You are here: Home Contents V13 N3 V13N3_Easttom.html
Personal tools

An Overview of Cryptographic Backdoors



Full text

Journal of Information System Security
Volume 13, Number 3 (2017)
Pages 175183
ISSN 1551-0123
Chuck Easttom — Independent Consultant, Plano, Texas, USA
Information Institute Publishing, Washington DC, USA




Cryptographic backdoors are a mechanism whereby one can alter a specific algorithm, providing the perpetrator with a means to break the resulting cipher in significantly less time than would normally be required. Such mechanisms can be created within a variety of cryptographic algorithms, including pseudo-random number generators.




Kleptography, Cryptography, Cryptography Backdoors



Crepeau, C., Slakmon, A. (2003). Simple backdoors for RSA key generation. CT-RSA'03 Proceedings of the 2003 RSA conference on ‘The cryptographers' track’. pp. 403-416.

Gjosteen, K. (2006). Comments on Dual-EC-DRBG/NIST SP 800-90

Brown, R.L., Gjosteen, K. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.

Schneier, B., Fredrikson, M., Kohno, T. Ristenpart, T. (2015). Surreptitiously Weakening Cryptographic Systems.

Scott, M. (2013). Backdoors in NIST elliptic curves.

Snyder, B. (2014). Snowden: The NSA planted backdoors in Cisco products. InfoWorld.

Sullivan, N. (2014). How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer.

Shumow, D., Ferguson, N. (2007). On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng.

Young, A., and Yung, M. (2002). Kleptography: Using Cryptography against Cryptography.

Young, A., Yung, M. (2005). Malicious Cryptography: Kleptographic Aspects. Lecture Notes in Computer Science Volume 3376, pp 7-18