{"id":150958,"date":"2010-01-07T19:03:38","date_gmt":"2010-01-08T00:03:38","guid":{"rendered":"http:\/\/www.stoth.com\/2010\/01\/07\/768-bit-rsa-cracked-1024-bit-safe-for-now\/"},"modified":"2010-01-07T19:03:38","modified_gmt":"2010-01-08T00:03:38","slug":"768-bit-rsa-cracked-1024-bit-safe-for-now","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/150958","title":{"rendered":"768-bit RSA cracked, 1024-bit safe (for now)"},"content":{"rendered":"<p><\/p>\n<p><!--body--><\/p>\n<p>\nWith the increasing computing power available to even casual users, the security-conscious have had to move on to increasingly robust encryption, lest they find their information vulnerable to brute-force attacks.  The latest milestone to fall is 768-bit RSA; in <a href=\"http:\/\/eprint.iacr.org\/2010\/006.pdf\">a paper<\/a> posted on a cryptography preprint server, academic researchers have now announced that they factored one of these keys in early December.\n<\/p>\n<p>\nMost modern cryptography relies on single large numbers that are the product of two primes.  If you know the numbers, it&#8217;s relatively easy to encrypt and decrypt data; if you don&#8217;t, finding the numbers by brute force is a big computational challenge.  But this challenge gets easier every year as processor speed and efficiency increase, making &#8220;secure&#8221; a bit of a moving target.  The paper describes how the process was done with commodity hardware, albeit lots of it.&nbsp;<\/p>\n<p>\nTheir first step involved sieving, or identifying pairs of prime integers; that took the equivalent of 1,500 years on one core of a 2.2GHz Opteron; the results occupied about 5TB.  Those were then uniqued and processed into a matrix; because of all the previous work, actually using the matrix to factor the RSA value only took a cluster less than half a day.  Although most people aren&#8217;t going to have access to these sorts of clusters, they represent a trivial amount of computing power for many organizations.  As a result, the authors conclude, &#8220;The overall effort is sufficiently low that even for short-term protection of data of little value, 768-bit RSA moduli can no longer be recommended.&#8221;  1024-bit values should be good for a few years still.\n<\/p>\n<p>\nGiven that these developments are somewhat inevitable, even the authors sound a bit bored by their report.  &#8220;There is nothing new to be reported for the square root step, except for the resulting factorization of RSA-768&#8243; they write. &#8220;Nevertheless, and for the record, we present some of the details.&#8221;  Still, they manage to have a little fun, in one place referencing a YouTube clip of a Tarantino film following their use of the term &#8220;bingo.&#8221;\n<\/p>\n<p><a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/Nh6Mu9lKuRazDgXg0opLmAVkKoA\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/Nh6Mu9lKuRazDgXg0opLmAVkKoA\/0\/di\" border=\"0\"><\/img><\/a><br \/>\n<a href=\"http:\/\/feedads.g.doubleclick.net\/~at\/Nh6Mu9lKuRazDgXg0opLmAVkKoA\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~at\/Nh6Mu9lKuRazDgXg0opLmAVkKoA\/1\/di\" border=\"0\"><\/img><\/a><\/p>\n<div>\n<a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=pycfrvIKtyg:94mBR3jbn2I:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=pycfrvIKtyg:94mBR3jbn2I:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=pycfrvIKtyg:94mBR3jbn2I:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?i=pycfrvIKtyg:94mBR3jbn2I:F7zBnMyn0Lo\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=pycfrvIKtyg:94mBR3jbn2I:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.arstechnica.com\/~ff\/arstechnica\/index?a=pycfrvIKtyg:94mBR3jbn2I:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/arstechnica\/index?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/arstechnica\/index\/~4\/pycfrvIKtyg\" height=\"1\" width=\"1\" \/> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/feeds.arstechnica.com\/~r\/arstechnica\/index\/~3\/pycfrvIKtyg\/768-bit-rsa-cracked-1024-bit-safe-for-now.ars\" >Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the increasing computing power available to even casual users, the security-conscious have had to move on to increasingly robust encryption, lest they find their information vulnerable to brute-force attacks. The latest milestone to fall is 768-bit RSA; in a paper posted on a cryptography preprint server, academic researchers have now announced that they factored [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-150958","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/150958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=150958"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/150958\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=150958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=150958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=150958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}