| [Alb-Net home] | [AMCC] | [KCC] | [other mailing lists] |
List: NYC-L[NYC-L] Fwd: [Fwd: 1024-bit RSA keys in danger of compromise] (fwd)Jeton Ademaj jeton at hotmail.comSat Mar 30 13:07:27 EST 2002
hi all, this is from a friend who's a tech consultant. a bit off-topic, but i figure some of u would wanna be informed, so... >Lucky Green wrote: > > > As those of you who have discussed RSA keys size requirements with me > > over the years will attest to, I always held that 1024-bit RSA keys > > could not be factored by anyone, including the NSA, unless the opponent > > had devised novel improvements to the theory of factoring large > > composites unknown in the open literature. I considered this to be > > possible, but highly unlikely. In short, I believed that users' desires > > for keys larger than 1024-bits were mostly driven by a vague feeling > > that "larger must be better" in some cases, and by downright paranoia in > > other cases. I was mistaken. > > > > Based upon requests voiced by a number of attendees to this year's > > Financial Cryptography conference <http:/www.fc02.ai>, I assembled and > > moderated a panel titled "RSA Factoring: Do We Need Larger Keys?". The > > panel explored the implications of Bernstein's widely discussed > > "Circuits for Integer Factorization: a Proposal". > > http://cr.yp.to/papers.html#nfscircuit > > > > Although the full implications of the proposal were not necessarily > > immediately apparent in the first few days following Bernstein's > > publication, the incremental improvements to parts of NFS outlined in > > the proposal turn out to carry significant practical security > > implications impacting the overwhelming majority of deployed systems > > utilizing RSA or DH as the public key algorithms. > > > > Coincidentally, the day before the panel, Nicko van Someren announced at > > the FC02 rump session that his team had built software which can factor > > 512-bit RSA keys in 6 weeks using only hardware they already had in the > > office. > > > > A very interesting result, indeed. (While 512-bit keys had been broken > > before, the feasibility of factoring 512-bit keys on just the computers > > sitting around an office was news at least to me). > > > > The panel, consisting of Ian Goldberg and Nicko van Someren, put forth > > the following rough first estimates: > > > > While the interconnections required by Bernstein's proposed architecture > > add a non-trivial level of complexity, as Bruce Schneier correctly > > pointed out in his latest CRYPTOGRAM newsletter, a 1024-bit RSA > > factoring device can likely be built using only commercially available > > technology for a price range of several hundred million dollars to about > > 1 billion dollars. Costs may well drop lower if one has the use of a > > chip fab. It is a matter of public record that the NSA as well as the > > Chinese, Russian, French, and many other intelligence agencies all > > operate their own fabs. > > > > Some may consider a price tag potentially reaching $1B prohibitive. One > > should keep in mind that the NRO regularly launches SIGINT satellites > > costing close to $2B each. Would the NSA have built a device at less > > than half the cost of one of their satellites to be able to decipher the > > interception data obtained via many such satellites? The NSA would have > > to be derelict of duty to not have done so. > > > > Bernstein's machine, once built, will have power requirements in the MW > > to operate, but in return will be able to break a 1024-bit RSA or DH key > > in seconds to minutes. Even under the most optimistic estimates for > > present-day PKI adoption, the inescapable conclusion is that the NSA, > > its major foreign intelligence counterparts, and any foreign commercial > > competitors provided with commercial intelligence by their national > > intelligence services have the ability to break on demand any and all > > 1024-bit public keys. > > > > The security implications of a practical breakability of 1024-bit RSA > > and DH keys are staggering, since of the following systems as currently > > deployed tend to utilize keys larger than 1024-bits: > > > > - HTTPS > > - SSH > > - IPSec > > - S/MIME > > - PGP > > > > An opponent capable of breaking all of the above will have access to > > virtually any corporate or private communications and services that are > > connected to the Internet. > > > > The most sensible recommendation in response to these findings at this > > time is to upgraded your security infrastructure to utilize 2048-bit > > user keys at the next convenient opportunity. Certificate Authorities > > may wish to investigate larger keys as appropriate. Some CA's, such as > > those used to protect digital satellite content in Europe, have already > > moved to 4096-bit root keys. > > > > Undoubtedly, many vendors and their captive security consultants will > > rush to publish countless "reasons" why nobody is able to build such a > > device, would ever want to build such a device, could never obtain a > > sufficient number of chips for such a device, or simply should use that > > vendor's "unbreakable virtual onetime pad" technology instead. > > > > While the latter doesn't warrant comment, one question to ask > > spokespersons pitching the former is "what key size is the majority of > > your customers using with your security product"? Having worked in this > > industry for over a decade, I can state without qualification that > > anybody other than perhaps some of the HSM vendors would be misinformed > > if they claimed that the majority - or even a sizable minority - of > > their customers have deployed key sizes larger than 1024-bits through > > their organization. Which is not surprising, since many vendor offerings > > fail to support larger keys. > > > > In light of the above, I reluctantly revoked all my personal 1024-bit > > PGP keys and the large web-of-trust that these keys have acquired over > > time. The keys should be considered compromised. The revoked keys and my > > new keys are attached below. > > > > --Lucky Green > > > _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com
More information about the NYC-L mailing list |