mersenneforum.org  

Go Back   mersenneforum.org > Fun Stuff > Lounge

Reply
 
Thread Tools
Old 2015-03-17, 16:40   #1
Mini-Geek
Account Deleted
 
Mini-Geek's Avatar
 
"Tim Sorbera"
Aug 2006
San Antonio, TX USA

17·251 Posts
Default factoring 90 512-bit RSA Keys in 3 minutes

http://www.itworld.com/article/28977...000-times.html

The state of real-world security revealed by that is appalling. But what caught my attention is this:
Quote:
In under three minutes, they successfully factored 90 of the public keys, which correspond to 294 hosts.
I know that 512-bit keys can be factored with relative ease, but this obviously isn't by GNFS. Upon reading the paper behind the article, I found how they did it: by running a gcd on the public keys they found. The generator(s) behind these keys used some of the same primes in generating different keys. The worst part is that these problems of key and prime reuse don't get any better by upgrading from 512-bit to 1024/2048-bit keys.

Last fiddled with by Mini-Geek on 2015-03-17 at 16:42
Mini-Geek is offline   Reply With Quote
Old 2015-03-17, 17:27   #2
R.D. Silverman
 
R.D. Silverman's Avatar
 
Nov 2003

22×5×373 Posts
Default

Quote:
Originally Posted by Mini-Geek View Post
http://www.itworld.com/article/28977...000-times.html

The state of real-world security revealed by that is appalling. But what caught my attention is this:

I know that 512-bit keys can be factored with relative ease, but this obviously isn't by GNFS. Upon reading the paper behind the article, I found how they did it: by running a gcd on the public keys they found. The generator(s) behind these keys used some of the same primes in generating different keys. The worst part is that these problems of key and prime reuse don't get any better by upgrading from 512-bit to 1024/2048-bit keys.
Yep!!! They used a brain dead key generation method. They failed to write code that conforms to
established standards (such as NSA Suite B, FIPS-140, IEEE1363, ISO9796) for their random number generation
and prime generation. These standards exist for a REASON.
R.D. Silverman is offline   Reply With Quote
Reply

Thread Tools


Similar Threads
Thread Thread Starter Forum Replies Last Post
openssl weak keys Unregistered Information & Answers 1 2011-10-07 22:14
Asymetric keys JohnFullspeed Factoring 3 2011-07-23 12:24
Factoring RSA Keys Romulas Factoring 35 2010-07-15 02:42
Assignment keys NBtarheel_33 PrimeNet 17 2010-02-18 04:38
Where I find the best program to it factor keys? I use AMD. chrow Factoring 5 2004-02-19 10:15

All times are UTC. The time now is 01:41.

Mon May 17 01:41:42 UTC 2021 up 38 days, 20:22, 0 users, load averages: 3.11, 2.83, 2.42

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.