Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 10 submissions in the queue.
posted by janrinok on Friday August 10 2018, @04:53PM   Printer-friendly
from the matter-of-trust dept.

Linux Kernel 4.17 saw the inclusion of NSA's 'controversial' encryption algorithm Speck. Linux Kernel 4.18 will see Speck being available as a supported algorithm with fscrypt and not everyone is happy about it.

Before you panic or form wrong conclusions, you should know that Speck is not a backdoor. It's just a not-so-strong encryption algorithm from American agency NSA and it's available as a module in Linux Kernel.

The algorithm in question, Speck, is a 'weak' encryption (lightweight block cipher) designed for devices with low computing powers i.e., IoT devices.

NSA wanted Speck and its companion algorithm Simon to become a global standard for next generation of internet-of-things gizmos and sensors.

NSA tried to aggressively push this algorithm to an extent that some cryptographer alleged bullying and harassment at the hands of NSA.

The problem with the algorithm is that the International Organization of Standards (ISO) rejected Speck and Simon.

Google engineer Eric Biggers requested the inclusion of Speck in Kernel 4.17 because Google is going to provide Speck as an option for dm-crypt and fscrypt on Android.

The focus is on providing encryption on Android Go, an Android version tailored to run on entry-level smartphones. As of today, these devices are not encrypted because AES is not fast enough for the low-end devices.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Interesting) by MichaelDavidCrawford on Friday August 10 2018, @05:43PM (3 children)

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Friday August 10 2018, @05:43PM (#719998) Homepage Journal

    In late 2002 I implemented AES about the Oxford Semiconductor OXFW911 IDE/Firewire bridge chip. At the time the 911 was popular for external Firewire drive enclosures.

    I used a hand-tuned blend of ARM and Thumb assembler. The controller on the 911 was a 49 MHz ARM7TDMI. I also copied the crypto from the slow 16-bit flash to the fast 32-bit RAM.

    It worked well enough that it was a huge hit at the 2003 MacWorld Expo. James Wiebe was very pleased because it got Wiebetech lots of press.

    But it never went fast enough that I could play a movie from an encrypted volume.

    James later sold the company to his direct competitor CRU. CRU Wiebetech [cru-inc.com] now sells enclosures with true hardware encryption.

    --
    Yes I Have No Bananas. [gofundme.com]
    Starting Score:    1  point
    Moderation   +3  
       Offtopic=1, Interesting=4, Total=5
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 2) by RS3 on Friday August 10 2018, @11:18PM (1 child)

    by RS3 (6367) on Friday August 10 2018, @11:18PM (#720119)

    Oh, would a nice FPGA (lattice, xilinx, etc.) have done the trick?

    • (Score: 2) by MichaelDavidCrawford on Saturday August 11 2018, @04:17AM

      by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Saturday August 11 2018, @04:17AM (#720205) Homepage Journal

      All the work I did for James was aimed at creating new kinds of products without changing the actual hardware.

      Get This:

      James Wiebe made bank as a result of my removing from the 911, 912 and 922 firmware their abilities to write to the storage media. I'm talking #if 0'ing three lines of code.

      The Wiebetech Forensic Storage products did then and still do sell like hotcakes: if you image a suspect's drive with a Wiebetech Forensic Storage Adapter, the original drive is still admissible in court, because you could not possibly have altered the data on it.

      They're also popular with all the spy agencies. There is no doubt in my mind whatsoever that a Wiebetech Forensic Storage Adapter was used to image Usama ben Laden's disks.

      --
      Yes I Have No Bananas. [gofundme.com]
  • (Score: 2) by sjames on Sunday August 12 2018, @11:50PM

    by sjames (2882) on Sunday August 12 2018, @11:50PM (#720736) Journal

    Of course these days, it's not hard to find a fast enough ARM and many SOC have hardware AES baked in.

    Considering how much easier it is to get a low cost ARM with more than enough power for real crypto now, I have real questions about the NSA's motives.