WHAT IS SECURITY BY OBSCURITY AND WHY HAS RSA STUMBLED?


The breach at RSA just goes to show that security by obscurity never works.

And you are probably wondering just what is ‘security by obscurity’ ?

Lets use a simple metaphor that is familiar to us all to help explain the concept.

We have all at one time or another left a spare key under the doormat, just in case we are locked out of the house, or we leave it for someone else to use to get in.   Well,  simply put, that is - security through obscurity.

The theoretical security vulnerability is that anybody could break into the house by unlocking the door using the spare key from under the mat.    Add to that scenario the reality that any burglar worth his salt will check out the most obvious hiding places, and so we, the house owner, run a  greater risk of a burglary by hiding the key in this way, since the effort of finding the key is likely to be less effort to the burglar than breaking in by another means. We have in effect added a vulnerability  (the fact that the key is stored under the doormat) to the system, and one which is very easy to guess and exploit.

In the case of computer code or RSA algorithms the assumption is that the algorithm cannot be broken – that the burglar wont find the key under the mat.  Alas we have just found out how fatally flawed that logic is.  And boy it could not have happened to more iconic an institution than RSA.   The very same RSA that invented the public and private key algorithm (based on factoring of primes) that has formed the foundation of Internet security for the last 25 years.   But at the end of the day it is still security by obscurity.  

Enter Kerckhoff and his principle.  http://en.wikipedia.org/wiki/Auguste_Kerckhoffs
http://artofinfosec.com/335/crypto-kerckhoffs-principle/

 “ Assume your enemy has the details of your system “

If your security relies on some level of operational system "secrecy" to work, it is just a matter of when, not if, the system will be compromised. The problem with traditional shared secret tokens,  (not to mention cost, deployment and custody issues)   is that they do nothing to establish context of the mutual authentication i.e. the establishment of trust between the parties.    They are merely additional layers of "secret passwords", regardless of how those factors are generated or delivered.    http://www.schneier.com/crypto-gram-0205.html


The application most used by the RSA SecureID token, being the generation of a “One Time Password”  which is then entered into the browser;   is reliant upon the integrity of the browser,  the very vehicle  for which trust has not yet been established.   This constitutes a fatal flaw in the ‘design’ of the system.

The primary issue involved in this breach is the wide applicability of the "secret" elements that were compromised. In a properly architected authentication system, any security failure should be at worst, a one-in-a-row event.  In this case – assuming the hackers indeed have succeeded in ‘stealing the password’  ( the seed to the key generator)  they can exploit the vulnerability of all of RSA’s customers.   Not just one or two.

Being the ‘chosen’ security vendor to  “  90% of the Fortune 500 “  ( per RSA’s website)  leads to hubris and hubris leads to complacency.  The World now operates at Internet speed.  Just ask the Tunisian and Egyptian ( and who knows more) Governments about that.    No one can assume that their position is safe.  The rise of Hacktivism (http://bit.ly/gcqhxe) means that security has now risen right up the agenda and for RSA to be seen to be stumbling at such a crucial time could prove to be very damaging.    

Fortunately there are nimble and agile upstarts like http://www.liveensure.com who are showing the industry that innovation is alive and well and that solutions (that work) are available and they are affordable too.  

Other references: 

Comments

Popular posts from this blog

The End of Passwords

WIKILEAKS - the fuss?

SPOOKS - CYBER ATTACK