[125813] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: A call for aid in cracking a 1024-bit malware key

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Wed Jun 11 16:11:35 2008

Date: Wed, 11 Jun 2008 16:04:39 -0400
From: "Steven M. Bellovin" <smb@cs.columbia.edu>
To: "Jeffrey I. Schiller" <jis@mit.edu>
Cc: cryptography@metzdowd.com
In-Reply-To: <20080611195826.GC7075@mit.edu>

On Wed, 11 Jun 2008 15:58:26 -0400
"Jeffrey I. Schiller" <jis@mit.edu> wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> I bet the malware authors can change keys faster then we can factor
> them...
> 
To put it mildly.  They can can even set up sophisticated structures to
have lots of keys.

Let's put it like this: suppose you wanted to use all of your
cryptographic skills to do such a thing.  Do you think it could be
cracked?  I don't...

Btw -- see http://blogs.zdnet.com/security/?p=1259 for more details.


		--Steve Bellovin, http://www.cs.columbia.edu/~smb

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post