[Discuss] NSA capabilities

Richard Pieri richard.pieri at gmail.com
Wed Aug 14 17:49:18 EDT 2013


Tom Metro wrote:
> I haven't looked at reference material to refresh my understanding on
> this, so it may be wrong, but my recollection is that a CA compromise
> would only facilitate man-in-the-middle attacks.

Certificate escrow is the easiest way for a three-letter agency to 
obtain site certificates.


> This strikes me as a wild assertion and I don't follow the logic.
> References?

CRIME and BREACH are examples of SSL side-channel attacks using known 
text to recover session keys. The more text you have, the more text you 
have available for making such attacks.

> Superficially, it sounds like it could be right, as we've all heard of
> attack vectors that make use of known plain text. But the NSA doesn't
> *know* what is in a given document.

But they do. For example, there are static data in every Google account 
sign-in process. If you capture many sessions of SSL-wrapped data and 
compare them to the clear-text data then you can draw correlations 
between known plain-text and the cipher-text. You can then apply those 
correlations to any arbitrary user's sign-in sessions.



> Yeah, but why is that useful? If a repeat[1] occurs every 2^64, and you
> send a high volume of messages, that means the NSA will be able to
> decrypt 2 messages out of 18,446,744,073,709,551,615 messages. That's
> assuming they've brute forced one to begin with.

This assumes a truly random spread. Computers don't do truly random numbers.

-- 
Rich P.



More information about the Discuss mailing list