Re: A call for aid in cracking a 1024-bit malware key

2008-06-11 Thread Steven M. Bellovin
On Wed, 11 Jun 2008 15:58:26 -0400 Jeffrey I. Schiller [EMAIL PROTECTED] wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 I bet the malware authors can change keys faster then we can factor them... To put it mildly. They can can even set up sophisticated structures to have lots of

Re: A call for aid in cracking a 1024-bit malware key

2008-06-11 Thread Ivan Krstić
On Jun 11, 2008, at 10:04 PM, Steven M. Bellovin wrote: Let's put it like this: suppose you wanted to use all of your cryptographic skills to do such a thing. Do you think it could be cracked? I don't... Exactly right. After Storm, I don't think anyone reasonable still believes that

A call for aid in cracking a 1024-bit malware key

2008-06-09 Thread Steven M. Bellovin
According to http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list some new malware is encrypting files with a 1024-bit RSA key. Victims are asked to pay a random to get their files decrypted. So -- can the key

Re: A call for aid in cracking a 1024-bit malware key

2008-06-09 Thread James Muir
Steven M. Bellovin wrote: According to http://www.computerworld.com/action/article.do?command=viewArticleBasicarticleId=9094818intsrc=hm_list%3E%20articleId=9094818intsrc=hm_list some new malware is encrypting files with a 1024-bit RSA key. Victims are asked to pay a random to get their files