1024-bit encryption is 'compromised'

SpaceWalker

Senior member
Oct 13, 1999
791
0
0
I saw this over on Slashdot yesterday and it certainly has raised some interesting questions.

According to a security debate sparked off by cryptography expert Lucky Green on Bugtraq yesterday, 1,024-bit RSA encryption should be "considered compromised".

The Financial Cryptography conference earlier this month, which largely focused on a paper published by cryptographer Dan Bernstein last October detailing integer factoring methodologies, revealed "significant practical security implications impacting the overwhelming majority of deployed systems utilising RSA as the public key algorithm".

Based on Bernstein's proposed architecture, a panel of experts estimated that a 1,024-bit RSA factoring device can be built using only commercially available technology for a price range of several hundred million to $1bn.

And as for the prohibitively high price tag, Green warned that we should keep in mind that the National Reconnaissance Office regularly launches Signal Intelligence satellites costing close to $2bn each.

"Would the NSA have built a device at less than half the cost of one of its satellites to be able to decipher the interception data obtained via many such satellites? The NSA would have to be derelict of duty to not have done so," he said.

The machine proposed by Bernstein would be able to break a 1,024-bit key in seconds to minutes. But the security implications of the practical 'breakability' of such a key run far deeper.

None of the commonly deployed systems, such as HTTPS, SSH, IPSec, S/MIME and PGP, use keys stronger than 1,024-bit, and you would be hard pushed to find vendors offering support for any more than this.

What this means, according to Green, is that "an opponent capable of breaking all of the above will have access to virtually any corporate or private communications and services that are connected to the internet".

BUT (there always has to be a but!!!) a comment from well known cryptographer Bruce Schneier casts doubt on Bernstein's findings in practical application. "It will be years before anyone knows exactly whether, and how, this work will affect the actual factoring of practical numbers," he said.

http://slashdot.org/article.pl?sid=02/03/25/2125211

 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Read the cryptogram. It sheds a little light on this. But of course, we will have to wait until someone tries this out before we can tell if its true or not ;)
 

networkman

Lifer
Apr 23, 2000
10,436
1
0
Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif

 

Evadman

Administrator Emeritus<br>Elite Member
Feb 18, 2001
30,990
5
81
With some of these new laws being looked in to ( not being allowed to open up your case by LAW, or build your wn computer ) maybe the gov, is just going to outlaw everything over 2 GHZ :D
 

m2kewl

Diamond Member
Oct 7, 2001
8,263
0
0


<< Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif
>>



ROTFL!
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0


<< Well, I don't have to work this weekend, so I'm game if someone wants to give me a hand! :Q
rolleye.gif
>>



Got a billion dollars? Thats the estimated cost. Ill let someone else tackle this one, Im going out drinking.
 

Crazee

Elite Member
Nov 20, 2001
5,736
0
76
I just got off the phone with Bill Gates and we are going to put this puppy together over the weekend. He is going to let me use it to crack for the TeAm when we are done compromising 1024 bit encryption ;)

He said something about new MS 4096 bit encryption powered by .net technology. Of course the bugs aren't worked out yet but we will worry about that after it's released ;)