1 min read

Military Encryption-Breaking Project from Department of Defense Found Unencrypted on Backup Server

Liviu ARSENE

May 12, 2017

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
Military Encryption-Breaking Project from Department of Defense Found Unencrypted on Backup Server

An alleged Department of Defense encryption-breaking program developed in collaboration with IBM and the New York University was accidentally found unencrypted on a backup server inside New York University by a security researcher.

Code-named “WindsorGreen”, the project details advanced math systems designed to break encryption and brute-force passwords. While the project was allegedly in development between 2005 and 2012, the documents suggest it wouldn”t have been ready until 2014.

The tool used to find the documents seems to have been Shodan, an internet-of-things scanning search engine, designed to find internet-connected IoT devices with poor authentication credentials. While the schematics are highly advanced and include design specs for new hardware, cryptography experts believe their purpose is to specifically break codes and encryption faster, at lower production costs per hardware.

However, despite the advanced designs of the code-breaking system, computer researcher Andrew Huang believes that modern encryption mechanisms would render the proposed code-hacking system ineffective.

“As long as you use long keys and recent-generation hashes, you should be OK,” said Huang. “Even if [WindsorGreen] gave a 100x advantage in cracking strength, it”s a pittance compared to the additional strength conferred by going from say, 1024-bit RSA to 4096-bit RSA or going from SHA-1 to SHA-256.”

While it”s unclear at this point whether or not “WindsorGreen” was more than just a proposed project, there have currently been no official statements on the matter from either IBM or the DOJ. However, it”s ironic that an alleged encryption-breaking project would be stored unencrypted, on a publicly available backup server, accessible with no authentication credentials.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read