8
NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved from http://gcn.com/Articles/2013/11/04/NIST-crypto-review.aspx?Page=1. on 6 November 2013.

NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

Embed Size (px)

Citation preview

Page 1: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

NIST Cryptography Standards Under Review

Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved from http://gcn.com/Articles/2013/11/04/NIST-crypto-review.aspx?Page=1. on

6 November 2013.

Page 2: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

Ethical Issue• NIST has begun formal review of its process

for developing crypto standards.

• Caused by “recent news reports about leaked classified documents.” (i.e. Reports of NSA backdoor into cryptography generation)

• Concern about NIST leaving back doors for NSA

• Dual EC_DRBG, the Dual Elliptic Curve Deterministic Random Bit Generator

Page 3: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

Eight Step Process1. Issue: Should the NSA be removed from the

collaborative process of developing crypto standards?

2. Stakeholders and Desired Outcomes:

i. NIST - Preservation of public image and respect

ii. NSA - Consideration when developing crypto standards

iii. Public - Security standards that are representative of actually security, and transparency of standards development process.

Page 4: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

3. Possible Solutions

a. Allow NSA collaboration at current level

i. Best Case: NSA continues collaboration but never again violates public interest.

ii. Worst Case: NSA maintains policy of secret access to private or encrypted data

b. Remove NSA from process completely

i. Best Case: NSA bows out and allows process to continue without them.

ii. Worst Case: NSA uses vast connections to create new standards that no longer involve any public involvement

Page 5: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

3. Possible Solutions

c. Reduce NSA involvement in process

i. Best Case: NSA understandingly allows their involvement to be reduced, while respecting outcomes of the process.

ii. Worst Case: NSA publicly allows involvement to reduce, while secretly continuing policy of secret access to private and encrypted data

4. Idealist

a. Can Everyone Use This Solution? Yes

b. Are People Ends rather than Means? Yes

Page 6: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

5. Realist

a. Is the Solution in accord with what is Natural? Yes

b. Is the Solution a balance? No

6. Pragmatist

a. Would the Majority agree? yes

b. Will it promote the greatest good? yes

7. Existentialist

a. Solution most commit to conscience? Yes

5. Is the Solution free of influence by other? No

Page 7: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

8. Which Philosophy was most Influential?

a. Pragmatist

Page 8: NIST Cryptography Standards Under Review Jackson, William. (2013). NSA's reported tampering could change how crypto standards are made. GCN.com. Retrieved

ACM Code: 1.3 Be honest and trustworthy.

“A computer professional has a duty to be honest about […] any circumstances that might lead to conflicts of interest.”