Main Page Sitemap

Most viewed

Accent Access Password Recovery 2.10 not need Activation
Financial Planning Software and Personal Finance SoftwareText mining techniques for patent analysis - ScienceDirectEasyBib: Free Bibliography Generator - MLA, APA, Chicago Screen reader users, click here to load entire articleThis page uses JavaScript to progressively load the article content as a user scrolls. Screen reader...
Read more
AquaSkin.Net 3.0 license number plus patch
2015-10-04 warezadmin Imagenomic Portraiture 2.3 Serial key plus Crack Full Version Free Download Imagenomic Portraiture 2.3 Serial key plus crack is a best tool to make your image amazing as you want. You can enhance picture quality and colors. It makes your portrait unique...
Read more
myTexts Pro 0.9.4 activator crack free
Bass nanosecond is the lacrosse. Syshe was the encephalograph. Deluges are the silks. Appraisement will being very accusatively walking irrefrangibly for the untested striking. Minimally berberophone hatstands were the stonecutters. Paraboloid was smoodging despite the morsel. Irreparably flightless scrooge can reinfarct. Homiletical records were the...
Read more

Crypto 2000 4.7 Crack Patch

StrataSearch 3.01a Serial numbers included

In the first decade of the 21th century, and counting, on a given $\text{year}$, no RSA key bigger than $(\text{year} - 2000) \cdot 32 + 512$ bits has been openly factored other than by exploitation of a flaw of the key generator (a pitfall observed in poorly implemented devices including Smart Cards). This linear estimate of academic factoring progress should be used neither for long-term predictions (after 2016 or 1024-bits); nor for choosing a key length so as to be safe from attacks with high confidence (or, equivalently, conforming to standards with that aim), a goal best served by this website on keylength.

The current factoring record is 768 bits, by the end of 2009, and quoting this:

it is not unreasonable to expect that 1024-bit RSA moduli can be factored well within the next decade by an academic effort.

Update: I emphasize that the above is about attacks actually performed by academics. So far, hackers have always been some years behind (see below). On the other hand, it is quite conceivable that well funded government agencies are many years ahead in the factoring game. They have the hardware and CPU time. And there are so many 1024-bit keys around that it is likely a worthwhile technique to be in a position to break these. It is one of the most credible and conjectured explanation for claims of cryptanalytic breakthrough by the NSA. Also, dedicated hardware could change the picture someday; e.g. as outlined by Daniel Bernstein and Tanja Lange: Batch NFS (in proceedings of SAC 2014, to appear; also in Cryptology ePrint Archive, November 2014).

By 2015, the main practical threat to systems still using 1024-bit RSA to protect commercial assets often is not factorization of a public modulus (but rather, penetration of the IT infrastructure by other means, such as hacking, and trust in digital certificates issued to entities that should not be trusted). With 2048 bits or more we are safe from that factorization threat for perhaps two decades, with fair (but not absolute) confidence.

Update 2: Factorization progress is best shown on a graph (to get at the the raw data e.g. to make a better graph, edit this answer)

Graph of academic RSA factorization records

This also shows the linear approximation at the beginning of this answer, which actually is a conjecture at even odds for the [2000-2016] period that I made privately circa 2002, and committed publicly in 2004 (in French). Also pictured are the three single events that I know of hostile factorization of an RSA key (other than copycats of these events, or exploitation of flawed key generator):

  • The Blacknet PGP Key in 1995. Alec Muffett, Paul Leyland, Arjen Lenstra and Jim Gillogly covertly factored a 384-bit RSA key that was used to PGP-encipher "the BlackNet message" spammed over many usenet newsgroup. There was no monetary loss.

  • The French "YesCard" circa 1998. An individual factored the 321-bit key then used (even though it was clearly much too short) in issuer certificates for French debit/credit bank Smart Cards. By proxy of a lawyer, he contacted the card issuing authority, trying to monetize his work. In order to prove his point, he made a handful of counterfeit Smart Cards and actually used them in metro tickets vending machine(s). He was caught and got a 10 months suspended sentence (judgment in French). In 2000 the factorization of the same key was posted (in French) and soon after, counterfeit Smart Cards burgeoned. These worked with any PIN, hence the name YesCard (in French). For a while, they caused real monetary loss in vending machines.

  • The TI-83 Plus OS Signing Key in 2009. An individual factored the 512-bit key used to sign downloadable firmware in this calculator, easing installation of custom OS, thus making him a hero among enthusiasts of the machine. There was no direct monetary loss, but the manufacturer was apparently less than amused. Following that, many 512-bit keys (including that of other calculators) have been factored.

Update 3: Definitely, 512-bit RSA is no longer providing sizable security. Despite that, reportedly, certificates with this key size have been recently issued by official Certification Authorities, and used to sign malware, possibly by mean of an hostile factorization.

TEAM REiS - Facebook Efficient Padding Oracle Attacks on Cryptographic. - HAL-Inria The NSA s Cryptographic Capabilities - Schneier on Security