Stories
Slash Boxes
Comments

SoylentNews is people

posted by mrpg on Saturday November 11 2017, @08:25PM   Printer-friendly
from the isn't-it-always dept.

Submitted via IRC for SoyCow1984

A crippling flaw affecting millions—and possibly hundreds of millions—of encryption keys used in some of the highest-stakes security settings is considerably easier to exploit than originally reported, cryptographers declared over the weekend. The assessment came as Estonia abruptly suspended 760,000 national ID cards used for voting, filing taxes, and encrypting sensitive documents.

The critical weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion. Hackers can then use the private key to impersonate key owners, decrypt sensitive data, sneak malicious code into digitally signed software, and bypass protections that prevent accessing or tampering with stolen PCs.

[...] One of the scenarios Bernstein and Lange presented in Sunday's post is that serious attackers can further reduce costs by buying dedicated computer gear, possibly equipped with GPU, field programmable gate array, and application-specific integrated circuit chips, which are often better suited for the types of mathematical operations used in factorization attacks. The estimates provided by the original researchers were based on the cost of renting equipment, which isn't as cost-effective when factorizing large numbers of keys. They also noted that compromising just 10 percent of cards used in country-wide voting might be enough to tip an election.

Source: Flaw crippling millions of crypto keys is worse than first disclosed


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by choose another one on Sunday November 12 2017, @09:40PM

    by choose another one (515) Subscriber Badge on Sunday November 12 2017, @09:40PM (#596001)

    Was it incompetence or by design?

    Why does it have to by "or", seriously ?

    Who built it and who reviewed it?

    The most dangerous type of idiot - one who has far too much confidence and no idea of the limits of his/her knowledge and capability.
    The type of idiot who hasn't read and understood a single basic article on the importance of random number generation in crypto yet thinks they are competent to implement shortcuts in crypto implementations to speed them up.

    The type of idiot who can convince themselves, and others, that they can calculate a significant saving in shoe leather from walking directly across the train tracks rather than up the steps to the bridge and down the other side, and is then surprised (very briefly) to get hit by a train.

    Where else could this have happened?

    Anywhere. Sadly. See https://xkcd.com/221/ [xkcd.com] - you think Randall doesn't get inspiration from real life?

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2