Article 5X3TP Researcher uses 379-year-old algorithm to crack crypto keys found in the wild

Researcher uses 379-year-old algorithm to crack crypto keys found in the wild

by
Dan Goodin
from Ars Technica - All content on (#5X3TP)
crypto-key-800x450.jpeg

Enlarge (credit: Getty Images)

Cryptographic keys generated with older software now owned by technology company Rambus are weak enough to be broken instantly using commodity hardware, a researcher reported on Monday. This revelation is part of an investigation that also uncovered a handful of weak keys in the wild.

The software comes from a basic version of the SafeZone Crypto Libraries, which were developed by a company called Inside Secure and acquired by Rambus as part of its 2019 acquisition of Verimatrix, a Rambus representative said. That version was deprecated prior to the acquisition and is distinct from a FIPS-certified version that the company now sells under the Rambus FIPS Security Toolkit brand.

Mind your Ps and Qs

Researcher Hanno Bock said that the vulnerable SafeZone library doesn't sufficiently randomize the two prime numbers it used to generate RSA keys. (These keys can be used to secure Web traffic, shells, and other online connections.) Instead, after the SafeZone tool selects one prime number, it chooses a prime in close proximity as the second one needed to form the key.

Read 12 remaining paragraphs | Comments

index?i=j9oUQSpP8JE:nyA9RMnk6wE:V_sGLiPB index?i=j9oUQSpP8JE:nyA9RMnk6wE:F7zBnMyn index?d=qj6IDK7rITs index?d=yIl2AUoC8zA
External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments