On 17/03/2010 05:03, James Muir wrote:
> ** I just had the following realization: I had assumed that the authors
> were attacking an openssl *server* running on the fpga board, but
> perhaps that is not so. They don't seem to make that specific claim.
> They claim only to be attacking an "unmodi
On Wed, 10 Mar 2010 21:27:06 +0530, Udhay Shankar N
wrote:
> Anyone know more?
>
>
http://news.techworld.com/security/3214360/rsa-1024-bit-private-key-encryption-cracked/
>
> RSA 1024-bit private key encryption cracked
> Researchers find weakness in security system
>
> By Network World Staff |
>> "The RSA algorithm gives security under the assumption that as long as
>> the private key is private, you can't break in unless you guess it.
>> We've shown that that's not true," said Valeria Bertacco, an associate
>> professor in the Department of Electrical Engineering and Computer
>> Science
On Wed, Mar 10, 2010 at 09:27:06PM +0530, Udhay Shankar N wrote:
> Anyone know more?
>
> http://news.techworld.com/security/3214360/rsa-1024-bit-private-key-encryption-cracked/
My initial reaction from reading only the abstract and parts of the
introduction is that the authors are talking about a
Anyone know more?
http://news.techworld.com/security/3214360/rsa-1024-bit-private-key-encryption-cracked/
RSA 1024-bit private key encryption cracked
Researchers find weakness in security system
By Network World Staff | Network World US
Published: 13:26 GMT, 05 March 10
Three University of Mich