Discussion:
Ron was Wrong, Whit was Right
(too old to reply)
soja_a
2012-02-15 01:30:45 UTC
Permalink
0.2% failure rate found in the security of RSA keys:

http://eprint.iacr.org/2012/064.pdf



soja_a
soja_a
2012-02-15 04:57:57 UTC
Permalink
Some interesting commentary on the paper and its conclusions can be found here:

https://news.ycombinator.com/item?id=3591429



soja_a
Big Bad Bob
2012-02-15 07:44:23 UTC
Permalink
Post by soja_a
http://eprint.iacr.org/2012/064.pdf
interesting, yeah. I wouldn't call it "failure rate" though, since it
seems (from what I can tell) to be a case of "duplicate keys chosen" or
"commonly used prime factors". Ok that's still bad, so the entropy
process needs to be "more random". Sounds like 'time for an upgrade'.
Anonymous
2012-02-15 15:07:58 UTC
Permalink
On Tue, 14 Feb 2012 23:44:23 -0800, Big Bad Bob
Post by Big Bad Bob
Post by soja_a
http://eprint.iacr.org/2012/064.pdf
interesting, yeah. I wouldn't call it "failure rate" though, since it
seems (from what I can tell) to be a case of "duplicate keys chosen" or
"commonly used prime factors". Ok that's still bad, so the entropy
process needs to be "more random". Sounds like 'time for an upgrade'.
From the report:
"...may shed new light on NIST's 1991 decision to adopt DSA as
digital signature standard as opposed to RSA, back then a \public
controversy"

Replica
2012-02-15 11:03:50 UTC
Permalink
Poda's Meltdown contains Trojan / Virus!!!
It has been discovered that the unpopular Duke Nukem Online program Meltdown
has an inbuilt Backdoor Trojan. This is malicious software that has the
primary function of enabling a remote attacker to have access to or send
commands to a compromised computer. Meltdown opens a covert channel through
which a remote attacker can access and control a computer. The Trojan allows
almost any action to be carried out, thus allowing the remote attacker to
almost completely take over control of a computer. Beware!
Post by soja_a
http://eprint.iacr.org/2012/064.pdf
soja_a
Loading...