On Wed, 15 Feb 2012, Steven Bellovin wrote: > Note that they very carefully didn't say how they did it. I have my > own ideas -- but they're just that, ideas; I haven't analyzed them > carefully, let alone coded them.
If one limits the same-factor search to the keys of the same model of each device, one can even do the trivial pair-wise search among few thousand keys, but the general technique is also not a secret: <https://freedom-to-tinker.com/blog/nadiah/new-research-theres-no-need-panic-over-factorable-keys-just-mind-your-ps-and-qs> -- Regards, ASK _______________________________________________ cryptography mailing list [email protected] http://lists.randombit.net/mailman/listinfo/cryptography
