You are here: Home Contents V13 N3 V13N3_Easttom.html
Personal tools

An Overview of Cryptographic Backdoors

 

 

Full text
View
Purchase

Source
Journal of Information Systems Security
Volume 13, Number 3 (2017)
Pages 175183
ISSN 1551-0123 (Print)
ISSN 1551-0808 (Online)
Authors
Chuck Easttom — Independent Consultant, Plano, Texas, USA
Publisher
Information Institute Publishing, Washington DC, USA

 

 

Abstract

Cryptographic backdoors are a mechanism whereby one can alter a specific algorithm, providing the perpetrator with a means to break the resulting cipher in significantly less time than would normally be required. Such mechanisms can be created within a variety of cryptographic algorithms, including pseudo-random number generators.

 

 

Keywords

Kleptography, Cryptography, Cryptography Backdoors

 

 

Crepeau, C., Slakmon, A. (2003). Simple backdoors for RSA key generation. CT-RSA'03 Proceedings of the 2003 RSA conference on ‘The cryptographers' track’. pp. 403-416.

Gjosteen, K. (2006). Comments on Dual-EC-DRBG/NIST SP 800-90

Brown, R.L., Gjosteen, K. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. http://eprint.iacr.org/2007/048.pdf

Schneier, B., Fredrikson, M., Kohno, T. Ristenpart, T. (2015). Surreptitiously Weakening Cryptographic Systems.https://eprint.iacr.org/2015/097.pdf

Scott, M. (2013). Backdoors in NIST elliptic curves. https://www.certivox.com/blog/bid/344797/Backdoors-in-NIST-elliptic-curves

Snyder, B. (2014). Snowden: The NSA planted backdoors in Cisco products. InfoWorld. http://www.infoworld.com/article/2608141/internet-privacy/snowden--the-nsa-planted-backdoors-in-cisco-products.html

Sullivan, N. (2014). How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer. http://arstechnica.com/security/2014/01/how-the-nsa-may-have-put-a-backdoor-in-rsas-cryptography-a-technical-primer/

Shumow, D., Ferguson, N. (2007). On the Possibility of a Back Door in the NIST SP800-90 Dual Ec Prng. http://rump2007.cr.yp.to/15-shumow.pd

Young, A., and Yung, M. (2002). Kleptography: Using Cryptography against Cryptography. http://cryptome.org/2013/09/klepto-crypto.pdf

Young, A., Yung, M. (2005). Malicious Cryptography: Kleptographic Aspects. Lecture Notes in Computer Science Volume 3376, pp 7-18