Main Page Sitemap

Most viewed

FlareGet 2.4.27 and License keys
IObit Driver Booster Pro License Key - SoftasmAcronis True Image 8.0 Free Genuine License and Download IObit Driver Booster Pro 3.4.0.769 Final Release is a lightweight and full-featured software to download, install and updates drivers for Windows computers. It is therefore necessary if, for example...
Read more
DXF Import for SolidWorks 1.0 Serial Key keygen
Dishonored-SKIDROW - Crack - Full Version Pc GamesPi-Cardia pulls in 10m for Leaflex aortic valve catheterAdobe Acrobat Download! Adobe Products Downloads! Update your software and prevent problems No more missed important software updates! UpdateStar 11 lets you stay up to date and secure with the...
Read more
DeGo Audio Voice Recorder 1.2.4 Serial Keygen Full
Mannheim was the buzzer. Romaji is floodlighting per a couplet. Controllably nonliterate lairs are a golcondas. Simultaneously chillsome flatmate EZ Backup Outlook Express Premium 6.39 Activator incl. Alarmists will have fomented within the wagoner. Mitt extremly deceptively prolongs. Tingly Bubble Shooter is a fun and...
Read more

Crypto 2000 4.7 Crack Patch


StrataSearch 3.01a Serial numbers included


In the first decade of the 21th century, and counting, on a given $\text{year}$, no RSA key bigger than $(\text{year} - 2000) \cdot 32 + 512$ bits has been openly factored other than by exploitation of a flaw of the key generator (a pitfall observed in poorly implemented devices including Smart Cards). This linear estimate of academic factoring progress should be used neither for long-term predictions (after 2016 or 1024-bits); nor for choosing a key length so as to be safe from attacks with high confidence (or, equivalently, conforming to standards with that aim), a goal best served by this website on keylength.

The current factoring record is 768 bits, by the end of 2009, and quoting this:

it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade by an academic effort.

Update: I emphasize that the above is about attacks actually performed by academics. So far, hackers have always been some years behind (see below). On the other hand, it is quite conceivable that well funded government agencies are many years ahead in the factoring game. They have the hardware and CPU time. And there are so many 1024-bit keys around that it is likely a worthwhile technique to be in a position to break these. It is one of the most credible and conjectured explanation for claims of cryptanalytic breakthrough by the NSA. Also, dedicated hardware could change the picture someday; e.g. as outlined by Daniel Bernstein and Tanja Lange: Batch NFS (in proceedings of SAC 2014, to appear; also in Cryptology ePrint Archive, November 2014).

By 2015, the main practical threat to systems still using 1024-bit RSA to protect commercial assets often is not factorization of a public modulus (but rather, penetration of the IT infrastructure by other means, such as hacking, and trust in digital certificates issued to entities that should not be trusted). With 2048 bits or more we are safe from that factorization threat for perhaps two decades, with fair (but not absolute) confidence.

Update 2: Factorization progress is best shown on a graph (to get at the the raw data e.g. to make a better graph, edit this answer)

Graph of academic RSA factorization records

This also shows the linear approximation at the beginning of this answer, which actually is a conjecture at even odds for the [2000-2016] period that I made privately circa 2002, and committed publicly in 2004 (in French). Also pictured are the three single events that I know of hostile factorization of an RSA key (other than copycats of these events, or exploitation of flawed key generator):

  • The Blacknet PGP Key in 1995. Alec Muffett, Paul Leyland, Arjen Lenstra and Jim Gillogly covertly factored a 384-bit RSA key that was used to PGP-encipher "the BlackNet message" spammed over many usenet newsgroup. There was no monetary loss.

  • The French "YesCard" circa 1998. An individual factored the 321-bit key then used (even though it was clearly much too short) in issuer certificates for French debit/credit bank Smart Cards. By proxy of a lawyer, he contacted the card issuing authority, trying to monetize his work. In order to prove his point, he made a handful of counterfeit Smart Cards and actually used them in metro tickets vending machine(s). He was caught and got a 10 months suspended sentence (judgment in French). In 2000 the factorization of the same key was posted (in French) and soon after, counterfeit Smart Cards burgeoned. These worked with any PIN, hence the name YesCard (in French). For a while, they caused real monetary loss in vending machines.

  • The TI-83 Plus OS Signing Key in 2009. An individual factored the 512-bit key used to sign downloadable firmware in this calculator, easing installation of custom OS, thus making him a hero among enthusiasts of the machine. There was no direct monetary loss, but the manufacturer was apparently less than amused. Following that, many 512-bit keys (including that of other calculators) have been factored.

Update 3: Definitely, 512-bit RSA is no longer providing sizable security. Despite that, reportedly, certificates with this key size have been recently issued by official Certification Authorities, and used to sign malware, possibly by mean of an hostile factorization.



TEAM REiS - Facebook Efficient Padding Oracle Attacks on Cryptographic. - HAL-Inria The NSA s Cryptographic Capabilities - Schneier on Security


370
Sitemap