Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intellectual Property
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Human Mobility
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
Commentary
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

On Backdoors and Encryption

September 6, 2013

There is a general myth that the “geeks” defeated the Feds in the “crypto wars” of the 1990s, blocking efforts to prevent the sale and export of advanced encryption products.  This is an article of faith with some people, particularly on the West Coast, and if you interview them you will get this story presented as an accurate account of what happened.

An article in the New York Times hinted at a more accurate picture.  The geeks did not win the crypto war.  They were deluded into thinking they had done so, producing a false sense of security.  Now, wounded that their cherished myth has been punctured like a balloon, they claim that the NSA coerced IT companies to build back doors into encryption products and this is what let it defeat encryption.  This is wishful thinking.

Wishful because the backdoor argument points to what is one central myth of the internet – that it is possible to use technology to make it secure.  If only there weren’t back doors put in by coercion, then we could be safe.  Sorry, but while security measures can make it harder to steal data, there are perhaps half a dozen intelligence agencies in the world with the resources and skills to defeat any internet security measure without the need for backdoors.  The internet can be made more secure, but it will never be fully secure. 

The notion of back doors leads immediately to bad policy, and this was the one point that gave me pause in writing this piece.  Should I tell them that their proposed fix is useless?  If the capabilities that let an intelligence agency defeat encryption do not rely on back doors, switching to foreign products will not make you any safer, although it may provide a degree of comfort rather like an umbrella in a hurricane.   

Back to how to defeat encryption without back doors.  Encryption products take “plain text,” and use mathematical formulas to scramble it into unintelligible chunks.  But many encryption products have design flaws.  Companies say they use a “key” used to encrypt text that is 126 or 256 bits long.

In fact, through mis-implementation, it might be much less.  A company may say it uses a “random number generator” but truly random number generators are hard to build.  One company dealt with the problem by using a fixed list of numbers from which they randomly selected.  These design errors are detectable and provide a way in.

Implementation of a crypto program is a problem.  Key management is a problem.  People cut corners or take short cuts to deal with these problems and that provides a way in.  A variety of techniques to crack passwords have existed for twenty years.  As any good “phisher” knows, you can always count on human error.

An email, for example, has a standard format.  Somewhere early in the text there will be the date (finding the encrypted date was one way the British broke high end German encryption in World War Two).  There will be a greeting, often with the recipient’s name.  You now can match plain text with the text that emerges from the encryption program.  With some hard work and skill, this provides a way in. 

Now suppose an agency employs several hundred of the best mathematicians in the country, has the world’s most powerful super computer, and brings seventy years of experience and an immense library of crypto products dating back to the 1940s to the decryption problem.  It collects masses of traffic (all major signal intelligence agencies do this), and in that traffic there may be a pattern or error that will let it defeat encryption (this was in part how the U.S. defeated Soviet encryption in the “Venona” program).  An agency can build special purpose machines or write special purpose programs designed to overcome specific encryption programs.  You may use PGP, for example but several countries probably have “anti-PGP” machines that automatically break your encrypted message.  With resources, persistence and skill, any defense can be defeated. 

In the U.S. this effort to deal with encryption began in the mid 1990s, when it was clear that the newly commercialized internet would need to be made more secure.  The Clinton Administration, yielding in part to political pressure, decided that the short term loss of intelligence that would occur if encryption was “decontrolled” would be offset by the benefit to U.S. security from making American companies harder to penetrate and help U.S. companies be more competitive.  When the United States released encryption, it hoped that it would be used widely, making the internet safe from all but a handful of opponents.  This widespread use did not occur – in this the first internet security policy failed, something we continue to pay for.

Administration officials also knew that intelligence agencies were working on new approaches to defeat encryption and this made them comfortable with releasing it.  This was neither easy nor cheap, but it is not a fluke that the internet has created what one senior NSA official has called “the golden age of signals intelligence.” 

Sometimes crypto or privacy advocates argue that there are technological solutions like encryption that allow dissidents to operate without interference.  The plain truth is that such technological safeguards work only if the government of the country in which the dissidents reside let them work, and it is constrained by law from using the range to techniques that can defeat any technology.  Civil liberties are protected in the United States not because people use encryption or Tor or pseudonyms, but because the NSA does not use its capabilities to stifle free speech or political opposition.  You can use encryption in Russia and still not have any civil liberties because the FSB, Russia’s domestic intelligence service, is untrammeled.  Neither agency needs a backdoor. A lack of faith in technology is disturbing, but the limits of technology point to the central policy needed for cyber security, the core of which is to extend the rule of law into cyberspace. 

James A. Lewis is a senior fellow at the Center for Strategic and International Studies in Washington, D.C. and drafted the first two regulations decontrolling encryption in the late 1990s.

Commentary is produced by the Center for Strategic and International Studies (CSIS), a private, tax-exempt institution focusing on international public policy issues. Its research is nonpartisan and nonproprietary. CSIS does not take specific policy positions. Accordingly, all views, positions, and conclusions expressed in this publication should be understood to be solely those of the author(s).

© 2013 by the Center for Strategic and International Studies. All rights reserved.

 

Written By
James Andrew Lewis
Senior Vice President and Director, Strategic Technologies Program
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173
Related
Counterterrorism and Homeland Security, Cybersecurity and Technology, Defense and Security, Intelligence, Surveillance, and Privacy, Strategic Technologies Program, Technology and Innovation

Most Recent From James Andrew Lewis

On Demand Event
Next Steps in Critical Infrastructure Protection: Challenges for CISA and Congress
October 29, 2021
On Demand Event
A Conversation with Chris Inglis and Anne Neuberger
October 28, 2021
On Demand Event
Open Radio Access Network (O-RAN): Implications for 5G and 6G
October 27, 2021
In the News
«Наиболее крупные атаки российских хакеров были санкционированы Путиным»
VOA | Алексей Горбачев, Алексей Зонов
October 27, 2021
In the News
Automakers are spending billions to produce battery cells for EVs in the U.S.
CNBC | Michael Wayland
October 19, 2021
In the News
After 9/11, China grew into a superpower as a distracted U.S. fixated on terrorism, experts say
NBC News | Dan De Luce
October 17, 2021
On Demand Event
Beyond 5G: Standards for Sixth Generation Networks
October 6, 2021
On Demand Event
Cybersecurity for Critical Infrastructure: American and European Perspectives
October 4, 2021
View all content by this expert
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries
Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Paige Montfort
Media Relations Coordinator, External Relations
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2021. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions