Researchers broke RSA 1024-bit encryption

RSA 1024-bit – it is ; Ερευνητές ασφαλείας ανακάλυψαν μια κρίσιμη ευπάθεια στο GnuPG cryptographic library που τους επέτρεψε να σπάσουν κρυπτογράφηση RSA 1024 bit και να εξαγάγουν το μυστικό κλειδί RSA για να αποκρυπτογραφήσουν δεδομένα.

The Gnu Guard (GnuPG or GPG) is a popular open source encryption software used by many operating systems (Linux, FreeBSD, Windows and macOS X).RSA 1024-bit

Vulnerability, under the name CVE-2017-7526, is located in the Libgcrypt encryption library used by GnuPG.

It's the same software that the former NSA employee used Edward Snowden to encrypt his communications.

Η

A group of researchers from the Universities of Eindhoven, Illinois, Pennsylvania, Maryland, and Adelaide found that the "left-to-right sliding" method ” used by the libgcrypt library to perform the cryptography math leaks significantly more information than is needed, allowing the full recovery of the RSA key.

"In this work, we demonstrate a complete breakdown of RSA-1024 as applied to Libgcrypt. Our attack basically uses the fact that Libgcrypt uses the left-to-right method to calculate the sliding-window extension", Say the researchers in their paper.

The L3 Cache Side- Attack requires an attacker to run a "compromised" software on the hardware used by the RSA private key.

For more information read 'Sliding right into disaster: Left-to-right sliding windows leak,' (PDF) by Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Christine van Vredendaal, Tanja Lange, and Yuval Yarom.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).