Crypto Is The Target: NOBUS or Escrow? - Keys Under Doormats
Introduction
It looks like the UK government has cryptography in its sights, and where social media firms (and tech companies with more than 10,000 users) might be asked to hand-over decrypted data (and thus the encryption keys). One, unconfirmed, quote, from a UK government minister, says:
The social media companies have been laughing in our faces for too long
What the UK government wants is thus either:
- A NOBUS (‘nobody but us’) backdoor, which will be mathematically possible for government agents to crack the encryption but no-one else.
- Key escrow. This is where a copy of the encryption key is kept in escrow so that it can be used by a government agent.
Amber Rudd, the UK Home Secretary, has increasingly targeted the social media companies for providing:
a secret place for terrorists to communicate with each other
In the Investigators Powers Act there is provision for this approach as it outlines that:
communications service providers may be required to “remove electronic protection of data”.
and which targets the release of encrypted data. But surely the world is moving toward more secure communications, in order to address problems related to data breaches? The major problem is also that it is just not possible to hand-over the encryption keys involved in secure communications.
So could the UK be the first country in the world to actually ban end-to-end encryption or that they will force companies to add back-doors into their software?
Keys Under Doormats
So let's look at the issues from a technical point-of-view, and see what some of the leading cryptography professionals see as the right way forward. For this we need to examine the "Keys Under Doormats" paper (here):
It is a paper written by the people that know cryptography best ... including Rov Rivest, Bruce Schneier, and Whitfield Diffie. I appreciate that politicians often care little for the viewpoint of scientists and engineers when making important decisions, as their desiccation are made on political judgements rather than scientific ones, but, hopefully, this paper can create a strong foundation for the debate to happen.
The grouping delivered their viewpoint on the last debate around the subject (1997), and really things have moved on so much with the Internet since then. It is now a part of our lives in a way that could ever be seen. They take a beautifully crafted approach to the importance of the computer security in an opening statement:
In the wake of the growing economic and social cost of the fundamental in security of today’s Internet environment, any proposals that alter the security dynamics online should be approached with caution.
The word caution is left to the end of the sentence but is the word that perhaps should be underlined several times. To break the current Internet in any way could have a major impact on our lives.
They highlight that flaws in software are often the way that investigators manage to get access to restricted data, but go on to say that any intentional infrastructure for backdoor access would bring many problems in how the system would be governed on a global level. Who would have the overarching rights to define backdoor entry, and what would happen if their keys were breached?
Escrow keys
One method that could be used is for everything that is encrypted, must have a copy of the key which law enforcement would use if they required access to the data - an escrow key. This escrow key is a bit like leaving your key under the doormat - as the paper defines in its title. The classic use case of used is with the Clipper Chip, where anyone who wanted to encrypt would gain a licence from law enforcement, and gain a chip to perform the encryption, and where a copy of the chip was kept in case access was required - Government key escrow.
Eventually, in 1997, the Clipper Chip project (Figure 2) was abandoned as it was too difficult to enforce and would have been costly, and was applied to a narrower set of applications, such as in regulated telecommunications systems. Along with the enforcement issue, there was also great risks of the keys becoming exposed (such as from an insider attack - see Figure 1). The authors of the paper even doubt that social media platforms such as Facebook and Twitter could have even be created within a regulated environment.
Figure 1: Government escrow
Figure 2: The Clipper Chip
Exceptional access
The paper has a special focus on "exceptional access", where keys would have to be stored after then have been used. In most cases, such as in a secure tunnel, a session key is used and then is deleted after the tunnel has been created. The storage of used keys would create an extremely complex infrastructure, and again which could be compromised for malicious activities. The storage of the keys would thus be a target for intruders, who could record secure conversations, and then gain access to the session key at a later time. The authors highlight the recent problems within the US Government Office of Personnel Management (OPM) as the kind of thing that could happen.
As with the access to a key escrow service, the implementation of a back door into social media also leaves open the opportunity for it to be abused by malicious agents, such as where Chinese agents backed into Google's data of surveillance targets.
Spanning the world ... who has exceptional access?
The major issue of creating exceptional access relates to the different jurisdictions involved, as malicious agents could simply move their communications to other areas in the World, where exceptional access was not implemented. Along with this, who's exceptional access would the system use. A software company in the UK would possibly implement exceptional access for UK law enforcement, but if this software was operating in China, would it also have to allow exceptional access for Chinese law enforcement? With many standing for an open access, including the UK and US governments, it would seem a backward step to move to a restricted infrastructure.
Guidelines
The authors of the paper highlight mixed messages coming from a range of sources, including from the US FBI Director James Comey who states that they don't actually want a backdoor. The President has also came out and said that he errs on the side of privacy:
Amber Rudd, though, has made his viewpoint clear in that he wants law enforcement to have access to everything. The authors question this approach as it may introduce a high degree of risk within the secure infrastructure that we have created, and its possible abuse. The authors point to the importance of secure communications in virtually every aspect of our lives and within government and business.
Opening every door in the World
Of particular worry to the authors is the insider (or trusted employee) threat, where the keys used either by an escrow system or for third-party encryption, could be breached, and cause large-scale data loss. Their viewpoint is that the complexity of creating an escrow system which would scale across all the different agencies and data infrastructures involved would be well beyond current technology. Fraud and extortion could also result, along with the complexity of the coding involved for software vendors. The authors cite the loss of the RSA/EMC seed keys as an example of how a breach of keys can cause serious data loss issues, and that critical infrastructure could come under attack from malicious external agents. The theft is IP is also a major concern if strong encryption is not used.
Scenario 1: Secure Tunnels and Escrow
The authors present the scenario of law enforcement being able to view encrypted data. Normally, with secure communications both public and private key are used. The encryption that happens in the secure tunnel is normally achieved with symmetric encryption (such as with AES or 3DES) and the key that will be used for the communication is protected using public key encryption.
With SSL/TLS, the server sends its public key to the client (normally in the form of a digital certificate), and the client creates a new symmetric key and encrypts it with the server's public key and sends it back. The server then decrypts the encrypted key, and reveals the session key to be used. Once this has happened both sides have the same symmetric encryption key (Figure 3).
Figure 3: Normal setup of a secure tunnel
Within the paper the authors outline an approach where the symmetric key is encrypted a second time with a special escrow public key. Then we now have a single encryption process on the data, but both the server and law enforcement can read the stream.
As we see in Figure 4, the public key from law enforcement is added to encrypt the session key and both are sent back to the server. Then a law enforcement agent can listen to the handshaking information and use their private key (which is secret) to reveal the session key - which can then be kept in escrow (or used to decrypt the communications).
The authors outline that the double encryption of the session key is possible, but there are risks in the loss of the private key, and also in storing the session key, and where all the data that was encrypted by that key would be compromised, if lost. Their main issue with this type of system is who would actually control additional encryption. In the US, it may be the FBI, but when happens when you have cross-border communications? They speculate of the communications between the US and China, would both countries have to agree to a single escrow agent?
Figure 4: Double key creation
Scenario 2: Encryption-by-default
Apart from secure tunnels, the other area that worries law enforcement is encryption-by-default, typical on mobile devices. On most systems, the encryption key are kept in escrow (typically on a domain server), so it is not too difficult to determine the key. With a mobile device the encryption key is stored in the TPM chip, and can only be revealed with a password or fingerprint. Normally there is a lock-out time, or even a slow-down time, when brute-force is applied to the pass-phrase, which make it difficult to crack. In this scenario, again the authors propose that the solution is to provide keys which are either provided by law enforcement or are key in escrow. Again both methods are at risk of a breach of the escrow keys and from insider threats. The complexity of different nations states also would make it extremely complex for vendors.
Conclusions
I'm a technologist, and non-political. I can see both sides, but I have tried to distill the main arguments within this paper. Read it for yourself, and make up your own mind on the technical feasibility of an exceptional access system. Overall it's a pretty fundamental issue, and it is not one that can be answered easily. In the end politicians will make the rules, but whether they can have any control on the Internet is another question that will only be answered over time.
Postscript
As part of the debate around the Investigatory Powers Bill, I gave evidence in December 2016:
Founder & CTO @ BlockAPT | Cybersecurity Expert
7 年Thanks for sharing William! It's a though call for politicians. The harsh reality is that weakening the crypto process to allow governments to snoop in will also mean making it easier for the cyber criminals. This is a great challenge. Let's see how this will unfold with politicians.
Enterprise Architect : Requirements Engineer : Systems Integration : Knowledge Operations : Solutions Consultant
7 年indeed Professor William Buchanan: "any proposals that alter the security dynamics online should be approached with caution." even open communications requires trust to maintain value of shared information...