On Feb 14, 2012, at 7:50 14PM, Michael Nelson wrote:

> Paper by Lenstra, Hughes, Augier, Bos, Kleinjung, and Wachter finds that two 
> out of every one thousand RSA moduli that they collected from the web offer 
> no security.  An astonishing number of generated pairs of primes have a prime 
> in common.  Once again, it shows the importance of proper randomness (my 
> remark).
> 
> http://www.nytimes.com/2012/02/15/technology/researchers-find-flaw-in-an-online-encryption-method.html?_r=1&hp
> 
> 
> The paper:
> 
> http://eprint.iacr.org/2012/064.pdf


The practical import is unclear, since there's (as far as is known) no
way to predict or control who has a bad key.

To me, the interesting question is how to distribute the results.  That
is, how can you safely tell people "you have a bad key", without letting
bad guys probe your oracle.  I suspect that the right way to do it is to
require someone to sign a hash of a random challenge, thereby proving
ownership of the private key, before you'll tell them if the
corresponding public key is in your database.


                --Steve Bellovin, https://www.cs.columbia.edu/~smb





_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to