RSA Security has struck out against claims
that the company was paid by the National Security Agency (NSA) to sell flawed encryption software that was vulnerable to surveillance. A blog post states
that it has never entered into a "secret contract" with the NSA, and that any collaboration between it and the agency has been openly publicized.
A report by Reuters
late last week claimed that RSA was paid $10 million to promote the pseudorandom-number generator, with the payment made in exchange for the crackable generator to be used as the default setting in its Bsafe security tools. Critics pointed at the alleged payment as evidence of potential complacence with government surveillance.
The EMC-owned company asserts that it made the decision to use the algorithm as the default setting in 2004, "in the context of an industry-wide effort to develop newer, stronger methods of encryption." It points out that though it was the default, there were multiple options in the Bsafe toolkit, with users able to select any that best suits their needs. It remained an option as it had been accepted as a NIST
standard and of its value in FIPS compliance, with NIST being relied upon when concerns about the algorithm surfaced in 2007. When NIST advised not to use the algorithm in September of this year, it "communicated that recommendation to customers and discussed the change openly in the media."
At the end of the post, RSA states that it never divulges information about its dealing with customers, and has "never entered into any contract or engaged in any project with the intention of weakening RSA's products, or introducing potential 'backdoors' into our products for anyone's use."
The post as a whole certainly attempts to distance RSA from the NSA and the surveillance scandal
, though considering the implications of the allegations, this will certainly have dented RSA's standings in the security industry.