Randomised web numbers are too easy to guess

Previously unknown encryption flaw could mean data is stolen more readily, claim researchers

Encryption

A group of security researchers has revealed that the randomised numbers used to encrypt data on the web could be too weak to offer high levels of protection.

The flaw, which prevents servers from generating strong encryption, was discovered by security researchers Bruce Potter and Sasha Moore, who presented their research at the annual Black Hat conference in Las Vegas.

Advertisement - Article continues below

Potter explained that the randomly generated data strings are produced by the server, which detects when certain computer behaviour such as mouse movements and keyboard strokes are made. It converts these into ones and zeros and moves this into a pool of data, which is called upon when security functions are needed.

He used the example of a pack of cards to explain how the numbers are selected, saying an unshuffled pack has low randomisation (entropy) because it is easy to predict in what order the cards would be dealt. Data pools used for encryption should have a high entropy, because there is such a wide variety of numbers to be chosen.

But, the entropy of widely-used Linux web servers is lower than first thought because the machines from which the data comes from are not creating enough information to increase the randomisation. The knock-on effect is that systems are struggling to obtain reliable seeds from which to build secure randomised numbers from, which can make the sequence of the strings easier to guess.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

According to Potter, this research has shed light on previously unknown aspects of how encryption works on many popular web servers.

"This seemed like just an interesting problem when we got started but as we went on it got scary ... because when you have unknowns in crypto that's when things go sideways," Potter said.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/operating-systems/28025/best-linux-distros-2020
operating systems

Best Linux distros 2020

18 May 2020
Visit/software/28109/what-is-open-source
Software

What is open source?

29 Apr 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/data-breaches/355777/easyjet-faces-class-action-lawsuit-over-data-breach
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020