• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

1024-bit encryption is 'compromised'

SpaceWalker

Senior member
I saw this over on Slashdot yesterday and it certainly has raised some interesting questions.

According to a security debate sparked off by cryptography expert Lucky Green on Bugtraq yesterday, 1,024-bit RSA encryption should be "considered compromised".

The Financial Cryptography conference earlier this month, which largely focused on a paper published by cryptographer Dan Bernstein last October detailing integer factoring methodologies, revealed "significant practical security implications impacting the overwhelming majority of deployed systems utilising RSA as the public key algorithm".

Based on Bernstein's proposed architecture, a panel of experts estimated that a 1,024-bit RSA factoring device can be built using only commercially available technology for a price range of several hundred million to $1bn.

And as for the prohibitively high price tag, Green warned that we should keep in mind that the National Reconnaissance Office regularly launches Signal Intelligence satellites costing close to $2bn each.

"Would the NSA have built a device at less than half the cost of one of its satellites to be able to decipher the interception data obtained via many such satellites? The NSA would have to be derelict of duty to not have done so," he said.

The machine proposed by Bernstein would be able to break a 1,024-bit key in seconds to minutes. But the security implications of the practical 'breakability' of such a key run far deeper.

None of the commonly deployed systems, such as HTTPS, SSH, IPSec, S/MIME and PGP, use keys stronger than 1,024-bit, and you would be hard pushed to find vendors offering support for any more than this.

What this means, according to Green, is that "an opponent capable of breaking all of the above will have access to virtually any corporate or private communications and services that are connected to the internet".

BUT (there always has to be a but!!!) a comment from well known cryptographer Bruce Schneier casts doubt on Bernstein's findings in practical application. "It will be years before anyone knows exactly whether, and how, this work will affect the actual factoring of practical numbers," he said.

http://slashdot.org/article.pl?sid=02/03/25/2125211

 
Read the cryptogram. It sheds a little light on this. But of course, we will have to wait until someone tries this out before we can tell if its true or not 😉
 
Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif

 
With some of these new laws being looked in to ( not being allowed to open up your case by LAW, or build your wn computer ) maybe the gov, is just going to outlaw everything over 2 GHZ 😀
 


<< Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif
>>



ROTFL!
 


<< Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif
>>



Got a billion dollars? Thats the estimated cost. Ill let someone else tackle this one, Im going out drinking.
 
I just got off the phone with Bill Gates and we are going to put this puppy together over the weekend. He is going to let me use it to crack for the TeAm when we are done compromising 1024 bit encryption 😉

He said something about new MS 4096 bit encryption powered by .net technology. Of course the bugs aren't worked out yet but we will worry about that after it's released 😉
 
Back
Top