Login | Register   
RSS Feed
Download our iPhone app
Browse DevX
Sign up for e-mail newsletters from DevX

By submitting your information, you agree that devx.com may send you DevX offers via email, phone and text message, as well as email offers about other products and services that DevX believes may be of interest to you. DevX will process your information in accordance with the Quinstreet Privacy Policy.


RSA Tells Developers to Stop Using Encryption Algorithm Linked to NSA

Dual EC_DRBG may contain backdoors that enable government snooping.




Building the Right Environment to Support AI, Machine Learning and Deep Learning

Security vendor RSA has sent out a message to customers warning developers not to use one of its encryption algorithms. "To ensure a high level of assurance in their application, RSA strongly recommends that customers discontinue use of Dual EC DRBG and move to a different PRNG," stated the RSA advisory. "Technical guidance, including how to change the default PRNG in most libraries, is available in the most current product documentation."

Last week, The New York Times reported that the U.S. National Security Agency (NSA) inserted a backdoor into the Dual EC DRBG standard. Many academics and security experts have expressed concerns about this particular encryption algorithm in the past.

It isn't known how many commercial products or internally developed enterprise applications currently use the standard.

View article

Comment and Contribute






(Maximum characters: 1200). You have 1200 characters left.



Thanks for your registration, follow us on our social networks to keep up-to-date