log☇︎
4800+ entries in 0.483s
deedbot: [Recent Phuctorings.] Phuctored: 1687922147721 divides RSA Moduli belonging to 'Kristof Koerner <buero@kristofkoerner.de>; Kristof Koerner <bummtschak@googlemail.com>; Kristof Koerner <unterricht@kristofkoerner.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/1F31C79912C1899F639860FCC37F4789264841127A6F8AED81C73A222D9080A2
deedbot: [Recent Phuctorings.] Phuctored: 5371 divides RSA Moduli belonging to 'Ben Boeckel <boeckb@rpi.edu>; Ben Boeckel <MathStuf@gmail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/BACD25B20B53FB075B625A0DB142A78948207892E5466A2129FC58D85A744726
a111: Logged on 2016-04-30 01:34 deedbot: [Recent Phuctorings.] Phuctored: 4294967297 divides RSA Moduli belonging to 'Andreas Heimann <Andreas.Heimann@piratenpartei-hessen.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/67B53A956C56248022299BE1489190E8B96BB1C707161816375F64BE3AA9AAE1
deedbot: [Recent Phuctorings.] Phuctored: 529 divides RSA Moduli belonging to 'David J. Watt <david.j.watt@gmail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/9175E06FAFC792B3721328E39E1C7CB2032D61443A535C73CC6D220E54A977F0
deedbot: [Recent Phuctorings.] Phuctored: 880468295885 divides RSA Moduli belonging to 'Kai Schmalenbach <davekay.de@gmail.com>; Kai Schmalenbach <schmalenbach@metaq.de>; Kai Schmalenbach <kaischmalenbach@metaq.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/88FA6FEC98E18C3643A052814AD647ACDEB617182744E0B59EA9AB7A9276743C
deedbot: [Recent Phuctorings.] Phuctored: 41209 divides RSA Moduli belonging to 'chiapas; ' - http://phuctor.nosuchlabs.com/gpgkey/564D15E62651166A34A845EA000EC43536024A5B18B0C174B80FB63592CB18F7
deedbot: [Recent Phuctorings.] Phuctored: 459561500779 divides RSA Moduli belonging to 'Paul Karrer <p.karrer@arrowecs.at>; ' - http://phuctor.nosuchlabs.com/gpgkey/BC4ABEF11E1CDD5388467ED4AA132904D2FBFB0D28D820941A1A83B81BBD2E1D
deedbot: [Recent Phuctorings.] Phuctored: 459561500779 divides RSA Moduli belonging to 'Marco Hien <marco.hien@math.uni-augsburg.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/A627338D751C449EA54C0BA518ABCB2E215D939534F7D149C246EA9EA0D36279
deedbot: [Recent Phuctorings.] Phuctored: 8 divides RSA Moduli belonging to 'foobarbaz; ' - http://phuctor.nosuchlabs.com/gpgkey/F7594E6FFC5A7760F47026806103B21B7F26787C2523DC377DCCBB1AA93213EC
deedbot: [Recent Phuctorings.] Phuctored: 450971566185 divides RSA Moduli belonging to 'Torsten Ennenbach <torsten.ennenbach@set-sign.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/A5CF9F50DDA50E86A049276CCC0AE37415FB5B761B5E586D2C0C6D079AFB9BCD
deedbot: [Recent Phuctorings.] Phuctored: 234397840233775 divides RSA Moduli belonging to 'SlowFax <slowfax@googlemail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/84FDD00AD2E5C818F1D9A7604EA5447CDA456A25B275975C62A2F1AEB4ED42C3
deedbot: [Recent Phuctorings.] Phuctored: 382252089433 divides RSA Moduli belonging to 'Thomas Hofmann <toho89@gmail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/9AD29DC660DB7496B01D608486E6062A27E35F35C32CFD3E2F35FC1409374187
deedbot: [Recent Phuctorings.] Phuctored: 21474836485 divides RSA Moduli belonging to 'Charly Avital <shavital@mac.com>; Charly Avital (GnuPG) <shavital@mac.com>; Charly Avital <shavital@netvision.net.il>; ' - http://phuctor.nosuchlabs.com/gpgkey/BC32D34833DC18D609ED6D8877435EE51A4C49DB57A71C30745379E23315C237
deedbot: [Recent Phuctorings.] Phuctored: 21474836485 divides RSA Moduli belonging to 'ms@shingondo.org <ms@shingondo.org>; ' - http://phuctor.nosuchlabs.com/gpgkey/A05889A8F8BA47B362BCD6CA1E020FA879C7BA9E11F8D473C1E7C34B43C3AD2D
deedbot: [Recent Phuctorings.] Phuctored: 21474836485 divides RSA Moduli belonging to 'Ralf Oltmanns <ralf@it-roxx.de>; Ralf Oltmanns <ralf@oltmanns.name>; Ralf Oltmanns <osm@abo.ist-total.net>; Ralf Oltmanns (Piratenpartei Deutschland Landesverband Bayern) <pirat@oltmanns.name>; ' - http://phuctor.nosuchlabs.com/gpgkey/796A75EB3CC04A7E195A0B6F1A9A1B4716C67A59F1CC9ACB8A9B796A1B4AF1D0
deedbot: [Recent Phuctorings.] Phuctored: 7374458848949 divides RSA Moduli belonging to 'Saeid <zarghani.s@gmail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/8FD900729BD063FFD5B8CB3D6C7828574ADFE7DF6046F67D7982DF35DFF18EAA
deedbot: [Recent Phuctorings.] Phuctored: 9 divides RSA Moduli belonging to 'randomnoize (Tor relay operator) <randomnoize@riseup.net>; randomnoize (Tor relay operator) <randomnoize2009@googlemail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/9319605DD9BFB5972272003BC0D6D2E999783C7256A75BF1BE08178A359F9542 ☟︎☟︎
deedbot: [Recent Phuctorings.] Phuctored: 9 divides RSA Moduli belonging to 'Debarshi Ray <rishi.is@lostca.se>; Debarshi Ray (GNU Developer) <rishi@gnu.org>; Debarshi Ray (GMail Account) <debarshi.ray@gmail.com>; Debarshi Ray (Red Hat Employee) <debarshir@redhat.com>; Debarshi Ray (Fedora Packager) <rishi@fedoraproject.org>; Debarshi Ray (GNOME Developer) <debarshir@src.gnome.org>; Debarshi Ray (GNOME Foundation Member) <debarshir@gnome.org>; Debarshi Ray (Freedeskto
deedbot: [Recent Phuctorings.] Phuctored: 9 divides RSA Moduli belonging to 'Richard Monk <rmonk@redhat.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/75254628CF9D61D0137B535BDE2860B51836575E4A454589D01BD586E163B445
deedbot: [Recent Phuctorings.] Phuctored: 4294967297 divides RSA Moduli belonging to 'Konstantin Pisarenko <kpisarenko@gmail.com>; ' - http://phuctor.nosuchlabs.com/gpgkey/C1058B43984FD910A23CE94CC7D3179EE5AA3B0B3F1A3598D73C71C72EEEDE21
deedbot: [Recent Phuctorings.] Phuctored: 4294967297 divides RSA Moduli belonging to 'Andreas Heimann <Andreas.Heimann@piratenpartei-hessen.de>; ' - http://phuctor.nosuchlabs.com/gpgkey/67B53A956C56248022299BE1489190E8B96BB1C707161816375F64BE3AA9AAE1 ☟︎
asciilifeform: Apocalyptic: but in our context the primorial has to take the shape of rsa key so the proggy can display it
asciilifeform: (what i'm calling a synthetic 'rsa key' where modulus is product of 1st N primez)
mircea_popescu: how the fuck does this fails to be obvious. YES YOUR RSA KEY YOU USE FOR "SSH" MUST BE INTEROPERABLE WITH THE RSA KEY I USE TO FUCK YOUR MOTHER.
mircea_popescu: have the decency to say -----BEGIN RSA PUBLIC KEY----- uniformly and be done with it. or ECC or w/e the fuck it is, CrS
jurov: mostly rsa, but also dsa, i can filter them
asciilifeform: jurov: these are rsa keys ?
Apocalyptic: <+mircea_popescu> 35 mod 4 = 3 // yes, but this isn't related as the RSA arithm doesn't happen in Z/35Z, let alone that 35 isn't prime
asciilifeform: ~1.2mn rsa-iferous keyz
a111: Logged on 2016-04-23 01:40 shinohai: asciilifeform: any eta on the rsa feed? I used to have it connected to my bot.
shinohai: asciilifeform: any eta on the rsa feed? I used to have it connected to my bot. ☟︎
deedbot: [Qntra] Phuctor, the RSA Super-Collider Discovers Vulnerability in Northrop Grumman PGP Root-CA - http://qntra.net/2016/04/phuctor-the-rsa-super-collider-discovers-vulnerability-in-northrop-grumman-pgp-root-ca/
mircea_popescu: 5. Scolding answer: if you have to ask, please don't try to implement any of this yourself. It is very difficult to get RSA right.
mircea_popescu: 4. Long-term answer: don't use RSA. RSA is well on its way to obsolescence. Most problems you'd ever want to solve with RSA are better solved with Curve25519 (for DH) and Ed25519 (for signing). Not coincidentally, these are the algorithms implemented by Nacl, the only crypto library you should consider using.
mircea_popescu: 2. Pragmatic answer: prime numbers are generally coprime with the modulus, and so they're an easy answer, and so RSA public exponents tend to be prime.
mircea_popescu: 1. Technical answer: an RSA public exponent needs to be coprime with the modulus, which is not the same as requiring that it be prime.
mircea_popescu: let's play a little "guess the address of the scum pond" : Should an RSA public exponent be prime?
mircea_popescu: BingoBoingo : you got your qntra piece right there. "Phuctor, the RSA Super-Collider discovers vulnerability in Northrop Grumman PGP Root-CA "
mircea_popescu: phf if it's rsa, it's food. alf the beedog is serious about bee's knees like that.
phf: mircea_popescu: it's the strategic superiority article's position is what i'm saying. you can rig up ipad to do crypto for you, as long as you shield it in a bunker, install some toy language environment on it and spend some time writing rsa algo in that
mircea_popescu: in somehow inexplicably overlooked lolz : http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/#comment-114319
asciilifeform: thread was about none less than RSA WITH EXPONENT OF 1
asciilifeform: http://www.rowan.edu/colleges/csm/departments/computerscience/research/reports/tr2010-2.pdf << possible explanation for rsa keys with gigantic exponent
mircea_popescu: i don't think there's anything wrong with proper, full rsa (as opposed to the neutered version implemented by pgp)
asciilifeform: (rsa? cs?)
mircea_popescu: anyway, back to the iB : there's a number of very valuable ideas, at least in my eyes, that discussion throughout has brought out. yes the sha thing discussed on trilema ; also - ada, linked into the c, and slowly driving out the c, much in the way the vermin try to drive out say x11 or rsa etc.
asciilifeform: the claim of 'this key has fewer bits but more secure than rsa' is esp. galling, because there is NO PROOF of it available in the open literature
asciilifeform: '... encrypts the RN with the RSA key retrieved from the C2 server ...' << !!
asciilifeform: 'As KeRanger encrypts each file (i.e. Test.docx) starts by creating an encrypted version that uses the .encrypted extension (i.e. Test.docx.encrypted.) To encrypt each file, KeRanger starts by generating a random number (RN) and encrypts the RN with the RSA key retrieved from the C2 server using the RSA algorithm. It then ....' << L0l!1111
mircea_popescu: if rsa is broken, we have an event of the nature of "end of b-a" not of the nature of "an update".
asciilifeform: it rsa is broken, the dead will 'walk.'
asciilifeform: rsa is NOT publicly proven to be equivalent to Factoring in difficulty;
asciilifeform: 'A number of IETF standards groups are currently in the process of applying the second-system effect to redesigning their crypto protocols. A major feature of these changes includes the dropping of traditional encryption algorithms and mechanisms like RSA, DH, ECDH/ECDSA, SHA-2, and AES, for a completely different set of mechanisms, including Curve25519 (designed by Dan Bernstein et al), EdDSA (Bernstein and colleagues), Poly
asciilifeform: but rsa is ?
deedbot-: [Loper OS] Phuctor Broke Several RSA Keys. - http://www.loper-os.org/?p=1504
phf: can then manually verify by doing hand rsa. primes and ciphertext are base 10 for human convenience
assbot: 5 results for 'mental rsa' : http://s.b-a.link/?q=mental+rsa
asciilifeform: !s mental rsa
jurov: asciilifeform: as usual, your lawyer will just crudely reimplement rsa in excel
mircea_popescu: if i ever open a brothel here, we'll have a rsa night.
assbot: Logged on 18-03-2016 14:46:05; mircea_popescu: (and yes in that month i can do the fucking rsa exponentiation on paper three times over.)
mircea_popescu: (and yes in that month i can do the fucking rsa exponentiation on paper three times over.) ☟︎
assbot: On how the factored 4096 RSA keys story was handled, and what it means to you. on Trilema - A blog by Mircea Popescu. ... ( http://bit.ly/1UZ9Gbe )
asciilifeform: and nobody http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you
asciilifeform: punkman: if you want a dollar cardano, call up ft meade and rsa co., they will happily sell it to you today!
assbot: CacheBleed: A Timing Attack on OpenSSL Constant Time RSA ... ( http://bit.ly/1VOQ9sc )
asciilifeform: ben_vulpes: i have a (unpublished, for good reasons) prototype that doesn't have 'kernel' or 'userland' at all, but just this bare metal thing that sets up the nic ring buffer (coreboot payload) and loops, checks rsa, retransmits on other nic...
pete_dushenski: http://log.bitcoin-assets.com/?date=24-02-2016#1414888 << capsule today, rsa pill tomorrow ☝︎
asciilifeform: mircea_popescu: iirc their last paper concerned rsa
mircea_popescu: "security hole found in gpg" vs "security hole found in ecdsa - rsa not affected, you should have not switched"
mod6: <+mircea_popescu> make a 4kb key and use it rather than the strange md5 lists or what's that. << RSA too.
mod6: what we really aught to do is write to that guy, get him to join the wot with a 4096 bit RSA key, and have him resign all of the bundles.
mircea_popescu: they do not have the "rsa pill". the block ciphers however as currently implemented are next to useless.
asciilifeform: mircea_popescu is of course free do define my questions, such as 'do they have the rsa pill', as uninteresting. but i find this position too martian to fully grasp with my puny earthling brain.
asciilifeform: note that i did not say 'the pill for rsa' but a specific archival document that is referred to in 10,001 places in the open usg literature
mircea_popescu: because wtf do i care about rsa ?
asciilifeform: if mircea_popescu 'doesn't care' - at all - how come he doesn't, e.g., factor rsa using everett's device ?
mircea_popescu: "It isn't easy to build a large general-purpose quantum computer, but many people publicly working on it seem to think that they'll be successful next decade. Maybe there will be serious obstacles that slow down or stop this success, but there's clearly a serious risk to RSA and ECC, and it isn't sensible risk management to pretend that the problem doesn't exist."
mircea_popescu: <asciilifeform> what tech? rsa ? << naw. the whole shebang.
asciilifeform: what tech? rsa ?
mircea_popescu: bobs@rsa.com mentions it.
asciilifeform: like we do for rsa
asciilifeform: (or, for that matter, integer factorization. which, for n00bz, i will point out that rsa has never actually been formally reduced to!)
punkman: https://groups.google.com/forum/#!topic/sci.crypt/oFdR-hzc83w rsa for scheme, and some lulz after that
maqp: Since it's ECDHE, the security is actually 3072-bit RSA equivalent
mircea_popescu: in the EP? general scheme of true cryptography, otp occupies a peculiar spot, equivalent to rsa's use of multiplication, where otp uses "multiplication modulo 1" or "multiplication in the binary group" for a º function
mircea_popescu: and i'd rather that than rsa, myself.
asciilifeform: on the other hand, 'the spice must flow.' and if i hear nothing, 'g' is coming out with rsa or cramer-shoup in abusive mode.
assbot: Logged on 23-01-2016 15:35:48; asciilifeform: problem is that one doesn't get to 'make a name' in academe as 'cryptographer' by pushing rsa.
thestringpuller: every netsec guy at my coal mine is like "RSA is bad don't use it mmmkay. ECC please"
thestringpuller: asciilifeform: dunno if this was in logs. but why is the "crypto comoonity" opposed to RSA?
mircea_popescu: ascii_butugychag honestly, i suspect a) all actual cryptography revolves around º and º' pairs and b) rsa is the only one where º = º' = multiplication.
ascii_butugychag: i kinda wonder, how many of the folks barfing, could explain how, e.g., rsa, works, to save own life
mats: was this socat thing even rsa?
ascii_butugychag: which is notably not the case in, e.g., rsa.
thestringpuller: "Here are several reasons you should stop using RSA and switch to elliptic curve software:"
thestringpuller: ascii_butugychag: so netsec d00d here (who isn't a real cryptographer by any means) linked this >> https://gist.github.com/tqbf/be58d2d39690c3b366ad in relation to "not using RSA" for reasons XYZ
ascii_butugychag: usg is really getting desperate to get folks off rsa
ascii_butugychag: yes but what precisely is the point of a block cipher that is slower ~and~ bulkier than abused-rsa.
ascii_butugychag: except that odoacer III meanwhile broke rsa and collided sha512