Background: 

Last week in Vegas, there was a new vendor on the expo floor at Black Hat. Not that unusual, but this one in particular stood out. They were offering some sort of next generation cryptography, and after some fairly lengthy discussions with their folks in the booth, I walked away feeling like something wasn’t quite right here. 

I went to their launch party on Wednesday night to learn more, and also attended a presentation the next day by their founder, Robert Grant. That presentation culminated with a well-respected cryptography expert, Dan Guido, standing up and shouting at Robert, calling him a fraud, and being ejected from the talk. Many of us left the room at the same time. 

Now, I don’t typically condone shouting at presenters, but I do understand Dan’s frustrations. The presentation was more style than substance, imho, and numerous bold claims were made without any convincing evidence or proof. I’ll get into that shortly.

It has also come to my attention that after Dan and the rest of us left, Robert Grant finished his talk by saying something along the lines that when you invent something that challenges the status quo, people are going to attack you, and those are usually not the people who build things. While that may be generally true, and I do understand the instinct to defend oneself after a public outburst, that is kind of a bold statement to make on the floor of Black Hat, especially considering that many of those who are skeptical are the ones who helped build the security industry in the first place.

And yes, I am aware that this was a paid talk, not something that passed the Black Hat review board. But I think that’s all the more reason to reflect and critique what we saw, as a community. 

A little context:

Now that I’ve had some time to unwind from Vegas and reflect on all this, I’d like to offer some thoughts. I don’t make it a regular practice of publicly critiquing vendors, but this one is a bit of a special case.

I also wouldn’t normally lead with my bio, but lest this gets dismissed by people on the Crown Sterling side who claim I’m poking holes without being someone who builds things, please indulge me for a second while I point out some things that give me a bit of credibility on this topic:

All that said, I do know my limitations. I’m far more of a consumer of cryptography products than a creator or breaker of them (though I have in fact written some crypto code before), and I’ll be the first one to admit that I’m not a professional cryptographer or mathematician. So I’ll leave the nitpicking of the math and low level crypto details to my good friends in the field who focus their full-time energy on that. 

But I have been an Infosec consultant and trainer for over 20 years, and I do understand how the stuff I’ve used and deployed works. With that in mind, Robert’s presentation left me with lots of questions. To keep this as brief as possible, there are two primary claims that Crown Sterling made that I’d like to comment on here:

So let’s dive into each one of these a little bit further.

Claim #1: Crown Sterling has broken factor-based encryption

The first claim is based on Robert Grant’s assertion that he has discovered a novel way to generate infinite prime numbers. Much words were expended in an attempt to convince us of this, and he claims to have approached the problem from a brand new angle. "New math”, “quasi-primes”, a link to musical scales, and the significance of the number 24 were all concepts that were discussed during the talk and by Crown Sterling in their booth. 

But what Robert didn’t get into were the details of how they claim to have cracked RSA keys, and the details that were shared did not exactly inspire confidence. According to Robert, all factor-based encryption would fall to his methods, including RSA, Elliptical Curve Cryptography (ECC) and SHA-3 (his words, not mine). Trouble is, ECC is not factor-based at all (that’s kind of the point of it), and SHA-3 isn’t even an encryption algorithm, it’s a cryptographic hash. Robert was very clear in the presentation that this affects factor-based encryption algorithms only, so 2 of the 3 algorithms that were identified by him clearly won’t be broken by these methods. Perhaps an oversight, but basic errors like that aren’t exactly confidence-inspiring. 

In addition to that, the one algorithm that does apply here (RSA) hasn’t actually been convincingly demonstrated to have been broken. As proof, the company has claimed that they can factor a 512 bit number, and Robert has issued challenges to several people on twitter in this regard. Robert claims that he’s withholding demonstrations of stronger keys in order to be responsible, so we are essentially being asked to just trust him on this.

But there are some major problems here. One, nobody uses 512 bit keys in the real world, and larger key sizes than that have been cracked many years ago. Also, the strength of RSA rises exponentially with increased key size, so even if they have a way to efficiently crack 512 bit keys, it means literally nothing if they can’t demonstrate an ability to scale that up to production-strength keys.

However, no algorithm was presented and no real proof offered to link the claimed prime number generation mechanism from the presentation with a way to actually break factor-based encryption algorithms. That was the leap of faith we were being asked to make, and that was precisely where this presentation fell flat for me. There was hyperbole, and stories of friends choking on sandwiches and needing the Heimlich maneuver performed - twice! - upon hearing of this new breakthrough, but no real details. It made for an entertaining presentation, but no real proof. 

For what it’s worth, here are some important questions I would ask of anyone claiming to have broken RSA:

Aside from being willing to challenge people on twitter to see who can factor 512 bit numbers the fastest, these critical questions have so far been left unanswered. 

This is a key gap because if RSA has not, in fact, fallen, then there’s little point in replacing it, now is there? Crown Sterling's entire pitch is predicated on this very point.

Claim #2: Crown Sterling has invented a replacement encryption algorithm

The second claim is that Robert invented a replacement algorithm over the Christmas break to replace what they have supposedly broken. Here, we were left with scant details other than bizarre-sounding hyperbole. Claims of merging the past and the future using electrons and positrons, quantum cryptography on non-quantum computers, using musical scales to generate uncrackable keys, and a hint towards some sort of biometric as well. But no real details of how this is actually meant to work as far as I could tell. 

So, a few thoughts here:

Summary, and a personal note to Robert Grant and Crown Sterling

You showed up at one of the most prestigious security conferences in the world, and you made some extraordinary claims. If you left confused as to the reaction you got, consider that you did the functional equivalent of showing up at an aerospace conference, claiming that you had found unquestionable proof of malevolent aliens, that you couldn’t share the proof for fear of panicking the public, but that you had spent a few weeks over the Christmas break developing an anti-evil alien ray to defend yourself from them that everyone needs to buy. 

Extraordinary claims require extraordinary evidence. That’s just how this works. And at top security conferences, if you make extraordinary claims, without proof, people will call you out for it, and as you discovered, some of them aren’t going to be so nice about it. 

If you have in fact done what you say, it's amazing and game-changing, and I mean that sincerely. Prove it, and you’ll not only be remembered as a security innovator, but you’ll be remembered throughout history for your mathematical achievement. But you need to do better next time. Less hyperbole, more evidence, more proof. Don’t forget, many of us at this show are the people who the Fortune 500 companies trust to make recommendations on security, including on things like cryptography. If you can’t convince us, you’re going to have a hard time convincing those who rely on us for recommendations.

I know you’re new to this industry, so here’s something else you should probably know about us. Many of us do this not just for the money, but because we are genuinely passionate about keeping the Internet secure and safe. It’s not just financial transactions that are protected by cryptography, but people’s lives. This stuff is no joke, and we tend to be additionally skeptical of things like cryptography when life and liberty may be on the line. And if we think someone is trying to push an unproven, potentially insecure product into the market by trying to fool people with smoke and mirrors, we will dig in further and we won’t easily or quietly go away.  

When pressed, you expressed a potential willingness to release things for peer review, which is great, but this is where you needed to start. It’s not too late. Prove your claims that you have broken RSA, and release your crypto algorithms for peer review, and we, as an industry, can have a much more productive conversation about this.

Cryptography is a process as much as it is a product, and RSA will eventually fall, just like all cryptography eventually does. If you want to be among the players who get the opportunity to replace it when it does, you need to follow the same process as everyone else, or the serious crypto people simply won’t take you seriously. I sincerely hope that this has been constructive feedback, and I am eager to see how you proceed.

Comments to those who will ask why spend time on this

Some people have already asked things like “Why waste time on this? Let the market figure it out.“ It’s a fair question. Others may have different reasons, but here are some of mine:

Now, of course, IF this all turns out to be true, it’s amazing and game-changing, and Crown Sterling will probably become a household name. But findings such as these need to be presented in a way that people will actually trust. If Crown Sterling wants to try again, with more convincing evidence, more details, and a proof of concept of production-strength RSA keys being cracked, I’m open to hearing about it. 

But if they simply proceed to the next conference without changing their approach, they should expect at least as much pushback as they got here, and probably more.