Two NSA Algorithms Rejected by the ISO
The ISO has rejected two symmetric encryption algorithms: SIMON and SPECK. These algorithms were both designed by the NSA and made public in 2013. They are optimized for small and low-cost processors like IoT devices.
The risk of using NSA-designed ciphers, of course, is that they include NSA-designed backdoors. Personally, I doubt that they’re backdoored. And I always like seeing NSA-designed cryptography (particularly its key schedules). It’s like examining alien technology.
EDITED TO ADD (5/14): Why the algorithms were rejected.
Neal • April 25, 2018 7:58 AM
From the article: “NSA officials, refused to provide the standard level of technical information to proceed.”
Wish there was more detail here. Sounds like a an important technicality.
Did someone drop the paperwork or not get the message that it needs to be filed properly? Was it held up because of some document that needed declassification? (I was told that just writing up the report on the wrong type of computer could cause this kind of headache due to the air gap. Unclassified documents need to be written on unclassified computers.)
Perhaps there was a misunderstanding of the type of information that needed to be filed, or where it should be filed? (It’s ISO and they over-design everything, so I kind of doubt that they under-specified the reporting requirements.)
Or was there some specific effort to not release the required technical information?
Considering that the algorithms have been known and available for review since 2013, I kind of think this is more due to someone dropping the ball rather than intentional malicious deception.