On 16/02/2015 20:39 pm, John Young wrote:
Kaspersky Q and A for Equation Group multiple malware program, in use early
as 1996. NSA implicated.

https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf

Once we take the brave step of downloading the pdf, it adds yet another indication [0] that the NSA is engaged in undeclared war against all and any cryptographic suppliers:



============================page 21
Victims generally fall into the following categories:
 * (usual industrual suspects...)
 * Companies developing cryptographic technologies.


============================page 27
16. What kind of encryption algorithms are used by the EQUATION group?

The Equation group uses the RC5 and RC6 encryption algorithms quite extensively throughout their creations. They also use simple XOR, substitution tables, RC4 and AES.

RC5 and RC6 are two encryption algorithms designed by Ronald Rivest in 1994 and 1998. They are very similar to each other, with RC6 introducing an additional multiplication in the cypher to make it more resistant. Both cyphers use the same key setup mechanism and the same magical constants named P and Q.

The RC5/6 implementation from Equation group’s malware is particularly interesting and deserves special attention because of its specifics.

(followed by discussion of an optimisation found that also allowed some degree of tracking to other APT groups.)

============================




iang

[0] http://financialcryptography.com/mt/archives/001455.html
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to