|
|
1024 Bit-RSA encryption cracked in 100 hours
|
|
|
|
Clinically Insane
Join Date: Jun 2001
Location: planning a comeback !
Status:
Offline
|
|
[W]e report on the first physical demonstration of a fault-based security attack of a complete microprocessor system running unmodified production software: we attack the original OpenSSL authentication library running on a SPARC Linux system implemented on FPGA, and extract the system’s 1024-bit RSA private key in approximately 100 hours.
http://www.eecs.umich.edu/~valeria/r.../DATE10RSA.pdf
That's some crazy shit.
Takes "brute force" to a whole other level.
-t
|
|
|
|
|
|
|
|
|
Administrator
Join Date: Jun 2000
Location: California
Status:
Offline
|
|
According to the copyright info inside the PDF, this dates to 2007. And no pictures of the hardware farm used in the attack.
|
|
|
|
|
|
|
|
|
Clinically Insane
Join Date: Dec 1999
Status:
Offline
|
|
Yeah, but given that the majority of PCs are infected with malware, I bet some less scrupulous person could have a botnet that cracks RSA keys in a matter of hours. Wouldn't surprise me if it already exists.
|
"…I contend that we are both atheists. I just believe in one fewer god than
you do. When you understand why you dismiss all the other possible gods,
you will understand why I dismiss yours." - Stephen F. Roberts
|
|
|
|
|
|
|
|
Clinically Insane
Join Date: Jun 2001
Location: planning a comeback !
Status:
Offline
|
|
Originally Posted by reader50
According to the copyright info inside the PDF, this dates to 2007.
Where do you see that ?
Must be a mistake, since they reference works as late as Aug 2008.
-t
|
|
|
|
|
|
|
|
|
Administrator
Join Date: Jun 2000
Location: California
Status:
Offline
|
|
Inside the PDF, call up the document info. In Preview, Command-I
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Forum Rules
|
|
|
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
|
HTML code is Off
|
|
|
|
|
|
|
|
|
|
|
|