Berkeley CSUA MOTD:Entry 54309
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/05/25 [General] UID:1000 Activity:popular
5/25    

2012/2/15-3/26 [Computer/Theory] UID:54309 Activity:nil
2/15    New problems found with RSA keys:
        http://preview.tinyurl.com/6ondkw6 [ars technica]
2025/05/25 [General] UID:1000 Activity:popular
5/25    

You may also be interested in these entries...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/1/24-3/3 [Computer/SW/Languages/C_Cplusplus, Computer/SW/Languages/Misc] UID:54296 Activity:nil
1/24    http://james-iry.blogspot.com/2009/05/brief-incomplete-and-mostly-wrong.html
        Amusing "history" of computer science.
        \_ Where's the mentioning of Al Gore the inventor of AlGorithm?
	...
2011/6/29-7/21 [Computer/SW/Database, Computer/SW] UID:54133 Activity:nil
6/29    "An Israeli algorithm sheds light on the Bible"
        http://www.csua.org/u/tq4 (news.yahoo.com)
        "Software developed by an Israeli team is giving intriguing new hints
        about what researchers believe to be the multiple hands that wrote the
        Bible."
        \_ "Hype developed by an American OnLine News Feed is giving
	...
2010/8/23-9/7 [Computer/Theory] UID:53933 Activity:nil
9/20    Why does everyone talk about Turing but  nobody talks much about
        Babbage?
        \_ arithmetic vs algorithms
	...
2010/8/9-19 [Computer/SW/Security] UID:53917 Activity:nil
8/9     I got two files, one is size 522190848 and the other is size
        521648128.  Both sha256 to the same number.  (and sha1 too).
        I don't think this is supposed to happen, right? (least not with
        sha256).
        \_ how are you checking?
           \_ I burned one file to cd, so i mounted /cdrom and
	...
2010/1/20-29 [Computer/SW/Languages/Misc, Computer/SW/Security] UID:53649 Activity:nil
1/20    Did Chinese come up with new way of quicksort?
        http://www.nytimes.com/2010/01/20/technology/20cyber.html
        Joe Stewart, a malware specialist with SecureWorks, a computer
        security company based in Atlanta, said he determined the main
        program used in the attack contained a module based on an unusu
        al algorithm from a Chinese technical paper that has been
	...
2009/10/24-11/3 [Computer/HW/Laptop] UID:53466 Activity:kinda low
10/24   How well do you see color? I got 8, how about you?
        http://www.xrite.com/custom_page.aspx?PageID=77
        \_ 7
           \_ what monitor did you use?
              \_ LCD on thinkpad x32, under not so great lighting conditions.
        \_ I scored 101, which seems impossible. Then again, I didn't
	...
2009/3/19-23 [Computer/HW/Drives] UID:52735 Activity:low
3/19    Pres. Obama's gift of DVDs doesn't even play in England
        http://www.telegraph.co.uk/news/newstopics/mandrake/5011941/Gordon-Brown-is-frustrated-by-Psycho-in-No-10.html
        \_ maybe it's a crypto-protest against region'd DVDs
	...
Cache (8192 bytes)
preview.tinyurl.com/6ondkw6 -> arstechnica.com/business/news/2012/02/crypto-shocker-four-of-every-1000-public-keys-provide-no-security.ars
Dan Goodin | Published February 15, 2012 6:00 AMLast updated February 15, 2012 12:54 PM Crypto shocker: four of every 1,000 public keys provide no security (updated) Keys that share one prime factor are vulnerable to cracking by anyone. Keys that share both prime factors can be broken by the other holder. An astonishing four out of every 1,000 public keys protecting webmail, online banking, and other sensitive online services provide no cryptographic security, a team of mathematicians has found. The research is the latest to reveal limitations in the tech used by more than a million Internet sites to prevent eavesdropping. paper (PDF) submitted to a cryptography conference in August, is based on the analysis of some 71 million 1024-bit RSA keys published online. By subjecting what's known as the "modulus" of each public key to an algorithm first postulated more than 2,000 years ago by the Greek mathematician Euclid, the researchers looked for underlying factors that were used more than once. Almost 27,000 of the keys they examined were cryptographically worthless because one of the factors used to generate them was used by at least one other key. "The fact is, if these numbers had the entropy that they were supposed to have, the probability of even one of these events happening in 7 million public keys would be vanishingly small," James P Hughes, an independent cryptographer who participated in the research, told Ars. similar finding, but they went on to say that only one of the weak public keys they analyzed was signed by a certificate authority trusted by major browsers. The remainder of the keys were used to secure routers and other embedded devices. More about this second report has been added to the end of this article. With its discovery in the mid-1970s by Ronald Rivest, Adi Shamir, and Leonard Adleman, RSA cryptography revolutionized secure messaging because it was among the first systems that made it possible for the key needed to decode ciphertext to be held only by the person receiving the private message. RSA is one of the public key cryptographic algorithms used to generate SSL certificates, which are used to encrypt visits to particular websites. For the system to work, however, the underlying RSA modulus must be the product of two very large prime numbers that are unique to each key. The revelation that such a large proportion of public keys were generated with a prime factor shared by one or more other keys means that such keys are trivial to break by anyone who can identify them. What's more, the percentage of keys known to be generated with non-unique factors is likely to grow as more keys are analyzed. The 038 percentage rate of faulty keys found when the researchers looked at 71 million total keys compares with a 026 percent rate in an earlier analysis that considered only 47 million RSA moduli. As a result, the true number of keys that could be broken using the technique may be higher than the current research reveals. A judgment call The researchers, led by Dutch mathematician Arjen Lenstra of cole Polytechnique Fdrale de Lausanne in Switzerland, said they are releasing their findings ahead of August's conference because they want to alert users of public key cryptography to the presence of so many weak moduli. While it took the team three years to complete the study, they believe it will take peers only a matter of weeks to follow their recipe. Their discovery raised concerns about how to responsibly disclose it without making it easy for others to forge tens of thousands of keys. org) or specified in valid affected certificates," they wrote. "Our decision to make our findings public, despite our inability to directly notify everyone involved, was a judgment call." SSL Observatory, which queries every IP address on the Internet for underlying public secure sockets layer certificates, supplied some of the data used in the research. Project leaders don't plan to publish that data until they've had more time to contact parties with weak keys. "We're currently working around the clock to get notifications to all of the parties that are affected by this," said Peter Eckersley, EFF's technology projects director. The researchers, however, haven't ruled out the possibility that the large body of weak keys are already known, possibly to nation states or other well organized groups. "The lack of sophistication of our methods and findings make it hard for us to believe that what we have presented is new, in particular to agencies and parties that are known for their curiosity in such matters," they wrote. Simplistic or not, the exact method for identifying the keys generated with non-unique factors isn't included in the research paper; neither is the list of affected certificates or key holders. Hughes, who is an independent cryptographer in Palo Alto, California, said the team found a computationally efficient way to flag the keys without having to individually compare each one against all the others. None of the weak keys they uncovered are used by certificate authorities to sign SSL credentials used by website operators to encrypt traffic and prove that their servers are authentic. If a so-called "signing key" was weak, all the certificates it signed would also be trivial to forge. Crypto problems The research is the latest to show the limitations of cryptographic systems that websites use to secure communications. compromise one of the 600 or so entities authorized to mint certificates that are trusted by Firefox and other standard browsers. Given the success and ease of that method, the techniques laid out in the research paper would likely not be an attacker's first choice of exploitation. It remains unclear exactly what is causing large clusters of keys to use duplicated factors. Hughes said that when generation is done correctly for a 1024-bit key, it should theoretically require the generation of 2^200 certificates before all possible factors are exhausted. Curiously, the problem of duplicate factors also marred 2048-bit keys, even though they should theoretically provide much more entropy. The researchers searched for similarities among the vulnerable keys for clues about what was causing random number generators to fail during the key generator process, but they were unable to make any determination. "Our only conclusion is that there is not just one cause for all of these problems," Hughes said. "This leads to our conclusion that unless you can totally trust your random number generator, RSA is not a good algorithm to choose." DSA aren't as vulnerable because the duplication of a factor makes a key holder vulnerable only to the person who holds the corresponding certificate. "If you have a collision, you only affect one other person. You can hurt them and they can hurt you, but you haven't made it public to everybody and their mother." Update Eric Wustrow, a second-year graduate student in the University of Michigan's Electrical Engineering and Computer Science department, told Ars that research he and other colleagues conducted used a different data set but arrived at similar aggregate findings. However, he said all but one weak key encountered were self-signed. blog post summarizing the results out of concern internet users may misinterpret some of the reports about the earlier paper. He added that the finding that most of weak keys they found were used to protect routers and similar gear suggests the underlying cause may stem from vendors. "Embedded devices have a history of problems in generating entropy for keys," he said. "We're seeing the same embedded devices from the same manufacturer generating the same primes." Meanwhile, Hughes, one of the co-writers of the original paper, says he remains convinced that the weak keys represent a threat to people using webmail and e-commerce. "I hate to say it but this does have implications for web-based commerce because people can mount man-in-the-middle attacks," he said. "People know, for instance, there have been man-in-the-middle attacks mounted against websites by foreign countries. Embedded systems matter to e-commerce because they're the infrastructure tha...