[LINK] public keys
Stephen Wilson
swilson at lockstep.com.au
Thu Feb 16 04:31:05 AEDT 2012
Fascinating in general, but I also picked up this bit of hypocritical
anti-hype:
"What surprised us most is that many thousands of 1024-bit RSA moduli ...
offer no security at all."
Security geeks take lay people (esp. sales & marketing) to task if they
ever suggest that such and such is prefectly secure. Nothing is ever
100% secure. But equally, very few things are 0% secure, as in the
phrase "no security at all".
Cheers,
Steve Wilson
Lockstep
http://lockstep.com.au/blog
On 16/02/2012 12:32 AM, stephen at melbpc.org.au wrote:
> <http://eprint.iacr.org/2012/064.pdf>
>
> Abstract
>
> "We performed a sanity check of public keys collected on the web.
>
> Our main goal was to test the validity of the assumption that
> different random choices are made each time keys are generated.
>
> We found that the vast majority of public keys work as intended.
>
> A more disconcerting finding is that two out of every one thousand
> RSA moduli that we collected offer no security.
>
> Our conclusion is that the validity of the assumption is
> questionable and that generating keys in the real world for
> "multiple-secrets" cryptosystems such as RSA is significantly riskier
> than for "single secret" ones such as ElGamal or (EC)DSA based on
> Die-Hellman ..."
>
> 5 Conclusion
>
> "We checked the computational properties of millions of public keys
> that we collected on the web. The majority does not seem to su
er
> from obvious weaknesses and can be expected to provide the expected
> level of security. We found that on the order of 0.003% of public
> keys is incorrect, which does not seem to be unacceptable.
>
> We were surprised, however, by the extent to which public keys are
> shared among unrelated parties. For ElGamal and DSA sharing is rare,
> but for RSA the frequency of sharing may be a cause for concern.
>
> What surprised us most is that many thousands of 1024-bit RSA
> moduli, including thousands that are contained in still valid X.509
> certificates, offer no security at all.
>
> This may indicate that proper seeding of random number generators is
> still a problematic issue (see also Appendix A).." --
>
> "Flaw Found in an Online Encryption Method"
>
> <http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw
> -in-an-online-encryption-method.html?_r=1&nl=todaysheadlines&emc=tha26>
>
>
>
Cheers,
> Stephen _______________________________________________ Link mailing
> list Link at mailman.anu.edu.au
> http://mailman.anu.edu.au/mailman/listinfo/link
>
>
More information about the Link
mailing list