[125813] in cryptography@c2.net mail archive
Re: A call for aid in cracking a 1024-bit malware key
daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Wed Jun 11 16:11:35 2008
Date: Wed, 11 Jun 2008 16:04:39 -0400
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: "Jeffrey I. Schiller" <jis@mit.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <20080611195826.GC7075@mit.edu>
On Wed, 11 Jun 2008 15:58:26 -0400
"Jeffrey I. Schiller" <jis@mit.edu> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> I bet the malware authors can change keys faster then we can factor
> them...
>
To put it mildly. They can can even set up sophisticated structures to
have lots of keys.
Let's put it like this: suppose you wanted to use all of your
cryptographic skills to do such a thing. Do you think it could be
cracked? I don't...
Btw -- see http://blogs.zdnet.com/security/?p=1259 for more details.
--Steve Bellovin, http://www.cs.columbia.edu/~smb
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com