<s>
Dual_EC_DRBG	O
(	O
Dual	B-Algorithm
Elliptic	I-Algorithm
Curve	I-Algorithm
Deterministic	I-Algorithm
Random	I-Algorithm
Bit	I-Algorithm
Generator	I-Algorithm
)	O
is	O
an	O
algorithm	O
that	O
was	O
presented	O
as	O
a	O
cryptographically	B-Algorithm
secure	I-Algorithm
pseudorandom	I-Algorithm
number	I-Algorithm
generator	I-Algorithm
(	O
CSPRNG	B-Algorithm
)	O
using	O
methods	O
in	O
elliptic	O
curve	O
cryptography	O
.	O
</s>
<s>
Despite	O
wide	O
public	O
criticism	O
,	O
including	O
the	O
public	O
identification	O
of	O
a	O
backdoor	O
,	O
it	O
was	O
for	O
seven	O
years	O
one	O
of	O
four	O
CSPRNGs	B-Algorithm
standardized	O
in	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
as	O
originally	O
published	O
circa	O
June	O
2006	O
,	O
until	O
it	O
was	O
withdrawn	O
in	O
2014	O
.	O
</s>
<s>
In	O
December	O
2013	O
,	O
a	O
Reuters	O
news	O
article	O
alleged	O
that	O
in	O
2004	O
,	O
before	O
NIST	O
standardized	O
Dual_EC_DRBG	O
,	O
NSA	O
paid	O
RSA	O
Security	O
$10	O
million	O
in	O
a	O
secret	O
deal	O
to	O
use	O
Dual_EC_DRBG	O
as	O
the	O
default	O
in	O
the	O
RSA	B-Protocol
BSAFE	I-Protocol
cryptography	O
library	O
,	O
which	O
resulted	O
in	O
RSA	O
Security	O
becoming	O
the	O
most	O
important	O
distributor	O
of	O
the	O
insecure	O
algorithm	O
.	O
</s>
<s>
The	O
backdoor	O
would	O
allow	O
NSA	O
to	O
decrypt	O
for	O
example	O
SSL/TLS	B-Protocol
encryption	O
which	O
used	O
Dual_EC_DRBG	O
as	O
a	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
After	O
the	O
ANSI	O
X9.82	O
standardization	O
process	O
kicked	O
off	O
and	O
before	O
NIST	O
publication	O
According	O
to	O
John	O
Kelsey	O
(	O
who	O
was	O
listed	O
as	O
author	O
of	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
together	O
with	O
Elaine	O
Barker	O
)	O
,	O
the	O
possibility	O
of	O
the	O
backdoor	O
by	O
carefully	O
chosen	O
P	O
and	O
Q	O
values	O
was	O
brought	O
up	O
at	O
an	O
ANSI	O
X9.82	O
meeting	O
.	O
</s>
<s>
October	O
2003	O
Goh	O
,	O
Boneh	O
,	O
Pinkas	O
and	O
Golle	O
publish	O
a	O
research	O
paper	O
on	O
the	O
problem	O
of	O
adding	O
key	O
recovery	O
to	O
the	O
SSL/TLS	B-Protocol
and	O
SSH	O
protocols	O
.	O
</s>
<s>
They	O
state	O
"	O
The	O
government	O
can	O
convince	O
major	O
software	O
vendors	O
to	O
distribute	O
SSL/TLS	B-Protocol
or	O
SSH2	O
implementations	O
with	O
hidden	O
and	O
unfilterable	O
key	O
recovery	O
...	O
Users	O
will	O
not	O
notice	O
the	O
key	O
recovery	O
mechanism	O
because	O
the	O
scheme	O
is	O
hidden.	O
"	O
</s>
<s>
Sometime	O
in	O
2004	O
RSA	O
makes	O
Dual_EC_DRBG	O
the	O
default	O
CSPRNG	B-Algorithm
in	O
BSAFE	B-Protocol
.	O
</s>
<s>
The	O
patent	O
describes	O
the	O
working	O
of	O
an	O
elliptic	O
curve	O
CSPRNG	B-Algorithm
backdoor	O
identical	O
to	O
the	O
potential	O
backdoor	O
in	O
Dual_EC_DRBG	O
,	O
and	O
ways	O
to	O
neutralize	O
such	O
a	O
hidden	O
backdoor	O
by	O
choosing	O
alternative	O
curve	O
points	O
and	O
more	O
bit	O
truncation	O
in	O
the	O
output	O
function	O
.	O
</s>
<s>
December	O
2005	O
The	O
first	O
draft	O
of	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
is	O
released	O
to	O
the	O
public	O
,	O
includes	O
Dual_EC_DRBG	O
.	O
</s>
<s>
16	O
March	O
2006	O
Kristian	O
Gjøsteen	O
publishes	O
Comments	O
on	O
Dual-EC-DRBG/NIST	O
SP	O
800-90	O
,	O
Draft	O
December	O
2005	O
showing	O
that	O
part	O
of	O
Dual_EC_DRBG	O
is	O
"	O
not	O
cryptographically	O
sound	O
"	O
,	O
and	O
constructing	O
a	O
bit-predictor	O
with	O
an	O
advantage	O
of	O
0.0011	O
,	O
which	O
is	O
considered	O
unacceptable	O
for	O
a	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
Therefore	O
,	O
it	O
is	O
generally	O
preferable	O
for	O
Q	O
to	O
be	O
chosen	O
randomly	O
,	O
relative	O
to	O
P.	O
"	O
29	O
May	O
2006	O
Berry	O
Schoenmakers	O
and	O
Andrey	O
Sidorenko	O
publish	O
a	O
Cryptanalysis	O
of	O
the	O
Dual	O
Elliptic	O
Curve	O
Pseudorandom	O
Generator	O
,	O
showing	O
that	O
empirically	O
the	O
output	O
from	O
Dual_EC_DRBG	O
can	O
be	O
distinguished	O
from	O
random	O
bits	O
,	O
concluding	O
that	O
Dual_EC_DRBG	O
is	O
insecure	O
as	O
a	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
June	O
2006	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
is	O
published	O
,	O
includes	O
Dual_EC_DRBG	O
with	O
the	O
defects	O
pointed	O
out	O
by	O
Kristian	O
Gjøsteen	O
and	O
Berry	O
Schoenmakers	O
and	O
Andrey	O
Sidorenko	O
not	O
having	O
been	O
fixed	O
.	O
</s>
<s>
had	O
inserted	O
a	O
back	O
door	O
into	O
a	O
2006	O
standard	O
adopted	O
by	O
T	O
...	O
called	O
the	O
Dual	B-Algorithm
EC	I-Algorithm
DRBG	I-Algorithm
standard	O
"	O
,	O
confirming	O
that	O
NSA	O
carried	O
out	O
a	O
malicious	O
software	O
attack	O
.	O
</s>
<s>
19	O
September	O
2013	O
RSA	O
Security	O
advises	O
its	O
customers	O
to	O
stop	O
using	O
Dual_EC_DRBG	O
in	O
RSA	O
Security	O
's	O
BSAFE	B-Protocol
toolkit	I-Protocol
and	O
Data	O
Protection	O
Manager	O
,	O
citing	O
NIST	O
guidance	O
made	O
Sept	O
.	O
12	O
,	O
2013	O
that	O
indicated	O
:	O
"	O
NIST	O
strongly	O
recommends	O
that	O
,	O
pending	O
the	O
resolution	O
of	O
the	O
security	O
concerns	O
and	O
the	O
re-issuance	O
of	O
SP	B-Algorithm
800-90A	I-Algorithm
,	O
the	O
Dual_EC_DRBG	O
,	O
as	O
specified	O
in	O
the	O
January	O
2012	O
version	O
of	O
SP	B-Algorithm
800-90A	I-Algorithm
,	O
no	O
longer	O
be	O
used.	O
"	O
</s>
<s>
Initial	O
media	O
reports	O
cast	O
suspicion	O
over	O
RSA	O
's	O
continued	O
use	O
of	O
Dual_EC_DRBG	O
as	O
the	O
default	O
in	O
its	O
BSAFE	B-Protocol
and	O
Data	O
Protection	O
Manager	O
products	O
,	O
particularly	O
after	O
2007	O
in	O
light	O
of	O
previous	O
published	O
concerns	O
over	O
the	O
potential	O
for	O
a	O
backdoor	O
in	O
the	O
algorithm	O
.	O
</s>
<s>
18	O
December	O
2013	O
A	O
presidential	O
advisory	O
committee	O
set	O
up	O
to	O
examine	O
the	O
NSA	O
recommended	O
that	O
the	O
US	O
government	O
"	O
fully	O
support	O
and	O
not	O
undermine	O
efforts	O
to	O
create	O
encryption	O
standards	O
"	O
20	O
December	O
2013	O
Reuters	O
reports	O
on	O
the	O
existence	O
of	O
a	O
$10	O
million	O
deal	O
between	O
RSA	O
and	O
NSA	O
to	O
set	O
Dual_EC_DRBG	O
as	O
the	O
default	O
CSPRNG	B-Algorithm
in	O
BSAFE	B-Protocol
.	O
</s>
<s>
22	O
December	O
2013	O
RSA	O
Security	O
posts	O
statements	O
categorically	O
denying	O
that	O
it	O
"	O
entered	O
into	O
a	O
'	O
secret	O
contract	O
 '	O
with	O
the	O
NSA	O
to	O
incorporate	O
a	O
known	O
flawed	O
random	O
number	O
generator	O
into	O
its	O
BSAFE	B-Protocol
encryption	O
libraries	O
"	O
though	O
its	O
statements	O
do	O
not	O
deny	O
the	O
existence	O
of	O
a	O
$10	O
million	O
deal	O
between	O
RSA	O
and	O
the	O
NSA	O
to	O
set	O
Dual_EC_DRBG	O
as	O
the	O
standard	O
in	O
BSAFE	B-Protocol
.	O
</s>
<s>
25	O
February	O
2014	O
In	O
his	O
2014	O
RSA	O
Conference	O
keynote	O
speech	O
,	O
RSA	O
Security	O
Executive	O
Chairman	O
(	O
and	O
EMC	O
Executive	O
Vice	O
President	O
)	O
Art	O
Coviello	O
implied	O
that	O
RSA	O
Security	O
had	O
not	O
seen	O
merit	O
in	O
the	O
2006	O
and	O
2007	O
research	O
papers	O
that	O
pointed	O
out	O
flaws	O
in	O
Dual_EC_DRBG	O
until	O
NIST	O
issued	O
guidance	O
to	O
stop	O
using	O
the	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
January	O
2015	O
Michael	O
Wertheimer	O
,	O
director	O
of	O
research	O
at	O
the	O
NSA	O
,	O
wrote	O
"	O
With	O
hindsight	O
,	O
NSA	O
should	O
have	O
ceased	O
supporting	O
the	O
Dual	B-Algorithm
EC	I-Algorithm
DRBG	I-Algorithm
algorithm	O
immediately	O
after	O
security	O
researchers	O
discovered	O
the	O
potential	O
for	O
a	O
trapdoor	O
.	O
</s>
<s>
In	O
truth	O
,	O
I	O
can	O
think	O
of	O
no	O
better	O
way	O
to	O
describe	O
our	O
failure	O
to	O
drop	O
support	O
for	O
the	O
Dual	B-Algorithm
EC	I-Algorithm
DRBG	I-Algorithm
algorithm	O
as	O
anything	O
other	O
than	O
regrettable	O
.	O
</s>
<s>
The	O
stated	O
purpose	O
of	O
including	O
the	O
Dual_EC_DRBG	O
in	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
is	O
that	O
its	O
security	O
is	O
based	O
on	O
computational	O
hardness	O
assumptions	O
from	O
number	O
theory	O
.	O
</s>
<s>
But	O
the	O
exact	O
formulation	O
in	O
the	O
standard	O
was	O
written	O
such	O
that	O
use	O
of	O
the	O
alleged	O
backdoored	O
P	O
and	O
Q	O
was	O
required	O
for	O
FIPS	O
140-2	O
validation	O
,	O
so	O
the	O
OpenSSL	B-Language
project	O
chose	O
to	O
implement	O
the	O
backdoored	O
P	O
and	O
Q	O
,	O
even	O
though	O
they	O
were	O
aware	O
of	O
the	O
potential	O
backdoor	O
and	O
would	O
have	O
preferred	O
generating	O
their	O
own	O
secure	O
P	O
and	O
Q	O
.	O
</s>
<s>
Dual_EC_DRBG	O
was	O
quite	O
slow	O
compared	O
to	O
many	O
alternative	O
CSPRNGs	B-Algorithm
(	O
which	O
do	O
n't	O
have	O
security	O
reductions	O
)	O
,	O
but	O
Daniel	O
R.L.	O
</s>
<s>
Brown	O
works	O
for	O
Certicom	O
,	O
the	O
main	O
owner	O
of	O
elliptic	O
curve	O
cryptography	O
patents	O
,	O
so	O
there	O
may	O
be	O
a	O
conflict	O
of	O
interest	O
in	O
promoting	O
an	O
EC	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
The	O
alleged	O
NSA	O
backdoor	O
would	O
allow	O
the	O
attacker	O
to	O
determine	O
the	O
internal	O
state	O
of	O
the	O
random	O
number	O
generator	O
from	O
looking	O
at	O
the	O
output	O
from	O
a	O
single	O
round	O
(	O
32	O
bytes	O
)	O
;	O
all	O
future	O
output	O
of	O
the	O
random	O
number	O
generator	O
can	O
then	O
easily	O
be	O
calculated	O
,	O
until	O
the	O
CSPRNG	B-Algorithm
is	O
reseeded	O
with	O
an	O
external	O
source	O
of	O
randomness	O
.	O
</s>
<s>
This	O
makes	O
for	O
example	O
SSL/TLS	B-Protocol
vulnerable	O
,	O
since	O
the	O
setup	O
of	O
a	O
TLS	O
connection	O
includes	O
the	O
sending	O
of	O
a	O
randomly	O
generated	O
cryptographic	O
nonce	O
in	O
the	O
clear	O
.	O
</s>
<s>
According	O
to	O
John	O
Kelsey	O
(	O
who	O
together	O
with	O
Elaine	O
Barker	O
was	O
listed	O
as	O
author	O
of	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
)	O
,	O
the	O
possibility	O
of	O
the	O
backdoor	O
by	O
carefully	O
chosen	O
P	O
and	O
Q	O
was	O
brought	O
up	O
at	O
an	O
ANSI	O
X9F1	O
Tool	O
Standards	O
and	O
Guidelines	O
Group	O
meeting	O
.	O
</s>
<s>
According	O
to	O
John	O
Kelsey	O
,	O
the	O
option	O
in	O
the	O
standard	O
to	O
choose	O
a	O
verifiably	O
random	O
Q	O
was	O
added	O
as	O
an	O
option	O
in	O
response	O
to	O
the	O
suspected	O
backdoor	O
,	O
though	O
in	O
such	O
a	O
way	O
that	O
FIPS	O
140-2	O
validation	O
could	O
only	O
be	O
attained	O
by	O
using	O
the	O
possibly	O
backdoored	O
Q	O
.	O
Steve	O
Marquess	O
(	O
who	O
helped	O
implement	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
for	O
OpenSSL	B-Language
)	O
speculated	O
that	O
this	O
requirement	O
to	O
use	O
the	O
potentially	O
backdoored	O
points	O
could	O
be	O
evidence	O
of	O
NIST	O
complicity	O
.	O
</s>
<s>
The	O
low	O
truncation	O
was	O
in	O
2006	O
shown	O
by	O
Gjøsteen	O
to	O
make	O
the	O
RNG	O
predictable	O
and	O
therefore	O
unusable	O
as	O
a	O
CSPRNG	B-Algorithm
,	O
even	O
if	O
Q	O
had	O
not	O
been	O
chosen	O
to	O
contain	O
a	O
backdoor	O
.	O
</s>
<s>
In	O
2004	O
,	O
RSA	O
Security	O
made	O
an	O
implementation	O
of	O
Dual_EC_DRBG	O
which	O
contained	O
the	O
NSA	O
backdoor	O
the	O
default	O
CSPRNG	B-Algorithm
in	O
their	O
RSA	B-Protocol
BSAFE	I-Protocol
as	O
a	O
result	O
of	O
a	O
secret	O
$10	O
million	O
deal	O
with	O
NSA	O
.	O
</s>
<s>
In	O
2013	O
,	O
after	O
the	O
New	O
York	O
Times	O
reported	O
that	O
Dual_EC_DRBG	O
contained	O
a	O
backdoor	O
by	O
the	O
NSA	O
,	O
RSA	O
Security	O
said	O
they	O
had	O
not	O
been	O
aware	O
of	O
any	O
backdoor	O
when	O
they	O
made	O
the	O
deal	O
with	O
NSA	O
,	O
and	O
told	O
their	O
customers	O
to	O
switch	O
CSPRNG	B-Algorithm
.	O
</s>
<s>
A	O
draft	O
of	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
including	O
the	O
Dual_EC_DRBG	O
was	O
published	O
in	O
December	O
2005	O
.	O
</s>
<s>
The	O
final	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
including	O
Dual_EC_DRBG	O
was	O
published	O
in	O
June	O
2006	O
.	O
</s>
<s>
The	O
early	O
usage	O
of	O
Dual_EC_DRBG	O
by	O
RSA	O
Security	O
(	O
for	O
which	O
NSA	O
was	O
later	O
reported	O
to	O
have	O
secretly	O
paid	O
$10	O
million	O
)	O
was	O
cited	O
by	O
the	O
NSA	O
as	O
an	O
argument	O
for	O
Dual_EC_DRBG	O
's	O
acceptance	O
into	O
the	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
standard	O
.	O
</s>
<s>
Schneier	O
was	O
apparently	O
unaware	O
that	O
RSA	O
Security	O
had	O
used	O
Dual_EC_DRBG	O
as	O
the	O
default	O
in	O
BSAFE	B-Protocol
since	O
2004	O
.	O
</s>
<s>
OpenSSL	B-Language
implemented	O
all	O
of	O
NIST	B-Algorithm
SP	I-Algorithm
800-90A	I-Algorithm
including	O
Dual_EC_DRBG	O
at	O
the	O
request	O
of	O
a	O
client	O
.	O
</s>
<s>
The	O
OpenSSL	B-Language
developers	O
were	O
aware	O
of	O
the	O
potential	O
backdoor	O
because	O
of	O
Shumow	O
and	O
Ferguson	O
's	O
presentation	O
,	O
and	O
wanted	O
to	O
use	O
the	O
method	O
included	O
in	O
the	O
standard	O
to	O
choose	O
a	O
guarantied	O
non-backdoored	O
P	O
and	O
Q	O
,	O
but	O
was	O
told	O
that	O
to	O
get	O
FIPS	O
140-2	O
validation	O
they	O
would	O
have	O
to	O
use	O
the	O
default	O
P	O
and	O
Q	O
.	O
OpenSSL	B-Language
chose	O
to	O
implement	O
Dual_EC_DRBG	O
despite	O
its	O
dubious	O
reputation	O
for	O
completeness	O
,	O
noting	O
that	O
OpenSSL	B-Language
tried	O
to	O
be	O
complete	O
and	O
implements	O
many	O
other	O
insecure	O
algorithms	O
.	O
</s>
<s>
OpenSSL	B-Language
did	O
not	O
use	O
Dual_EC_DRBG	O
as	O
the	O
default	O
CSPRNG	B-Algorithm
,	O
and	O
it	O
was	O
discovered	O
in	O
2013	O
that	O
a	O
bug	O
made	O
the	O
OpenSSL	B-Language
implementation	O
of	O
Dual_EC_DRBG	O
non-functioning	O
,	O
meaning	O
that	O
no	O
one	O
could	O
have	O
been	O
using	O
it	O
.	O
</s>
<s>
Bruce	O
Schneier	O
reported	O
in	O
December	O
2007	O
that	O
Microsoft	O
added	O
Dual_EC_DRBG	O
support	O
to	O
Windows	B-Application
Vista	I-Application
,	O
though	O
not	O
enabled	O
by	O
default	O
,	O
and	O
Schneier	O
warned	O
against	O
the	O
known	O
potential	O
backdoor	O
.	O
</s>
<s>
On	O
September	O
9	O
,	O
2013	O
,	O
following	O
the	O
Snowden	O
leak	O
,	O
and	O
the	O
New	O
York	O
Times	O
report	O
on	O
the	O
backdoor	O
in	O
Dual_EC_DRBG	O
,	O
the	O
National	O
Institute	O
of	O
Standards	O
and	O
Technology	O
(	O
NIST	O
)	O
ITL	O
announced	O
that	O
in	O
light	O
of	O
community	O
security	O
concerns	O
,	O
it	O
was	O
reissuing	O
SP	B-Algorithm
800-90A	I-Algorithm
as	O
draft	O
standard	O
,	O
and	O
re-opening	O
SP800-90B/C	O
for	O
public	O
comment	O
.	O
</s>
<s>
NIST	O
now	O
"	O
strongly	O
recommends	O
"	O
against	O
the	O
use	O
of	O
Dual_EC_DRBG	O
,	O
as	O
specified	O
in	O
the	O
January	O
2012	O
version	O
of	O
SP	B-Algorithm
800-90A	I-Algorithm
.	O
</s>
<s>
RSA	O
Security	O
had	O
kept	O
Dual_EC_DRBG	O
as	O
the	O
default	O
CSPRNG	B-Algorithm
in	O
BSAFE	B-Protocol
even	O
after	O
the	O
wider	O
cryptographic	O
community	O
became	O
aware	O
of	O
the	O
potential	O
backdoor	O
in	O
2007	O
,	O
but	O
there	O
does	O
not	O
seem	O
to	O
have	O
been	O
a	O
general	O
awareness	O
of	O
BSAFE	B-Protocol
's	O
usage	O
of	O
Dual_EC_DRBG	O
as	O
a	O
user	O
option	O
in	O
the	O
community	O
.	O
</s>
<s>
Only	O
after	O
widespread	O
concern	O
about	O
the	O
backdoor	O
was	O
there	O
an	O
effort	O
to	O
find	O
software	O
which	O
used	O
Dual_EC_DRBG	O
,	O
of	O
which	O
BSAFE	B-Protocol
was	O
by	O
far	O
the	O
most	O
prominent	O
found	O
.	O
</s>
<s>
After	O
the	O
2013	O
revelations	O
,	O
RSA	O
security	O
Chief	O
of	O
Technology	O
Sam	O
Curry	O
provided	O
Ars	O
Technica	O
with	O
a	O
rationale	O
for	O
originally	O
choosing	O
the	O
flawed	O
Dual	B-Algorithm
EC	I-Algorithm
DRBG	I-Algorithm
standard	O
as	O
default	O
over	O
the	O
alternative	O
random	O
number	O
generators	O
.	O
</s>
<s>
At	O
least	O
RSA	O
Security	O
(	O
BSAFE	B-Protocol
library	O
)	O
,	O
OpenSSL	B-Language
,	O
Microsoft	O
,	O
and	O
Cisco	O
have	O
libraries	O
which	O
included	O
Dual_EC_DRBG	O
,	O
but	O
only	O
BSAFE	B-Protocol
used	O
it	O
by	O
default	O
.	O
</s>
<s>
According	O
to	O
the	O
Reuters	O
article	O
which	O
revealed	O
the	O
secret	O
$10	O
million	O
deal	O
between	O
RSA	O
Security	O
and	O
NSA	O
,	O
RSA	O
Security	O
's	O
BSAFE	B-Protocol
was	O
the	O
most	O
important	O
distributor	O
of	O
the	O
algorithm	O
.	O
</s>
<s>
There	O
was	O
a	O
flaw	O
in	O
OpenSSL	B-Language
's	O
implementation	O
of	O
Dual_EC_DRBG	O
that	O
made	O
it	O
non-working	O
outside	O
test	O
mode	O
,	O
from	O
which	O
OpenSSL	B-Language
's	O
Steve	O
Marquess	O
concludes	O
that	O
nobody	O
used	O
OpenSSL	B-Language
's	O
Dual_EC_DRBG	O
implementation	O
.	O
</s>
<s>
A	O
list	O
of	O
products	O
which	O
have	O
had	O
their	O
CSPRNG-implementation	O
FIPS	O
140-2	O
validated	O
is	O
available	O
at	O
the	O
NIST	O
.	O
</s>
<s>
The	O
validated	O
CSPRNGs	B-Algorithm
are	O
listed	O
in	O
the	O
Description/Notes	O
field	O
.	O
</s>
<s>
The	O
BlackBerry	B-Operating_System
software	O
is	O
an	O
example	O
of	O
non-default	O
use	O
.	O
</s>
<s>
BlackBerry	B-Operating_System
Ltd	O
has	O
however	O
not	O
issued	O
an	O
advisory	O
to	O
any	O
of	O
its	O
customers	O
who	O
may	O
have	O
used	O
it	O
,	O
because	O
they	O
do	O
not	O
consider	O
the	O
probable	O
backdoor	O
a	O
vulnerability	O
.	O
</s>
<s>
Jeffrey	O
Carr	O
quotes	O
a	O
letter	O
from	O
Blackberry	B-Operating_System
:	O
</s>
<s>
The	O
Dual	B-Algorithm
EC	I-Algorithm
DRBG	I-Algorithm
algorithm	O
is	O
only	O
available	O
to	O
third	O
party	O
developers	O
via	O
the	O
Cryptographic	O
APIs	O
on	O
the	O
 [ Blackberry ] 	O
platform	O
.	O
</s>
<s>
Bruce	O
Schneier	O
has	O
pointed	O
out	O
that	O
even	O
if	O
not	O
enabled	O
by	O
default	O
,	O
having	O
a	O
backdoored	O
CSPRNG	B-Algorithm
implemented	O
as	O
an	O
option	O
can	O
make	O
it	O
easier	O
for	O
NSA	O
to	O
spy	O
on	O
targets	O
which	O
have	O
a	O
software-controlled	O
command-line	O
switch	O
to	O
select	O
the	O
encryption	O
algorithm	O
,	O
or	O
a	O
"	O
registry	B-Protocol
"	O
system	O
,	O
like	O
most	O
Microsoft	O
products	O
,	O
such	O
as	O
Windows	B-Application
Vista	I-Application
:	O
</s>
