Receive $80 Grab vouchers valid for use on all Grab services except GrabHitch and GrabShuttle when you subscribe to BT All-Digital at only $0.99*/month.
Find out more at btsub.sg/promo
[WASHINGTON] A newly discovered Internet security flaw could leave many websites vulnerable to hackers because of weak US encryption standards in the 1990s, researchers said on Tuesday.
The flaw dubbed "FREAK" could leave thousands of websites open to attacks if the problem is not patched, according to papers released by French and US researchers.
The flaw was discovered by a team led by Karthikeyan Bhargavan at INRIA in Paris - the French Institute for Research in Computer Science and Automation - and disclosure coordinated by Matthew Green, a cryptographer at Johns Hopkins University.
A research paper said the flaw comes from "a class of deliberately weak export cipher suites... introduced under the pressure of US government agencies to ensure that the NSA would be able to decrypt all foreign encrypted communication." Mr Green said in a blog post that even some sites maintained by the National Security Agency and FBI appeared to be vulnerable.
"Since the NSA was the organisation that demanded export-grade crypto, it's only fitting that they should be the first site affected by this vulnerability," Mr Green said.
Mr Green and other researchers said the flaw stems from US government-imposed standards for encryption in software that was exported - a short-lived effort to allow the United States to be able to access software exported to unfriendly regimes.
PART OF THE SOFTWARE
Even after it became legal to export strong encryption, the export mode feature was not removed from because some software still depended on it, according to Ed Felten, a Princeton University computer science professor.
"The flaw is significant in itself, but it is also a good example of what can go wrong when government asks to build weaknesses into security systems," said Prof Felten in a blog post.
"Many web sites are vulnerable to this attack, allowing an adversary in the network to spoof or spy on traffic to vulnerable sites." Felten said that the vulnerability on the NSA site is "not a big national security problem in itself because NSA doesn't distribute state secrets from its public site. But there is an important lesson here about the consequences of crypto policy decisions." Mr Green said Facebook's site which operates the "like" button was identified as vulnerable but later patched.
Mr Green said the most of the flaws "will soon be patched" but that the flaw is important at a time when the NSA is seeking to maintain access to encrypted software and devices for national security reasons.
"The moral of this story is pretty simple: Encryption backdoors will always turn around and bite you in the ass," he wrote.