Close

2023-10-17

Mathematician Alleges US Spies Could Be Weakening Next-Gen Encryption

Mathematician Alleges US Spies Could Be Weakening Next-Gen Encryption

Quantum computers, which are anticipated to be soon able to crack current encryption methods, have led to plans for developing new, secure algorithms. However, there are concerns that the US National Security Agency (NSA) might undermine this process. A leading cryptography expert, Daniel Bernstein, from the University of Illinois Chicago, has expressed concerns to New Scientist about the potential weakening of a new generation of algorithms meant to protect against quantum computer-equipped hackers. Bernstein suggests that the US National Institute of Standards and Technology (NIST) might be intentionally obscuring the extent of the NSA’s involvement in developing new encryption standards for post-quantum cryptography (PQC). He also raises questions about potential errors in NIST’s calculations regarding the security of these new standards.

Reference: New Scientist Article.

Trust in Standards
The allegations surrounding the NSA’s potential interference in developing post-quantum cryptography standards can have profound implications for global trust in encryption standards. NIST’s guidelines are widely adopted and respected across the globe. If these allegations gain traction, there could be a ripple effect, leading organizations and countries to question the integrity of other standards set by NIST or affiliated bodies. This mistrust could slow the adoption of new standards, as entities might opt to wait for third-party validations or even look for alternative standards. In the worst-case scenario, it could lead to a fragmented landscape where different regions or industries adopt varying encryption standards, complicating interoperability and global communication.

The Quantum Threat
The advent of quantum computers presents a clear and present danger to current encryption methods. Their ability to potentially crack encryption that today’s supercomputers would take millennia to decipher underscores the urgency of developing robust post-quantum cryptography. For institutions like NIST, the challenge is twofold. Firstly, they must ensure that the new standards are quantum-resistant, which requires extensive research, testing, and validation. Secondly, they need to expedite the development and adoption of these standards, as the timeline for quantum computers becoming a threat, while uncertain, is advancing. Balancing speed with thoroughness and integrity is a significant challenge.

Transparency in Cryptography
Cryptography, by its very nature, requires a high degree of trust. Users need to believe that the encrypted data is secure and that there are no backdoors. While understandable from a national security perspective, the secretive nature of intelligence agencies is at odds with the transparency required for trust in encryption standards. Striking a balance is challenging but essential. One approach could be a clear separation between bodies setting the standards and intelligence agencies, with third-party audits and validations of the standards. Open-source approaches, where the cryptographic community can review and contribute to the standards, can also enhance transparency and trust. Additionally, fostering a culture of openness, where potential vulnerabilities are shared and addressed collaboratively, can go a long way in building and maintaining trust in encryption standards.