Nytro Posted November 25, 2013 Report Posted November 25, 2013 1024-bit RSA encryption cracked by carefully starving CPU of electricity BY Sean Hollister 3 years ago Since 1977, RSA public-key encryption has protected privacy and verified authenticity when using computers, gadgets and web browsers around the globe, with only the most brutish of brute force efforts (and 1,500 years of processing time) felling its 768-bit variety earlier this year. Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it. That's why they're presenting a paper at the Design, Automation and Test conference this week in Europe, and that's why -- until RSA hopefully fixes the flaw -- you should keep a close eye on your server room's power supply.Sursa: 1024-bit RSA encryption cracked by carefully starving CPU of electricityNu e chiar o "stire" dar e interesanta abordarea. Quote
TheTime Posted November 25, 2013 Report Posted November 25, 2013 Rescriu ce am scris si prin alte parti: Stirea este destul de veche, a aparut in primavara lui 2010. In plus, abordarea nu mi se pare deloc fiabila. In momentul in care ai acces la sistem si poti sa controlezi alimentarea procesorului cu un timming atat de bun... securitatea este compromisa din multe alte puncte de vedere. University of Michigan News Service | Researchers find weakness in common digital security system Quote