Would you hire a locksmith you don’t trust?

Would you hire a locksmith you don’t trust?

Picture this. Your home has been broken into repeatedly. Things have been stolen and damage has been done, leaving you and your loved ones feeling very vulnerable and terrified by the prospect of future, perhaps even more dangerous violations of your personal space. You know for a fact that entry to your castle hasn’t been achieved through sophisticated “Mission-Impossible “ schemes that has thieves dropping from skylights, or tunnelling into your home from nearby locations. You’ve got it all on security camera footage, and it’s shocking. The bad guys are entering your home the same way that you and your family you do - using a key to unlock your front door.

The police are called and the solution seems clear. Change your door locks. You do your homework, ask around, and read consumer reports in search of the best locksmith that money can buy. You find him, and guess what? The best locksmith on the planet carries the most secure locks in the world...but here’s the kicker.

The most secure locks in the world are the very ones that are currently protecting your home!

The locksmith tells you that the 2015 version of these locks are new and improved, and that he is confident that they will properly protect your home and family. You do some more homework, and learn that the 2015 version of the lock, being recommended by the world’s best locksmith, is improved. It now comes in several new colors. As for the rest of the lock, it’s identical – utilizing the same chunky pin-and-tumbler design popularized early last century.

Still, you are dealing with an expert in locks so he must know what he’s doing. Just as you are about to call the locksmith and arrange for the shinier ‘new locks’, your 7-year-old daughter asks, “Daddy, do you trust the locksmith?”

You reply, “Yes, he’s a very good man...”

“But do you trust what he’s telling you?”

Out of the mouths of babes...

You don’t, of course. You can’t possibly. How could you based on what you’ve learned? Yet, in today’s badly-broken connected world that is a virtual open door for cybercriminals, that’s exactly what we do every day. We trust what the world’s electronic locksmiths are telling us, and despite so much evidence that states that we shouldn’t, we blindly hire them to protect our interests. The party line from the massive e-security industry, including giants like Apple and Google, is that they use ironclad crypto. I can almost hear the collective refrain.  “Trust us...all is well.” 

All is not well. Not even close. It’s closer to tragic. Closer still to very dangerous. And if you’re not convinced that things are completely out of hand, read this compelling 2014 article in which Certicom (acquired by Blackberry in 2009) was called out by The Globe & Mail, Canada's national newspaper, for reportedly intentionally building vulnerabilities into its cryptography in 2005.The strange connection between the NSA and an Ontario tech firm

Security researcher, Bruce Schneier concludes the article by stating “…researchers are now questioning what other backdoors have yet to be discovered, and whether the NSA made similar payments to other companies to keep flawed algorithms in use. This is the poison of NSA action, they taint everything.”

A Reuters report in December 2013 revealed that the NSA had paid RSA Security $10-million to make a now-discredited cryptography system the default in software used by a wide range of Internet and computer security programs. The system, called Dual Elliptic Curve, was a random number generator, but it had a deliberate flaw - or "back door" - that allowed the NSA to crack the encryption.

Certicom and RSA aren’t the only companies identified. Companies such as Cisco, Samsung and Symantec all reportedly implemented vulnerable algorithms in their products.

These mind-boggling articles beg the questions,

“If backdoors were intentionally built into earlier crypto schemas, do you think that this is still happening today?”

“Are the electronic locksmiths of the world saying trust me on the one hand, and handing the keys to their technology to national security agencies on the other?

I can’t answer these questions, but I have an opinion based on what I’ve read and discussed with others. It starts with my view that when it comes to cryptography, nothing has changed...

The Internet of Things

And now, here comes the next massive technology wave – one that will dwarf the Internet as we now know it, in terms of the number of connections, market size and lifestyle impact – the Internet of Things (IoT).

How will the electronic locksmith’s of the world protect us from the dark side of IoT? So far, it appears that they won’t. In many cases, they haven’t incorporated any security and when they have, they are relying on the very same broken technologies that have already been proven to be highly vulnerable to cyber criminals.

What’s their plan?

Polish it up. Embed it in a shiny new IoT “platform,” and say, “Trust me...”

Some ITsec companies are using Elliptical Curve Cryptography ECC for IoT, like Trustpoint (co-founded by a former Certicom co-founder and executives...hmm). TrustPoint has been selected as the security provider for the US Vehicle-to-Vehicle (V2V) communication crash avoidance system called Secure Credentials Management System (SCMS). A key component in SCMS is its PKI-based security schema, which uses Elliptical Curve Points (ECPs). Elliptical curves are certainly an improvement on SSL/TLS (unless they have a “back door” built in…) but they introduce a whole new problem. SCMS will become the largest ever Public Key Infrastructure (PKI) deployment - 45,000 times larger than the largest current PKI implementation (that should be easy to manage).

So, if SSL/TLS-based security should be avoided at all cost, and other PKI-based solutions like ECC – while more secure – introduce unmanageable solutions, what’s the answer? Identity-Based Encryption – something that I believe that HP realizes based on its recent acquisition of Voltage, which first commercialized IBE in the early 2000’s.

IBE doesn’t have the flaws inherent in other crypto-based solutions, and it’s perfect for securing enterprise applications like email (which I understand HP/Voltage uses to render JPMorgan Chase’s email service secure). What the HP version of IBE doesn’t do on its own however, is deliver the features and capability to scale to the levels required for massive IoT deployment. Fortunately, the recently-released IBE 3.0 added the critical components that IoT requires, such as authentication, and it’s now secure end-to-end, making it the ideal security schema for this emerging market. Further, IBE eliminates the need to manage keys because it generates new keys for each session, thereby bringing simplicity to what is today a looming massive IoT problem (imagine the cost and complexity of managing tens of billions of certificates and keys…). Complexity is the mortal enemy of IT security. This is a case where less, is more secure.

The Elephant in the Room

There’s another major issue when it comes to trusting the major IoT vendors. I know this from engaging with leaders and major IoT developers worldwide. Trust issues don’t only apply to trusting the technology, it’s also about trusting the people who provide it. Like it or not, since the Snowden revelations, entire nations do not trust each other - certainly not when it comes to importing crypto-based security technologies.

How does one address this situation? First, we can’t be naive about this. Some countries will mandate that a back door be integrated into crypto implementations that originate in country. But – remember the elephant in the room – these crypto providers (in my opinion) are going to face significant challenges and limitations when it comes to exporting their crypto schemas to other nations.

If you’re like me, you want to trust your locksmith - not only what he says, but also the technology that he is endorsing.

I changed my digital locks to IBE 3.0. Maybe you should, too.

IBE 3.0 is patented and the patents were acquired by VIBEcyber.com and re-branded to Verifiable Identity Based Encryption (VIBE) and while positioned as ideal for IoT, VIBE is a security ingredient that can be baked into any existing connected solution, replacing dated, broken key exchange and authentication technology. For more information on VIBE, please connect with me on LinkedIn.

Jackie O'Dowd

Founding Partner and CEO of Realising-Potential |Leadership & Management | Business Systems | Governance | Alignment | Data Insights | Cybernetics

8 年

An interesting question for enterprise and solutions architects isn't it?

回复
??Armin Roth

Healthcare, Telco, Security & Human Capital.

9 年

The situation is similar to the TSA certified suitcase locks. Today every motivated person can 3D-print the (backdoor) keys from files from the internet. If there is a backdoor, ill-meaning miscreants can get access to it as well (see the Juniper case just recently).

回复

A maybe stupid remark of a non tech expert: Is this because NSA is itself keeping backdoors open that the US government is so much anxious of Chinese products backdoor security?

回复
S. Vincent Shin

Analytic--Investor--Student

9 年

Keep your eye on'em while he/she performs the task... And, let'em go. No?

回复

Definitely not! Very good article, indeed.

要查看或添加评论,请登录

Bill M.的更多文章

  • Securing our Digital World: Why We Need to Authenticate Everything Now

    Securing our Digital World: Why We Need to Authenticate Everything Now

    This week, a fake image of an explosion at the US Pentagon, generated by an AI, surfaced online. Despite being fake…

    1 条评论
  • How To Protect Yourself From Email Fraud Once and For All

    How To Protect Yourself From Email Fraud Once and For All

    Business Email Compromise (BEC) refers to fraudulent email messages sent by cybercriminals and rogue states to imitate…

  • Circles of Trust

    Circles of Trust

    Trust is an essential element in today’s physical and digital worlds. Can you trust people and products to perform as…

    10 条评论
  • Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    Nextcloud’s Solution for Ensuring Zero-Trust Document Collaboration

    The world of cryptography and Cloud security is congested with buzzwords and promises of data privacy. The jargon and…

    3 条评论
  • It’s Time To Shake The Cybersecurity Etch A Sketch

    It’s Time To Shake The Cybersecurity Etch A Sketch

    In reflecting on the state of cybersecurity, and specifically the cryptography (authentication and/or encryption) used…

    18 条评论
  • The Mendoza Line...

    The Mendoza Line...

    Anybody who has ever been a fan of baseball is familiar with the Mendoza line. It’s an expression derived from Mario…

  • There’s a lesson in the rear-view mirror

    There’s a lesson in the rear-view mirror

    Picture this. You’re about to embark on a road trip and when you enter your vehicle you quickly realize that something…

  • Dear Mr. Zuckerberg

    Dear Mr. Zuckerberg

    MOST OF THIS ARTICLE WAS WRITTEN IN 2017, BUT NEVER PUBLISHED AS I JUDGED IT TO BE TOO PROMOTIONAL. HOWEVER, IN LIGHT…

  • Having Your Digital Cake and Eating It Too…

    Having Your Digital Cake and Eating It Too…

    Anybody who’s ever read the iconic MAD magazine would be familiar with the wordless Spy vs Spy cartoon. First published…

    12 条评论
  • You Can’t Get There From Here…

    You Can’t Get There From Here…

    No doubt many who read this article have heard the expression “You can’t get there from here…” It’s most often…

    12 条评论

社区洞察

其他会员也浏览了