1024-bit RSA not cracked as Engadget claims

ThraxThrax 🐌Austin, TX Icrontian
edited July 2010 in Science & Tech

Comments

  • MiracleManSMiracleManS Chambersburg, PA Icrontian
    edited March 2010
    Thank you for clarifying this, the constant attempt to draw people using a sensational story is bothersome.
  • edited March 2010
    If you PGP encrypted your disks using RSA1024 and someone stole you machine or laptop, you would hope they couldn't recover your data. Just imaging your doctor, your local bank manager or government employee losing their laptop and the thief's using it to get the password and having access to all your and their data in less than 100 hours.

    Not so much a "perfectly safe and viable cryptosystem" anymore.
  • ThraxThrax 🐌 Austin, TX Icrontian
    edited March 2010
    It's perfectly safe because those hard disks would not be in a system performing the cryptographic operations. A side channel attack via DPA only works when the encrypted data is also located on the system doing the encryption.
  • AlexDeGruvenAlexDeGruven Wut? Meechigan Icrontian
    edited March 2010
    Another analog to this would be hitting a combination lock with a hammer until it broke, and then saying that there was a fundamental flaw with lock combinations.
  • edited July 2010
    But a physical break in to a credit card company could end up yielding millions of credit card numbers. Albeit it's probably not very likely, but if there are people as daring as bank robbers, it doesn't completely leave the scope of feasibility.
Sign In or Register to comment.