乔峰和洪七公什么关系| 天子是什么生肖| 香精是什么| 梦见鹦鹉是什么征兆| 酸枣仁有什么功效| 小蛇吃什么| mc是什么意思啊| 4月12号是什么星座| 鱼香肉丝用什么肉| 三阳开泰是什么意思| 尿是什么味道| 水泡长什么样| 省纪委常委是什么级别| 午未合化什么| 猫便秘吃什么最快排便| 一月25号是什么星座| 束缚是什么意思| 地级市市长是什么级别| 做梦吃酒席什么预兆| 什么主筋骨| 什么是间质性肺炎| 屁多肚子胀是什么原因| LC是什么| 烧伤病人吃什么恢复快| 平肝潜阳是什么意思| 视力模糊用什么眼药水| 4月20是什么星座| 海参是补什么的| 经常落枕是什么原因引起的| 什么得什么的| 蟹爪兰用什么肥料最好| 殇字是什么意思| 朱砂是什么材质| 小马是什么牌子| 咳嗽一直不好是什么原因怎么治| but什么意思| 疖子用什么药膏最好| 暴发火眼吃什么药| silk是什么意思| 为什么会脑供血不足| vans什么意思| 无创是检查什么| 丑五行属什么| dic医学上是什么意思| 双性人什么意思| 刻骨铭心是什么意思| 查心脏挂什么科| 下午3点半是什么时辰| 周杰伦为什么喜欢昆凌| 用什么回奶最快最有效| 八月底什么星座| 什么桥下没有水脑筋急转弯| 月加一笔是什么字| 双肺呼吸音粗是什么意思| 牙周炎用什么漱口水好| 100a是什么尺码| 新发展理念是什么| 奥氮平片治疗什么病| 马是什么牌子的车| 五行中什么生水| 吃什么可以补血| 浆细胞肿瘤是什么病| 密度增高影是什么意思| 心悸是什么原因造成的| 金字旁的字有什么| 教师资格证有什么用| 肌酐什么意思| 花椒什么时候传入中国| 8月10日是什么星座| 命犯桃花是什么意思| 2t是什么意思| 午睡睡不着是什么原因| 痛经 吃什么| 伊朗是什么派| pet一ct是一种什么检查| 什么运动瘦肚子| 什么补血效果最好最快| nt和唐筛有什么区别| 白肺是什么| 巨人观是什么意思| 肺结节是什么病| 乙肝五项15阳性是什么意思| 女性更年期潮热出汗吃什么药| 纳粹是什么意思| 检查乙肝挂什么科| 观音菩萨代表什么生肖| 甲鱼吃什么的| 做胃镜之前需要做什么准备| 肾积水挂什么科室| 课程是什么| 六味地黄丸起什么作用| 小肚子胀疼是什么原因| 霉菌性阴道炎有什么症状| 哺乳期可以吃什么感冒药| 花椒有什么功效| 殇字是什么意思| 小孩多动症是什么原因引起的| 喝水都长肉是什么原因| bag是什么意思| 硼砂是干什么用的| 午餐肉是什么肉做的| 什么是空腹血糖| 血脂高是什么原因引起| earth是什么意思| 肺气不足吃什么药| 血虚肝旺有什么症状有哪些| 10月10日是什么星座| 人为什么会怕鬼| 少量盆腔积液是什么意思| 桃胶有什么功效| 唱过什么歌| 五年生存率是什么意思| 怀孕从什么时候开始算起| 喝什么提神| 1985年属什么生肖| 鹿晗是什么星座| 什么情况下打破伤风| 宋朝之前是什么朝代| 贾宝玉的玉是什么来历| 耿直什么意思| 痄腮是什么意思| 双手麻是什么原因| 深圳少年宫有什么好玩的| 湿热吃什么中成药| 是什么颜色| 扁桃体发炎咳嗽吃什么药效果好| 哺乳期头痛可以吃什么药| 复方氯化钠注射作用是什么| 头疼是什么病的前兆| 氨气是什么| 高烧不退有什么好办法| 非洲人说什么语言| 出什么入什么| 秀才指什么生肖| 脑供血不足什么原因| 补肾吃什么药| 芥末是用什么做的| 莲字五行属什么| 尿酸检查什么项目| 什么动物没有骨头| 怀孕吃什么水果比较好| 一号来的月经排卵期是什么时候| 卫校有什么专业| 漳平水仙茶属于什么茶| 宫颈纳氏囊肿是什么意思严重吗| 松茸是什么东西| 南京有什么好玩的景点| 北宋六贼为什么没高俅| 丞字五行属什么| 什么人不能吃桃子| 梦见摘桑葚是什么意思| 三价铁离子什么颜色| 青色是什么样的颜色| 频频是什么意思| 苹果什么时候出新手机| 警察是什么编制| 打胎用什么药| 深明大义是什么意思| 柠檬泡蜂蜜有什么功效| 皮肤晒伤用什么药| 为什么家里蟑螂特别多| 灿烂的近义词是什么| 消化不良吃什么食物| 吃什么可以增强免疫力| 肺积水有什么症状| 什么是生辰八字| 卵巢囊性结构是什么意思| 反应迟钝是什么原因造成的| 嬴荡和嬴政什么关系| 心窝窝疼是什么原因| 得艾滋病的前兆是什么| 风言风语是什么意思| 煮方便面什么时候放鸡蛋| 嘴角流口水是什么原因| 什么叫二婚线| 为什么多喝水反而胖了| 头疼应该挂什么科| 为什么空调不制冷| 辣椒什么时候传入中国| 三羊念什么字| 孕检nt主要检查什么| 什么是结缔组织| 招字五行属什么| 柳下惠姓什么| 马骝是什么意思| 肚子痛去医院挂什么科| 心慌是什么症状| 4月14日是什么星座| 三七和田七有什么区别| 肾尿盐结晶是什么意思| 余的部首是什么| 左侧卵巢无回声是什么意思| 薄熙来犯了什么罪| 手术后不能吃什么食物| 治疗肝脏硬化要吃什么药好| 空调用什么插座| 脚踝疼是什么原因| 生肖龙和什么生肖最配| 过敏性紫癜千万不能用什么药| 县公安局局长什么级别| 等闲识得东风面什么意思| 公务员是做什么工作的| 1r是什么意思| mid什么意思| 效果图是什么意思| 安全期什么时候| 螨虫长什么样| esim卡是什么| 舌苔白厚腻吃什么药见效快| 近视手术有什么后遗症| 脸黄是什么原因造成的| 玉米笋是什么| 低密度脂蛋白胆固醇偏低是什么意思| 晚上入睡困难是什么原因| 结婚的礼数都有什么| 鸡蛋不能和什么食物一起吃| 大腿出汗是什么原因| 根管治疗后要注意什么| 不等闲是什么意思| 朝霞不出门晚霞行千里是什么意思| 木加鬼念什么| hpv用什么药| 骞字五行属什么| 吃太烫的东西有什么坏处| 什么是低聚果糖| 晚上睡觉口干是什么原因| 小狗什么时候可以洗澡| 无力是什么意思| 止咳吃什么药| 天干指的是什么| 1208是什么星座| 口腔溃疡用什么药最好| 舌头无苔是什么原因| 117是什么电话| 男子精少吃什么药可以生精| 紫菜不能和什么一起吃| 不疼不痒的红疹是什么| 肚脐眼叫什么穴位| 粘米粉是什么粉| 次心念什么| 铁棍山药和普通山药有什么区别| 什么情况下要打狂犬疫苗| 老年阴道炎用什么药| 入睡困难是什么原因引起的| 什么肉不含嘌呤| 黄柏胶囊主要治什么病| 什么样的贝壳| 失眠有什么特效药| 口爆是什么| 你是什么| 甘是什么味道| 瑞士为什么这么有钱| 夜阑珊是什么意思| 子宫后位是什么意思| 我拿什么留住你| o型血阳性是什么意思| 尿检白细胞弱阳性是什么意思| 睡觉尿多是什么原因| mua是什么意思| 中标是什么意思| avia是什么牌子| 什么药止痒效果最好| 皮肤痒挂什么科| 数字五行属什么| 百度Jump to content

暖春放价 带机出巡 华硕多款平板京东商城钜惠加码

From Wikipedia, the free encyclopedia
百度 李国宪说。

_NSAKEY was a variable name discovered in Windows NT 4 SP5 in 1999 by Andrew D. Fernandes of Cryptonym Corporation. The variable contained a 1024-bit public key; such keys are used in public-key cryptography for encryption (but not decryption). Because of the name, however, it was speculated that the key would allow the United States National Security Agency (NSA) to subvert any Windows user's security. Microsoft denied the speculation and said that the key's name came from the fact that NSA was the technical review authority for U.S. cryptography export controls.

Overview

[edit]

Microsoft requires all cryptography suites that interoperate with Microsoft Windows to have an RSA digital signature. Since only Microsoft-approved cryptography suites can be shipped with Windows, it is possible to keep export copies of this operating system in compliance with the Export Administration Regulations (EAR), which are enforced by the Bureau of Industry and Security (BIS).[1]

It was already known that Microsoft used two keys, a primary and a spare, either of which can create valid signatures. Upon releasing the Service Pack 5 for Windows NT 4.0, Microsoft had neglected to remove the debugging symbols in ADVAPI32.DLL, a library that exposes such Windows features as Windows Registry and security. Andrew Fernandes, chief scientist with Cryptonym, found the primary key stored in the variable _KEY and the second key was labeled _NSAKEY.[2] Fernandes published his discovery, touching off a flurry of speculation and conspiracy theories, including the possibility that the second key enabled the United States National Security Agency (NSA) to subvert any Windows user's security.[3]

During a presentation at the Computers, Freedom and Privacy 2000 (CFP2000) conference, Duncan Campbell, senior research fellow at the Electronic Privacy Information Center (EPIC), mentioned the _NSAKEY controversy as an example of an outstanding issue related to security and surveillance.[citation needed]

In addition, Dr. Nicko van Someren found a third key in Windows 2000, which he doubted had a legitimate purpose, and declared that "It looks more fishy".[4]

Microsoft's reaction

[edit]

Microsoft denied the backdoor speculations on _NSAKEY and said "This speculation is ironic since Microsoft has consistently opposed the various key escrow proposals suggested by the government." According to Microsoft, the key's symbol was "_NSAKEY" because the NSA was the review authority for U.S. cryptography export controls.[5][6]

Richard Purcell, Microsoft's Director of Corporate Privacy, approached Campbell after his presentation and expressed a wish to clear up the confusion and doubts about _NSAKEY. Immediately after the conference, Scott Culp, of the Microsoft Security Response Center, contacted Campbell and offered to answer his questions. Their correspondence began cordially but soon became strained; Campbell apparently felt Culp was being evasive and Culp apparently felt that Campbell was hostilely repeating questions that he had already answered. On 28 April 2000, Culp stated that "we have definitely reached the end of this discussion ... [which] is rapidly spiraling into the realm of conspiracy theory".[7]

Microsoft claimed the third key was only in beta builds of Windows 2000 and that its purpose was for signing Cryptographic Service Providers.[6]

Further technical information

[edit]

The Mozilla page on common questions on cryptography describes how Microsoft signs CSPs:

It is in fact possible under certain circumstances to obtain an export license for software invoking cryptographic functions through an API. For example, Microsoft's implementation of the Microsoft Cryptographic API (CryptoAPI) specification was approved for export from the US, even though it implements an API by which third parties, including third parties outside the US, can add separate modules ("Cryptographic Service Providers" or CSPs) implementing cryptographic functionality. This export approval was presumably made possible because a) the CryptoAPI implementation requires third party CSPs to be digitally signed by Microsoft and rejects attempts to call CSPs not so signed; b) through this signing process Microsoft can ensure compliance with the relevant US export control regulations (e.g., they presumably would not sign a CSP developed outside the US that implements strong cryptography); and c) Microsoft's CryptoAPI implementation is available only in executable form, and thus is presumed to be reasonably resistant to user tampering to disable the CSP digital signature check.[8]

According to Fernandes, it is possible to replace _NSAKEY. When loading a cryptographic module, the crypto_verify function first tries using _KEY to verify the module, then _NSAKEY. Since no cryptographic modules in Windows are signed with _NSAKEY, it never gets used. Replacing it with a different key allows non-US companies to install their crypto services into Windows without Microsoft's or the NSA's approval.[2]

Further speculation

[edit]

Microsoft stated that the second key is present as a backup to guard against the possibility of losing the primary secret key. Fernandes doubts this explanation, pointing out that the generally accepted way to guard against loss of a secret key is secret splitting, which would divide the key into several different parts, which would then be distributed throughout senior management. He stated that this would be far more robust than using two keys; if the second key is also lost, Microsoft would need to patch or upgrade every copy of Windows in the world, as well as every cryptographic module it had ever signed.[citation needed]

On the other hand, if Microsoft failed to think about the consequences of key loss and created a first key without using secret splitting (and did so in secure hardware which doesn't allow protection to be weakened after key generation), and the NSA pointed out this problem as part of the review process, it might explain why Microsoft weakened their scheme with a second key and why the new one was called _NSAKEY. (The second key might be backed up using secret splitting, so losing both keys should not be a problem.) Another possibility is that Microsoft included a second key to be able to sign cryptographic modules outside the United States, while still complying with the BIS's EAR. If cryptographic modules were to be signed in multiple locations, using multiple keys is a reasonable approach. However, no cryptographic module has ever been found to be signed by _NSAKEY, and Microsoft denies that any other certification authority exists.[citation needed]

Bruce Schneier believes that the above type of concern, i.e. NSA putting a key in Windows so it can load arbitrary backdoored CSPs, is unfounded. He argues that there are easier ways of backdooring Windows that do not involve using an additional key, let alone one called "NSAKEY" in debug symbols visible to the whole company: the NSA could just ask for the main key. The crypto API is also a poor point of entry, as it requires the victim to run an NSA-supplied executable.[9]

Key values

[edit]

Both keys are RSA keys with an e equal to 65537, which is a standard choice.[10]

_KEY has an n of:

b273e277a9c375c70bb7493e52b0b36962e976626ad609ba31be6accac12f1f3da6c18d96951820c457c7b4c4893bd149de279a39f6ec926d3544db3491fa2e9af1bf8260b3b0fbadd69cbd77b28012925711b17c0b877eaf7da9d02dd5f8572854e5c90e9b10cfbaeaf8b8fe1df5047bc18829a531499bbf49e8021346b5095

_NSAKEY has an n of:

ba8e15fee3cd160fb47cf93e2b4d842615af23f0659264d81edc35a27d3aa450890a227b561da401ff3908771d243f6eeb4f9e351976e90f07fd22cd099ccd71e85b97f5439adb172d32d71cb66c26c5b188a3e11790ed01eb31bf27bc667b396fd8283097d8b3869cc7511a3496e829a32bbad6d2f7aa7e8ca9805d51682d1f

PGP keys

[edit]

In September 1999, an anonymous researcher reverse-engineered both the primary key and the _NSAKEY into PGP-compatible format and published them to key servers.[11]

Primary key (_KEY)

[edit]
 Type Bits/KeyID Date User ID
 pub 1024/346B5095 1999/09/06 Microsoft's CAPI key <postmaster@microsoft.com>

 -----BEGIN PGP PUBLIC KEY BLOCK-----
 Version: 2.6.3i

 mQCPAzfTc8YAAAEEALJz4nepw3XHC7dJPlKws2li6XZiatYJujG+asysEvHz2mwY
 2WlRggxFfHtMSJO9FJ3ieaOfbskm01RNs0kfoumvG/gmCzsPut1py9d7KAEpJXEb
 F8C4d+r32p0C3V+FcoVOXJDpsQz7rq+Lj+HfUEe8GIKaUxSZu/SegCE0a1CVABEB
 AAG0L01pY3Jvc29mdCdzIENBUEkga2V5IDxwb3N0bWFzdGVyQG1pY3Jvc29mdC5j
 b20+iQEVAwUQN9Nz5j57yqgoskVRAQFr/gf8DGm1hAxWBmx/0bl4m0metM+IM39J
 yI5mub0ie1HRLExP7lVJezBTyRryV3tDv6U3OIP+KZDthdXb0fmGU5z+wHt34Uzu
 xl6Q7m7oB76SKfNaWgosZxqkE5YQrXXGsn3oVZhV6yBALekWtsdVaSmG8+IJNx+n
 NvMTYRUz+MdrRFcEFDhFntblI8NlQenlX6CcnnfOkdR7ZKyPbVoSXW/Z6q7U9REJ
 TSjBT0swYbHX+3EVt8n2nwxWb2ouNmnm9H2gYfXHikhXrwtjK2aG/3J7k6EVxS+m
 Rp+crFOB32sTO1ib2sr7GY7CZUwOpDqRxo8KmQZyhaZqz1x6myurXyw3Tg==
 =ms8C
 -----END PGP PUBLIC KEY BLOCK-----

Secondary key (_NSAKEY and _KEY2)

[edit]
 Type Bits/KeyID Date User ID
 pub 1024/51682D1F 1999/09/06 NSA's Microsoft CAPI key <postmaster@nsa.gov>

 -----BEGIN PGP PUBLIC KEY BLOCK-----
 Version: 2.6.3i

 mQCPAzfTdH0AAAEEALqOFf7jzRYPtHz5PitNhCYVryPwZZJk2B7cNaJ9OqRQiQoi
 e1YdpAH/OQh3HSQ/butPnjUZdukPB/0izQmczXHoW5f1Q5rbFy0y1xy2bCbFsYij
 4ReQ7QHrMb8nvGZ7OW/YKDCX2LOGnMdRGjSW6CmjK7rW0veqfoypgF1RaC0fABEB
 AAG0LU5TQSdzIE1pY3Jvc29mdCBDQVBJIGtleSA8cG9zdG1hc3RlckBuc2EuZ292
 PokBFQMFEDfTdJE+e8qoKLJFUQEBHnsH/ihUe7oq6DhU1dJjvXWcYw6p1iW+0euR
 YfZjwpzPotQ8m5rC7FrJDUbgqQjoFDr++zN9kD9bjNPVUx/ZjCvSFTNu/5X1qn1r
 it7IHU/6Aem1h4Bs6KE5MPpjKRxRkqQjbW4f0cgXg6+LV+V9cNMylZHRef3PZCQa
 5DOI5crQ0IWyjQCt9br07BL9C3X5WHNNRsRIr9WiVfPK8eyxhNYl/NiH2GzXYbNe
 UWjaS2KuJNVvozjxGymcnNTwJltZK4RLZxo05FW2InJbtEfMc+m823vVltm9l/f+
 n2iYBAaDs6I/0v2AcVKNy19Cjncc3wQZkaiIYqfPZL19kT8vDNGi9uE=
 =PhHT
 -----END PGP PUBLIC KEY BLOCK-----

See also

[edit]

References

[edit]
  1. ^ Chappell, Geoff (12 September 1999). "CSP Signatures". Archived from the original on 4 May 2006.
  2. ^ a b Fernandes, Andrew (31 August 1999). "Microsoft, the NSA, and You". cryptonym.com. Cryptonym. Archived from the original on 17 June 2000. Retrieved 26 October 2005.
  3. ^ "NSA key to Windows: an open question". CNN Online. Cable News Network. 5 September 1999. Archived from the original on 5 October 2015.
  4. ^ Campbell, Duncan (4 January 1999). "How NSA access was built into Windows". Heise Online. Heise Medien.
  5. ^ "Microsoft Says Speculation About Security and NSA Is "Inaccurate and Unfounded"". News Center. Redmond, WA: Microsoft. 3 September 1999. Archived from the original on 24 October 2012.
  6. ^ a b "There is no "Back Door" in Windows". Microsoft. 7 September 1999. Archived from the original on 20 May 2000. Retrieved 7 January 2007.
  7. ^ "Windows NSAKEY Controversy". Rice University.
  8. ^ "Mozilla Crypto FAQ". Archived from the original on 22 April 1999. Retrieved 12 April 2020.
  9. ^ Schneier, Bruce (15 September 1999). "NSA Key in Microsoft Crypto API?". Counterpane. Retrieved 7 January 2007.
  10. ^ "DomainKeys Identified Mail (DKIM) Signatures". IETF. 1 January 1970. Retrieved 12 December 2024.
  11. ^ "The reverse-engineered keys". Cypherspace. 6 September 1999. Retrieved 7 January 2007.

榛子是什么树的果实 女人切除子宫有什么影响 手指甲白是什么原因 心慌是什么意思 白带豆腐渣状是什么原因造成的
恶心是什么意思 卢字五行属什么 人类免疫缺陷病毒是什么 天龙八部是指佛教中的什么 火车为什么会晚点
小孩为什么经常流鼻血 高血糖可以吃什么 心脏彩超挂什么科 鲸鱼属于什么类动物 梦见自己的车丢了是什么意思
春天有什么特点 鸾凤和鸣什么意思 什么情况要打破伤风 支气管激发试验阴性是什么意思 乌龟吃什么
勃起是什么hcv8jop7ns5r.cn 莫欺少年穷是什么意思ff14chat.com 什么叫阴吹helloaicloud.com 左手臂有痣代表什么hcv8jop7ns6r.cn 遗精频繁是什么原因hcv7jop5ns5r.cn
elisa是什么检测方法mmeoe.com 最难做的饭是什么fenrenren.com 11.15是什么星座hcv7jop9ns1r.cn 扁桃体发炎吃什么消炎药hcv8jop7ns4r.cn 吃饭咬到舌头什么原因gysmod.com
古代人用什么刷牙hcv9jop7ns2r.cn 蜗牛为什么怕盐hcv9jop5ns7r.cn 12月15日什么星座hcv8jop5ns7r.cn 拾掇是什么意思baiqunet.com 3.15是什么星座hcv8jop7ns3r.cn
肠胃炎引起的发烧吃什么药hcv9jop2ns2r.cn 棱是什么hcv9jop6ns6r.cn 8月是什么季节hcv7jop9ns2r.cn 尿里带血是什么原因女性hcv9jop1ns5r.cn 经常生气会得什么病hcv7jop5ns5r.cn
百度