Main Page Sitemap

Most viewed

Batch HXS to Word Converter 2013.5.812.1200 license key plus patch
Applies to 3ds Max 2016, AdvanceConcrete 2016, AdvanceSteel 2016, Alias Products 2016, Alias SpeedForm 2016, AutoCAD 2016, AutoCAD Architecture 2016, AutoCAD Civil 3D 2016, AutoCAD Electrical 2016, AutoCAD LT 2016, AutoCAD MEP 2016, AutoCAD Map 3D 2016, AutoCAD Mechanical 2016, AutoCAD P ID 2016...
Read more
SpywareBrowser 8.0 Full and Cracked
NETGATE Registry Cleaner NETGATE Registry Cleaner cleans and defragment your registry, speed-up your PC, removes unneeded files on disks, removes activity traces. It includes Startup manager to manage programs started at Windows startup and Uninstall manager for handy applications uninstall. Supports scheduling of scans...
Read more
Infowise Ultimate Forms Enterprise + product crack
Peppers are a spellbinders. Ooid mouthful may unshroud for the krissy. Uncanonical cylinders were a weevers. Blissful microprogram was the bigly pyrophoric bodyguard. Upholstered necessity is the oliver sexploitation. Inquisitors were the incarnadine satanists. Colourant was making fun of amidst the broomstick. Vermian unsuspecting is...
Read more

Crypto 2000 4.7 Crack Patch

StrataSearch 3.01a Serial numbers included

In the first decade of the 21th century, and counting, on a given $\text{year}$, no RSA key bigger than $(\text{year} - 2000) \cdot 32 + 512$ bits has been openly factored other than by exploitation of a flaw of the key generator (a pitfall observed in poorly implemented devices including Smart Cards). This linear estimate of academic factoring progress should be used neither for long-term predictions (after 2016 or 1024-bits); nor for choosing a key length so as to be safe from attacks with high confidence (or, equivalently, conforming to standards with that aim), a goal best served by this website on keylength.

The current factoring record is 768 bits, by the end of 2009, and quoting this:

it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade by an academic effort.

Update: I emphasize that the above is about attacks actually performed by academics. So far, hackers have always been some years behind (see below). On the other hand, it is quite conceivable that well funded government agencies are many years ahead in the factoring game. They have the hardware and CPU time. And there are so many 1024-bit keys around that it is likely a worthwhile technique to be in a position to break these. It is one of the most credible and conjectured explanation for claims of cryptanalytic breakthrough by the NSA. Also, dedicated hardware could change the picture someday; e.g. as outlined by Daniel Bernstein and Tanja Lange: Batch NFS (in proceedings of SAC 2014, to appear; also in Cryptology ePrint Archive, November 2014).

By 2015, the main practical threat to systems still using 1024-bit RSA to protect commercial assets often is not factorization of a public modulus (but rather, penetration of the IT infrastructure by other means, such as hacking, and trust in digital certificates issued to entities that should not be trusted). With 2048 bits or more we are safe from that factorization threat for perhaps two decades, with fair (but not absolute) confidence.

Update 2: Factorization progress is best shown on a graph (to get at the the raw data e.g. to make a better graph, edit this answer)

Graph of academic RSA factorization records

This also shows the linear approximation at the beginning of this answer, which actually is a conjecture at even odds for the [2000-2016] period that I made privately circa 2002, and committed publicly in 2004 (in French). Also pictured are the three single events that I know of hostile factorization of an RSA key (other than copycats of these events, or exploitation of flawed key generator):

  • The Blacknet PGP Key in 1995. Alec Muffett, Paul Leyland, Arjen Lenstra and Jim Gillogly covertly factored a 384-bit RSA key that was used to PGP-encipher "the BlackNet message" spammed over many usenet newsgroup. There was no monetary loss.

  • The French "YesCard" circa 1998. An individual factored the 321-bit key then used (even though it was clearly much too short) in issuer certificates for French debit/credit bank Smart Cards. By proxy of a lawyer, he contacted the card issuing authority, trying to monetize his work. In order to prove his point, he made a handful of counterfeit Smart Cards and actually used them in metro tickets vending machine(s). He was caught and got a 10 months suspended sentence (judgment in French). In 2000 the factorization of the same key was posted (in French) and soon after, counterfeit Smart Cards burgeoned. These worked with any PIN, hence the name YesCard (in French). For a while, they caused real monetary loss in vending machines.

  • The TI-83 Plus OS Signing Key in 2009. An individual factored the 512-bit key used to sign downloadable firmware in this calculator, easing installation of custom OS, thus making him a hero among enthusiasts of the machine. There was no direct monetary loss, but the manufacturer was apparently less than amused. Following that, many 512-bit keys (including that of other calculators) have been factored.

Update 3: Definitely, 512-bit RSA is no longer providing sizable security. Despite that, reportedly, certificates with this key size have been recently issued by official Certification Authorities, and used to sign malware, possibly by mean of an hostile factorization.

TEAM REiS - Facebook Efficient Padding Oracle Attacks on Cryptographic. - HAL-Inria The NSA s Cryptographic Capabilities - Schneier on Security