At least eight researchers or policy experts have withdrawn from an Internet security conference after the sponsor reportedly used flawed encryption technology deliberately in commercial software to allow the National Security Agency to spy more easily on computer users.
RSA Security, owned by data storage giant EMC Corp., has disputed claims it intentionally introduced the flawed encryption algorithm, but otherwise has declined to discuss what a published report last month described as a $10 million government contract.
The revelation supplemented documents leaked by former NSA contractor Edward Snowden showing that the NSA tried to weaken Internet encryption.
The pullouts from the highly regarded RSA Conference represent early blowback by technology researchers and policy experts who have complained that the government's surveillance efforts have, in some cases, weakened Internet security even for innocent users.
Some U.S. companies that have agreed or been compelled to turn over customer records to the government have complained that their business relationships with customers in Europe, Asia and elsewhere are increasingly becoming arduous.
It was not immediately clear whether any researchers who still intended to make presentations at the conference would discuss the subject. Hugh Thompson, a conference organizer who works for security firm Blue Coat Systems, said the event is "an open venue where people can talk openly about security."
The researchers and experts include Mikko Hypponen, chief research officer of Finland-based antivirus provider F-Secure, and Adam Langley and Chris Palmer, who work on security practices at Google.
Christopher Soghoian, a researcher with the American Civil Liberties Union, said Tuesday on Twitter that he withdrew from the conference after having "given up waiting for RSA to fess up to the truth" regarding its development of the Dual_EC_DRBG algorithm with the NSA.
RSA issued an advisory to its customers last summer urging them not to use the algorithm, following published reports of the software's potential weaknesses. But that wasn't enough for researchers who want answers about the government's contract with RSA, which thousands of businesses use to secure their data.
RSA said in a statement last month that as a security company, it "never divulges details of customer engagements, but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA's products, or introducing potential 'backdoors' into our products for anyone's use."
The published report said RSA received the $10 million contract from the NSA to use the agency's preferred method of number generation. The report said such a flawed algorithm in RSA's Bsafe software tool generates random numbers in such a way that it creates "backdoors" into the company's encryption products.
Organizers said next month's conference in San Francisco will host 560 speakers, and they expect more participants than the 24,000 who showed up last year.
The NSA has a history in developing encryption algorithms, with documents showing decades-old criticisms among civilian government scientists about the agency's role in developing communication standards. That includes scientists' discomfort, as early as the 1980s, over the Digital Signature Standard, a way to electronically sign documents and guarantee their authenticity. That became a federal processing standard by 1994.
In September, documents leaked by Snowden showed that the agency more recently wanted to water down Internet encryption in an effort to gather and analyze digital intelligence. In turn, the federal National Institute of Standards and Technology tried to shore up confidence in the important behind-the-scenes role it plays in setting standards that are used by consumers to make purchases online, access their bank accounts or file their income taxes electronically.
The Office of the Director of National Intelligence said that "it should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries' use of encryption."
Explore further:NSA has long role as top US locksmith, lock-picker
© 2014 The Associated Press. All rights reserved.
More from Physics Forums - Computers


Sep 11, 2013
More than two decades ago, civilian government scientists were expressing concerns with the National Security Agency's role in developing global communications standards.


Jan 03, 2014
The US National Security Agency is making strides toward building a "quantum computer" that could break nearly any kind of encryption, The Washington Post reported Thursday.
Jan 03, 2014
More than 250 academics from around the world signed an online petition this week calling for an end to "blanket mass surveillance" by intelligence agencies.


Jan 01, 2014
Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone.
Dec 17, 2013
Quietly at first, but more vocally in recent months, Google Inc., Facebook Inc. and other leading Internet companies have been beefing up their digital defenses in response to reports that the National Security Agency has ...


Sep 08, 2013
Thousands took to the streets in Berlin Saturday in protests against Internet surveillance activities by the US National Security Agency and other intelligence agencies, and the German government's perceived ...
2 hours ago
President Barack Obama is hosting a series of meetings this week with lawmakers, privacy advocates and intelligence officials as he nears a final decision on changes to the government's controversial surveillance programs.
2 hours ago
Google is expanding its hotel business, offering several new ways for travelers to learn about accommodations.
3 hours ago
Two websites that post mug shots will stop charging people to remove the photos under a settlement reached in a federal lawsuit in Ohio.


3 hours ago
France's data protection watchdog on Wednesday fined Google 150,000 euros ($205,000)—the maximum possible—for failing to comply with its privacy guidelines for personal data.
6 hours ago
One way to keep from feeling lost and alone in a new city is to connect with the people who share your favorite places, and modern technology is making that much easier. According to new Cornell research, the popular smartphone ...


9 hours ago
China's largest online marketplace, Alibaba Group's Taobao, said Wednesday that it would ban the trading of Bitcoin and other virtual currencies from January 14, after a government crackdown on the units.
After 11 months of review, SURA announced the findings of a collaborative project to explore the capabilities of an open source application that assists with publishing, referencing, extracting and analyzing research data; ...


Two university research teams have worked together to produce the world's fastest thin-film organic transistors, proving that this experimental technology has the potential to achieve the performance needed ...


(Phys.org) —For those with running water in their homes, water is light, rolls right through the fingers, easily pours out of the faucet, and gives us hygiene and hydration in minutes so that we go on about ...


A team of Harvard scientists and engineers has demonstrated a new type of battery that could fundamentally transform the way electricity is stored on the grid, making power from renewable energy sources such ...


Armbands that track how much you move have become popular ways to motivate people to get fit. But how fit are your teeth? Are you lazy about brushing them?


(Phys.org) —A new study of light from quasars has provided astronomers with illuminating insights into the swirling clouds of gas that form stars and galaxies, proving that the clouds can shift and change ...
Current protocols for matching donor hearts to recipients foster sex mismatching and heart size disparities, according to a first-of-its kind analysis by physicians at the University of Maryland School of Medicine. Matching ...
A new study finds that the epilepsy drug levetiracetam appears not to be associated with thinking, movement and language problems for preschool children born to mothers who took the drug during pregnancy, although the drug ...
Common methods of assessing mental or physical disorders may consistently underestimate the prevalence of mental disorders among middle-aged and older adults, a new study from the Johns Hopkins Bloomberg School of Public ...
New York governor Andrew Cuomo announced Wednesday that he will authorize the medical use of marijuana, making his the 21st US state to do so and one of the biggest.
Javascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.© Phys.org™ 2003-2013, Science X network
At least eight researchers or policy experts have withdrawn from an Internet security conference after the sponsor reportedly used flawed encryption technology deliberately in commercial software to allow the National Security Agency to spy more easily on computer users.
RSA Security, owned by data storage giant EMC Corp., has disputed claims it intentionally introduced the flawed encryption algorithm, but otherwise has declined to discuss what a published report last month described as a $10 million government contract.
The revelation supplemented documents leaked by former NSA contractor Edward Snowden showing that the NSA tried to weaken Internet encryption.
The pullouts from the highly regarded RSA Conference represent early blowback by technology researchers and policy experts who have complained that the government's surveillance efforts have, in some cases, weakened Internet security even for innocent users.
Some U.S. companies that have agreed or been compelled to turn over customer records to the government have complained that their business relationships with customers in Europe, Asia and elsewhere are increasingly becoming arduous.
It was not immediately clear whether any researchers who still intended to make presentations at the conference would discuss the subject. Hugh Thompson, a conference organizer who works for security firm Blue Coat Systems, said the event is "an open venue where people can talk openly about security."
The researchers and experts include Mikko Hypponen, chief research officer of Finland-based antivirus provider F-Secure, and Adam Langley and Chris Palmer, who work on security practices at Google.
Christopher Soghoian, a researcher with the American Civil Liberties Union, said Tuesday on Twitter that he withdrew from the conference after having "given up waiting for RSA to fess up to the truth" regarding its development of the Dual_EC_DRBG algorithm with the NSA.
RSA issued an advisory to its customers last summer urging them not to use the algorithm, following published reports of the software's potential weaknesses. But that wasn't enough for researchers who want answers about the government's contract with RSA, which thousands of businesses use to secure their data.
RSA said in a statement last month that as a security company, it "never divulges details of customer engagements, but we also categorically state that we have never entered into any contract or engaged in any project with the intention of weakening RSA's products, or introducing potential 'backdoors' into our products for anyone's use."
The published report said RSA received the $10 million contract from the NSA to use the agency's preferred method of number generation. The report said such a flawed algorithm in RSA's Bsafe software tool generates random numbers in such a way that it creates "backdoors" into the company's encryption products.
Organizers said next month's conference in San Francisco will host 560 speakers, and they expect more participants than the 24,000 who showed up last year.
The NSA has a history in developing encryption algorithms, with documents showing decades-old criticisms among civilian government scientists about the agency's role in developing communication standards. That includes scientists' discomfort, as early as the 1980s, over the Digital Signature Standard, a way to electronically sign documents and guarantee their authenticity. That became a federal processing standard by 1994.
In September, documents leaked by Snowden showed that the agency more recently wanted to water down Internet encryption in an effort to gather and analyze digital intelligence. In turn, the federal National Institute of Standards and Technology tried to shore up confidence in the important behind-the-scenes role it plays in setting standards that are used by consumers to make purchases online, access their bank accounts or file their income taxes electronically.
The Office of the Director of National Intelligence said that "it should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries' use of encryption."
Explore further:NSA has long role as top US locksmith, lock-picker
© 2014 The Associated Press. All rights reserved.
More from Physics Forums - Computers


Sep 11, 2013
More than two decades ago, civilian government scientists were expressing concerns with the National Security Agency's role in developing global communications standards.


Jan 03, 2014
The US National Security Agency is making strides toward building a "quantum computer" that could break nearly any kind of encryption, The Washington Post reported Thursday.
Jan 03, 2014
More than 250 academics from around the world signed an online petition this week calling for an end to "blanket mass surveillance" by intelligence agencies.


Jan 01, 2014
Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone.
Dec 17, 2013
Quietly at first, but more vocally in recent months, Google Inc., Facebook Inc. and other leading Internet companies have been beefing up their digital defenses in response to reports that the National Security Agency has ...


Sep 08, 2013
Thousands took to the streets in Berlin Saturday in protests against Internet surveillance activities by the US National Security Agency and other intelligence agencies, and the German government's perceived ...
2 hours ago
President Barack Obama is hosting a series of meetings this week with lawmakers, privacy advocates and intelligence officials as he nears a final decision on changes to the government's controversial surveillance programs.
2 hours ago
Google is expanding its hotel business, offering several new ways for travelers to learn about accommodations.
3 hours ago
Two websites that post mug shots will stop charging people to remove the photos under a settlement reached in a federal lawsuit in Ohio.


3 hours ago
France's data protection watchdog on Wednesday fined Google 150,000 euros ($205,000)—the maximum possible—for failing to comply with its privacy guidelines for personal data.
6 hours ago
One way to keep from feeling lost and alone in a new city is to connect with the people who share your favorite places, and modern technology is making that much easier. According to new Cornell research, the popular smartphone ...


9 hours ago
China's largest online marketplace, Alibaba Group's Taobao, said Wednesday that it would ban the trading of Bitcoin and other virtual currencies from January 14, after a government crackdown on the units.
After 11 months of review, SURA announced the findings of a collaborative project to explore the capabilities of an open source application that assists with publishing, referencing, extracting and analyzing research data; ...


Two university research teams have worked together to produce the world's fastest thin-film organic transistors, proving that this experimental technology has the potential to achieve the performance needed ...


(Phys.org) —For those with running water in their homes, water is light, rolls right through the fingers, easily pours out of the faucet, and gives us hygiene and hydration in minutes so that we go on about ...


A team of Harvard scientists and engineers has demonstrated a new type of battery that could fundamentally transform the way electricity is stored on the grid, making power from renewable energy sources such ...


Armbands that track how much you move have become popular ways to motivate people to get fit. But how fit are your teeth? Are you lazy about brushing them?


(Phys.org) —A new study of light from quasars has provided astronomers with illuminating insights into the swirling clouds of gas that form stars and galaxies, proving that the clouds can shift and change ...
Current protocols for matching donor hearts to recipients foster sex mismatching and heart size disparities, according to a first-of-its kind analysis by physicians at the University of Maryland School of Medicine. Matching ...
A new study finds that the epilepsy drug levetiracetam appears not to be associated with thinking, movement and language problems for preschool children born to mothers who took the drug during pregnancy, although the drug ...
Common methods of assessing mental or physical disorders may consistently underestimate the prevalence of mental disorders among middle-aged and older adults, a new study from the Johns Hopkins Bloomberg School of Public ...
New York governor Andrew Cuomo announced Wednesday that he will authorize the medical use of marijuana, making his the 21st US state to do so and one of the biggest.
Javascript is currently disabled in your web browser. For full site functionality, it is necessary to enable Javascript. In order to enable it, please see these instructions.© Phys.org™ 2003-2013, Science X network