RSA denies entering into NSA agreement to use flawed algorithm

Share this article:

RSA, the security division of EMC, has quickly denied allegations it used a flawed encryption formula in its products after entering into a $10 million secret contract with the National Security Agency (NSA). 

A Friday article published by Reuters refers to leaked documents, which reveal that the contract set an “NSA formula as the preferred, or default, method for number generation in the BSAFE software.”

All versions of RSA's BSAFE toolkits were revealed in September to be impacted by a community-developed encryption algorithm believed to contain an NSA backdoor.

At the time, RSA and the National Institute of Standards and Technology (NIST) recommended not using the flawed algorithm, known as Dual Elliptic Curve Deterministic Random Bit Generator (Dual EC DRBG).

“We continued using the algorithm as an option within BSAFE toolkits as it gained acceptance as a NIST standard and because of its value in FIPS compliance,” according to an RSA statement. “When concern surfaced around the algorithm in 2007, we continued to rely upon NIST as the arbiter of that discussion.”

The release continues, “When NIST issued new guidance recommending no further use of this algorithm in September 2013, we adhered to that guidance, communicated that recommendation to customers and discussed the change openly in the media.”

Dual EC DRBG is one of many algorithms available in BSAFE toolkits, according to the RSA statement, which adds that users are free to choose whichever one works best for them.

Share this article:

Sign up to our newsletters

More in News

Apple hit with privacy class-action over iPhone location service

Apple hit with privacy class-action over iPhone location ...

A woman claims she did not realize the company was using location services to track her and accuses the company of giving the data to third parties.

Attackers compromise Gizmodo Brazil

Trend Micro is investigating whether a vulnerability was used to compromise Gizmodo Brazil and a logistics firm hosted by the same ISP.

Paddy Power breach impacting 650K customers dates back to 2010

Nearly 650,000 Paddy Power customers who made an account prior to 2010 had data compromised in a breach.