what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

twinkle_qa.html

twinkle_qa.html
Posted Dec 21, 1999

twinkle_qa.html

tags | encryption
SHA-256 | ef5646250d1cc5b17a98e3052bc768fec9e81ffe1564e6478472684d93aa1be5

twinkle_qa.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 FINAL//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=ISO-8859-1">
<META NAME="Generator" CONTENT="NetObjects Fusion 4.0 for Windows">
<TITLE>RSA Labs - Questions and Answers: Shamir’s Factoring Device and RSA</TITLE>
</HEAD>
<BODY LINK="#003333" VLINK="#666666" TEXT="#000000" TOPMARGIN=16 LEFTMARGIN=10 MARGINWIDTH=10 MARGINHEIGHT=16>
<TABLE CELLPADDING=0 CELLSPACING=0 BORDER=0 WIDTH=576>
<TR VALIGN=TOP ALIGN=LEFT>
<TD WIDTH=476><P><B><FONT COLOR="#000000" SIZE="+2" FACE="Arial Narrow,Helvetica Condensed,Univers57,Zurich Cn BT">Questions and Answers: Shamir's Factoring Device and RSA</FONT><P></B>
<TABLE WIDTH=150 BORDER=0 CELLSPACING=5 CELLPADDING=0 ALIGN=RIGHT NOF=TE>
<TR>
<TD BGCOLOR="#CCCCCC">
<TABLE BORDER=0 CELLSPACING=0 CELLPADDING=5 WIDTH=140 NOF=TI>
<TR>
<TD><P ALIGN=LEFT><B><FONT FACE="Arial Narrow,Helvetica Condensed,Univers57,Zurich Cn BT">Also available:</FONT></B><P ALIGN=LEFT><A HREF="990504.html"><FONT SIZE="-1">
RSA Press Release</FONT></A><FONT SIZE="-1"><P ALIGN=LEFT></FONT><A HREF="../html/twinkle.html"><FONT SIZE="-1">An Analysis of Shamir's Factoring Device<BR>&nbsp;- Robert Silverman, RSA Labs
</FONT></A><FONT SIZE="-1"></FONT></TD>
</TR>
</TABLE>
</TD>
</TR>
</TABLE>
<B><FONT COLOR="#000000" SIZE="-1">What is RSA announcing?</FONT></B><P><FONT SIZE="-1">At the Eurocrypt '99 conference this week in Prague, Adi Shamir, a coinventor of the RSA public-key algorithm and a
professor at the Weizmann Institute in Israel, is presenting a design for a special hardware device that would speed up the first part of the process of factoring a large number. The
design, called TWINKLE, which stands for "The Weizmann INstitute Key Locating Engine," is based on opto-electronics. Shamir estimates that the device would be
as powerful as about 100 to 1,000 PCs in the factoring process called "sieving," and would cost only about $5,000 in quantity. <P><BR><B>Does this mean that RSA can be cracked?</B><P>
No. Shamir's device offers the possibility of recovering keys less expensively than with a network of PCs, but does not crack RSA in the sense of making it easy to recover keys of
any size. Rather, the device&nbsp; speeds up the "sieving" step of known methods of factoring large numbers, which are the primary avenues for attacking the RSA public-key algorithm.
The design confirms what was previously expected about the appropriateness of certain RSA key sizes, including 512 bits. Larger RSA key sizes are still out of reach, one of the
obstacles being the amount of work and storage involved in the rest of the process of factoring a large number. <P><BR><B>What would it take to build the new device?</B><P>
Building the device would involve a fair amount of opto-electronic engineering, but it is likely to be feasible.<P><BR><B>RSA sponsors competitions that demonstrate that DES can be cracked by a group of
determined computer enthusiasts using networked computers. Why can't this be applied to RSA?</B><P>Actually, such competitions can and have been applied to RSA. Since several years before RSA started the </FONT><A
HREF="http://www.rsa.com/rsalabs/html/challenges.html"><FONT SIZE="-1">DES Challenges</FONT></A><FONT SIZE="-1">, which offer prizes for successful recovery of a
56-bit DES key, RSA has been awarding prizes for successful factorizations of large numbers, including many RSA numbers. Very few of the RSA numbers have been
factored so far, however, the largest one being about 450 bits long, still short of the 512-bit mark targeted by the new device.<P>
Perhaps the new device, if built, may figure into future cracking efforts around the 512-bit level, just as the Electronic Frontier Foundation's Deep Crack device has facilitated the last two cracking efforts for DES.<P>
<BR><B>What can developers do to safeguard their products against advances due to the new device?</B><P>One of the benefits of the RSA public-key algorithm is that it has a variable key size, so,
in effect, it has variable strength. This is in contrast to DES, which has a fixed, 56-bit key size and is difficult to safeguard if the key size is found to be insufficient. Products based
on RSA can be protected against the new device and other developments in factoring technology with appropriate key sizes.<P>In the 1980s, the "default" key size for many RSA implementations was 512 bits, which
even as of this writing has not been broken. Several years ago, recognizing that 512-bit keys might be at risk in the near future, RSA Laboratories recommended that developers
choose a minimum key size of 768 bits for user keys and 1024 bits for enterprise keys. (The recommendation for certificate authority "root" keys was 2048 bits.) Products
following these recommendations are safe against the new threat, and products that support a variable key size can be safeguarded through the deployment of longer keys.<P><BR><B>
Last week, RSA issued a bulletin about a weakness in the ISO 9796 signature format. Today, you're disclosing that it is possible to break RSA.&nbsp; Is RSA's encryption technology still secure?</B><P>
Yes, RSA's encryption technology is still secure. Last week's announcement was about a weakness in an alternative format for preparing messages for RSA signatures that is not
supported by RSA's products. The weakness was related to the format, and not the RSA public-key algorithm itself. Today's announcement is about a clever design for a
hardware device that speeds up known methods of factoring large numbers, not a new method of attacking the RSA public-key algorithm. In both cases, the strength of the
methods supported in RSA's products and of the key sizes recommended by RSA Laboratories have been confirmed.<P>RSA Laboratories will continue to report on these and similar developments.</FONT></TD>
</TR>
</TABLE>
</BODY>
</HTML>

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close