: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Modern Crypto - 2015

• Data at Rest = AES or PGP

• Data in Motion = TLS1.2 or IPSEC

• Data in air = WPA2 or SNOW 3G(?)

Page 18: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

math• factoring integers into primes (RSA)

• discrete log modulo prime (DSA)

• discrete log in elliptic curve groups (ECDH)

Page 19: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Crypto Wars

Page 20: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Export Controls• 1970s Crypto is added to US Munitions List

• USML part of International Traffic in Arms Regulations (ITAR)

• ITAR licensing requires case by case consideration for export of munitions on USML

• Justice Department told White House in 1978 that ITAR restriction on crypto is unconstitutional.

Page 21: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

NSA Controls

• 1974 - IBM discover differential cryptanalysis NSA ask them to keep it secret

• Limit on key size of exported crypto systems

• IBM Notes Int version 64-bit key, 24-bits know to NSA

Page 22: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Clipper Chip• Announced 1993 by NSA

• Skipjack algorithm + DH for key distribution

• Built in Key escrow :(

• Matt Blaze et al

• US Govt offered export easing if you included key escrow

• Dead by 1996

Page 23: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Export Controls

• December 1996 - Bureau of Export Administration transfers jurisdiction over "commercial encryption products” to the Commerce Department

• Encryption products specifically designed or modified for military use remain subject to ITAR controls.

Page 24: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

PRISM/ TEMPORA3 slides

Page 25: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://s3.amazonaws.com/s3.documentcloud.org/documents/813847/prism.pdf

BETTER IMAGE NEEDED

Page 26: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://s3.amazonaws.com/s3.documentcloud.org/documents/813847/prism.pdf

Page 27: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

https://s3.amazonaws.com/s3.documentcloud.org/documents/813847/prism.pdf

Page 28: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Bullrun & EdgehillTOP SECRET/ STRAP1

Page 29: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

nsa$ whoamiNational Security Agency

• 2013 Budget: $10.8B

• $2.5B on data collection

• $1.6B on processing/ exploitation

• Upwards of 40k employees

• Created by Truman in secret 1952

• FISA/ National Security Letters/CALEA

Page 30: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

gchq$ whoami

Government Communications HQ

• Originally founded 1919 as GC&CS

• Unique access to backbone infrastructure

• Upwards of 6k employees

• RIPA

Page 31: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Cryptanalysis is good

Page 32: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

BULLRUN

• Ability to defeat encryption

• BULLRUN sources “extremely sensitive”

• TLS/ SSH/ OTR/ VPN/ VoIP/ etc

https://s3.amazonaws.com/s3.documentcloud.org/documents/784047/bullrun-guide-final.pdf

Page 33: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

www.spiegel.de/media/media-35532.pdf

Page 34: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

www.spiegel.de/media/media-35532.pdf

Page 35: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

www.spiegel.de/media/media-35546.pdf

Circa September 2005

Page 36: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

www.spiegel.de/media/media-35546.pdf

Page 37: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

National Intelligence Budget 2013DNI Statement

Page 38: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

The Curious Case of the Dual_EC_DRBG

Page 39: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

here be backdoors• RSA accepted $10M from NSA to use Dual EC

DRBG as default in BSAFE library (2004/5)

• RSA “relied on guidance from NIST”

• RSA claim they didn’t know it was weakened or contained a backdoor

• Dual_EC_DRBG withdrawn after NIST issues new guidlines Sept 2013

Page 40: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

math • Constants that define the EC

• should be random

• NIST doesn't say how or where the constants come from

• If these constants were picked specially there is a ‘skeleton key’

• after recovery of 32bytes of output attacker can predict DRBG output

On the Practical Exploitability of Dual EC in TLS Implementations

Matt Green, DJB, Tanja Lange et al

Page 41: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Sys Admins• GCHQ/ CSEC venture

to ‘automate’ NOC hunting

• identifying sys admins and NOCs

• compromise privileged users, fight smart right?

Page 42: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Countermeasures

Page 43: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Countermeasures

• be pissed

• good encryption

• research

• Kerckhoffs 2nd principle

Page 44: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Salty

Page 45: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

http://www.spiegel.de/media/media-35535.pdf

Page 46: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

http://www.spiegel.de/media/media-35535.pdf

Page 47: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

http://www.spiegel.de/media/media-35552.pdf

Page 48: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

http://www.spiegel.de/media/media-35545.pdf

Page 49: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Conclusion

• Undermining encryption is a terrible plan

• Step the fuck away from our crypto

• Education & discussion

Page 50: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

ThanksQuestions?

@MikeyJck

Page 51: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Regin Malware• ‘nation state’

• US(NSA?) & GCHQ

• months/ years to develop

• designed to gather ‘intelligence’

• focus on remaining undetected

Page 52: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Regin Malware• ‘nation state’

• NSA & GCHQ

• months/ years to develop

• designed to gather ‘intelligence’

• focus on remaining undetected

Why? UK uses CNE against close ally(s) within the EU

Page 53: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

the fuck are Belgacom?

Page 54: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Belgacom - Timeline• At some point before March 2011 GCHQ had compromised

Belgacom with what would later be discovered as Regin

• the name appeared for the first time on the VirusTotal website on March 9th 2011

• Undetected in Belgacoms networks until symptoms in Summer 2012

• June 2013 - after an update exchange falls over Belgacom contact M$ who had no clue?

• Belgacom sys admins suspect virus > hire Fox IT

• Belgacom informs authorities & Belgian MI get involved

Page 55: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

GCHQ Belgacom Status Reports 😏

April - June 2011

July - Sept 2011

Jan - March 2012

Page 56: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

Using Belgacom to ‘seed’

Page 57: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

one more thing…

Page 58: SecuriTay IV Comey Crypto · PDF file• US Govt offered export easing if you included key ... • RIPA. Cryptanalysis is ... documents/784047/bullrun-guide-final.pdf

the damage?• 120 ‘systems’, 70 personal computers

• Backbone cisco routers…

• belgacom got ownd

• sept 16th pr: “At this stage there is no indication of any impact on the customers or their data,” it said. “At no point in time has the delivery of our telecommunication services been compromised.””