Fwd: [Cryptography] "DarkHotel" APT routinely breaking RSA512

Georgi Guninski guninski at guninski.com
Wed Nov 12 09:38:50 PST 2014


On Mon, Nov 10, 2014 at 09:17:00PM -0500, grarpamp wrote:
> ---------- Forwarded message ----------
> From: Henry Baker <hbaker1 at pipeline.com>
> Date: Mon, Nov 10, 2014 at 5:50 PM
> Subject: [Cryptography] "DarkHotel" APT routinely breaking RSA512
> To: cryptography at metzdowd.com
> 
> 
> "The Darkhotel crew’s skillset allows it to launch interesting
> cryptographical attacks, for instance factoring 512 bit RSA keys"
> 

Factoring RSA 512 is well within earthy resources as of now.
Probably modest botnet (for sieving) + good machines for linear
algebra will factor RSA 512 in moderate time.

The interesting question is:  did they some crypto breakthrough?

btw, RSA cancelled their monetary challenges even for >512...



> The keys are used to create bogus certificates, e.g.,
> 
> GTE
> CyberTrust
> Digisign Server iD
> (Enrich)
> flexicorp.jaring.my sha1/
> RSA (512 bits)
> Expired 12/17/2008 12/17/2010
> 
> Equifax
> Secure
> eBusiness
> CA 1
> Equifax Secure
> eBusiness CA 1
> secure.hotelreykjavik.i s
> md5/RSA (512 bits)
> invalid Sig 2/27/2005 3/30/2007
> 
> http://www.net-security.org/secworld.php?id=17612
> 
> http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2014/11/darkhotel_kl_07.11.pdf
> 
> 
> _______________________________________________
> The cryptography mailing list
> cryptography at metzdowd.com
> http://www.metzdowd.com/mailman/listinfo/cryptography



More information about the cypherpunks mailing list