July 01, 2013, 12:51 PM — Is anything secure anymore? The National Security Agency (NSA) leaks have produced a number of side effects. What we assumed was a safe form of communications is perhaps not so secure after all. The gold standard of secure mobile messaging, BlackBerry, may have been compromised!
Apparently, the NSA and Britain's spy agency GCHQ (and/or other governments/agencies) were able to hack into the BlackBerry streams of government officials attending a G20 summit in London. If true, this raises a bigger question: Is any encrypted communication safe anymore given the massive amount of brute-force computing power that can be applied to code-breaking and pattern recognition?
Low-cost GPUs (graphical processer units) that are being configured into massively parallel systems are far better at code-breaking than traditional CPUs. When the encryption algorithms were originally created, people reported it would take tens or hundreds of years in brute-force computing power to break them. But they never envisioned the relatively cheap, massively parallel systems available today using hundreds or thousands of NVidia or AMD GPU cores. These parallel processing machines are really effective at finding patterns and hence decrypting data streams. Indeed, some "researchers" have demonstrated ways of breaking the security of wireless transmissions like Wi-Fi, Bluetooth, etc.
Do we need to re-evaluate what secure mobile messaging is all about? For years, Research In Motion has said its BlackBerry system was secure. There's no reason to doubt that RIM is being honest when it confirms that there is no back door designed into its systems to allow decoding of user data streams. But that does not mean it can't be done by other means, perhaps by monitoring the data and then deciphering it, and not necessarily in real time. (Recording in real time than processing the data in massive supercomputing systems is common practice.) What may have taken tens or hundreds of years to brute-force when algorithms were designed may no longer be an accurate estimate for those players able to devote enough resources to their defeat. And the cost and availability of those resources is dropping rapidly.
So should organizations, even ones that believe they are highly secure (and perhaps even FIPS-compliant), assume they are safe? Should stand-alone or PC-installed encrypted storage devices be assumed unbreakable? Should highly encrypted mobile messaging be assumed unreadable by prying eyes? They're safe from most hacking, probably. From all hacking and various government agencies, U.S. and otherwise, not necessarily. Don't forget, Enigma, the most ambitious and secure "unbreakable" system of its day, was defeated.
The NSA disclosures should raise red flags. We are entering a new era of security where decryption of secure systems is something that can be accomplished on multiple levels and with relatively easily available technology. Mobile users with highly sensitive data should be concerned, both with mobile data transfers and also data at rest that may be stolen (e.g., while laptops remain in a hotel room and the owner goes out). There is no longer an absolute guarantee of confidentiality. This is not paranoia. Moore's Law's exponential expansion applies as well to the brute-force hacking of encryption as it does to other computing tasks.
There will be a continuous struggle to find more secure encryption algorithms, or use increasingly longer bit-lengths to enhance security and make it more difficult to defeat. But this may also require more onboard resources to do the encryption/decryption and raise the cost of devices. Ultimately security isn't free.
Bottom line: Complacency is the enemy. All organizations must be vigilant and review what level of data encryption and levels of security they employ, especially if the technologies are more than one or two years old and the companies are in highly regulated and/or sensitive industries. Only the most current security-enabled products should be utilized, but that may not be enough to prevent a data breech by those groups/agencies with enough resources to apply to the task.
Jack Gold is the founder and principal analyst at J.Gold Associates, an information technology analyst firm based in Northborough, Mass.