what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

990504.html

990504.html
Posted Dec 21, 1999

990504.html

tags | encryption
SHA-256 | e9ffe67f52a967c79dd0e13a81ba1e37d504536dc758509cbe84a85e56a39b88

990504.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 FINAL//EN">

<HTML>
<HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=ISO-8859-1">

<TITLE>RSA Press Release - RSA Laboratories Key-Size Directive Reaffirmed at Technical Conference</TITLE>
<META NAME="Generator" CONTENT="NetObjects Authoring Server 3.0 for Windows">

</HEAD>

<BODY LINK="#000066" VLINK="#666666" TEXT="#000000" TOPMARGIN=16 LEFTMARGIN=10 MARGINWIDTH=10 MARGINHEIGHT=16>
<TABLE CELLPADDING=0 CELLSPACING=0 BORDER=0 WIDTH=576>
<TR VALIGN="top" ALIGN="left">
<TABLE BORDER=0 CELLSPACING=0 CELLPADDING=0 WIDTH=495>
<TR VALIGN="top" ALIGN="left">
<TD WIDTH=476>
<P><B><U>FOR IMMEDIATE RELEASE</P>
<P></U><FONT SIZE="+2">RSA Laboratories Key-Size Directive Reaffirmed at Technical Conference</P>
<P></FONT></B>
<TABLE WIDTH=175 BORDER=0 CELLSPACING=5 CELLPADDING=0 ALIGN=RIGHT><TR>
<TD BGCOLOR="#CCCCCC"><TABLE BORDER=0 CELLSPACING=0 CELLPADDING=5 WIDTH=165><TR><TD>

<P><B><FONT SIZE="-1">Related documents:</P>
<P></FONT></B><A HREF="twinkle_qa.html"><B><FONT SIZE="-1"></FONT></B><FONT SIZE="-1">Questions and Answers: Shamir's Factoring Device and RSA</FONT></A><FONT SIZE="-1"></P>
<P></FONT><A HREF="twinkle.html"><FONT SIZE="-1">An Analysis of Shamir's Factoring Device<BR>- Robert D. Silverman, RSA Laboratories</FONT></A><FONT SIZE="-1"></FONT></TD></TR></TABLE></TD></TR></TABLE>
<B><FONT SIZE="+2"></FONT>SAN MATEO, CA and PRAGUE, THE CZECH REPUBLIC, May 4, 1999 -- </B>A recommendation by RSA Laboratories, RSA Data Security, Inc.'s research arm, to use 768-bit and 1024-bit keys as the minimum for achieving reliable security was reaffirmed today when the design for a potential hardware-based threat to RSA keys was revealed in a research paper presented today at a technical conference in Europe.&nbsp; The design for the theoretical hardware device was discussed by RSA co-inventor Adi Shamir at the Eurocrypt '99 conference being held in Prague, Czech Republic.</P>
<P>In his research result, Shamir describes better ways of using known factorization methods, including one based on the work of John M. Pollard, one of the recipients of the 1999 RSA Award.&nbsp; According to Shamir's result, a specially-designed hardware device could do as much work as one hundred to one thousand desktop workstations in its part of the process of factoring a large number.&nbsp; However, the device still faces practical limitations in fabrication and implementation.</P>
<P>"Though the new device, if built, would place 512-bit RSA keys at much greater risk, it would have no effective impact on 1024-bit RSA," said Shamir, a professor at the Weizmann Institute in Israel. </P>
<P>"This theoretical device reinforces what RSA has been advising its customers for several years," said Burt Kaliski, chief scientist of RSA Laboratories.&nbsp; "A key size of 512 bits is not enough for real security, and 768 bits should be considered the acceptable minimum key length for protecting critical data."&nbsp; Current industry standards for the RSA algorithm, such as the ANSI X9.31 banking standard for RSA signatures, require a minimum of 1024 bits for an additional level of security.</P>
<P>As was pointed out at the 1999 RSA Conference, special purpose hardware devices are good for collecting lots of equations and then extracting the required information to break the key. But with larger key sizes, the number of equations reaches into the billions, resulting in a RAM storage requirement of many Terabytes (TB) -- millions of millions of bytes that need to be in memory at once to achieve productive speeds.</P>
<P>According to scientists at RSA Laboratories, the speed or the computational horsepower of a hardware device used to aid in the attack of the key is not the only issue.&nbsp; Also important is the amount of computer memory required to process all the equations.&nbsp; RSA researchers noted that while this device shortens part of the process, the overall impact on the security of the RSA public key algorithm also depends on the ability to process all the equations, which for adequate key sizes requires more memory than any computer has now or will have in the foreseeable future.&nbsp; This is in addition to the length of time it would take to collect and process all the equations for adequate key sizes, even with special hardware. To RSA's knowledge, no one has yet successfully managed to handle these equations using massively parallel computation the way Shamir's device handles its part of the factoring problem.</P>
<P>RSA Laboratories published its key size recommendation in the summer of 1995 issue of CryptoBytes, RSA Laboratories' technical newsletter, which is available on RSA's Web site.&nbsp; In this document, RSA Laboratories recommended that the minimum key length for protecting critical user data should be 768 bits; for enterprise data and enterprise certificate authorities, a minimum key length of of 1024 bits is recommended.&nbsp; A technical summary about the practical impact of Shamir's result on the security of the RSA public key algorithm can also be found on RSA's Web site, <A HREF="http://www.rsa.com">http://www.rsa.com</A>.</P>
<P><BR><B>RSA Data Security, Inc</P>
<P></B>RSA Data Security, Inc., a wholly owned subsidiary of Security Dynamics Technologies, Inc. (NASDAQ: SDTI), is a leading supplier of software components that secure electronic data, with more than 400 million copies of RSA encryption and authentication technologies installed worldwide. RSA technologies are part of existing and proposed standards for the Internet and World Wide Web, ISO, ITU-T, ANSI, IEEE and are in use in business, financial and electronic commerce networks around the globe. RSA develops and markets platform-independent security components and related developer kits, and provides comprehensive cryptographic consulting services. RSA can be reached at <A HREF="http://www.rsa.com">http://www.rsa.com</A>.</TD>
</TR>
</TABLE>
</BODY>
</HTML>
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close