log☇︎
5000+ entries in 0.568s
assbot: Practical Padding Oracle Attacks on RSA ... ( http://bit.ly/1iqPsI8 )
mircea_popescu: http://secgroup.dais.unive.it/wp-content/uploads/2012/11/Practical-Padding-Oracle-Attacks-on-RSA.html << great article btw.
assbot: Practical Padding Oracle Attacks on RSA ... ( http://bit.ly/1iqPsI8 )
ascii_field: http://secgroup.dais.unive.it/wp-content/uploads/2012/11/Practical-Padding-Oracle-Attacks-on-RSA.html << did we ever do these here ?
asciilifeform: http://log.bitcoin-assets.com/?date=11-09-2015#1270083 << l0l mircea_popescu, everybody knows (tm) that metansa would never contain something so pedestrian as a report-writer, much less one who interfaced with something as boring as a politician. it is 100% people who break rsa, devise single-transistor backdoors to plant in intel, devise 'natural disease mimicking' poisons, etc. ☝︎
asciilifeform: interestingly, ti is (or at least was) one of the most tightfistedly-drm-besotten hardware makers; to the point that PEOPLE GANGED UP AND FACTORED THEIR RSA KEY - http://www.ticalc.org/archives/news/articles/14/145/145273.html
ascii_field: a valid packet is necessarily 1) rsa'd to the node's ephem-key 2) signed by originator's ephem-key
assbot: Logged on 06-09-2015 00:59:32; mircea_popescu: asciilifeform http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/#selection-455.0-455.29 ftr.
assbot: On how the factored 4096 RSA keys story was handled, and what it means to you. on Trilema - A blog by Mircea Popescu. ... ( http://bit.ly/1VFXivr )
mircea_popescu: asciilifeform http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/#selection-455.0-455.29 ftr. ☟︎
assbot: Logged on 29-10-2014 01:32:22; asciilifeform: possibly these will have to travel armoured and rsa'd to turdatron's pubkey
mircea_popescu: gpg: Signature made Fri 04 Sep 2015 11:22:04 PM ART using RSA key ID 2FB7B452
asciilifeform: gpg: Signature made Fri Sep 4 19:06:50 2015 EDT using RSA key ID 2FB7B452
asciilifeform: gpg: Signature made Fri Sep 4 18:26:16 2015 EDT using RSA key ID 2FB7B452
ascii_field: 'Some servers occasionally or consistently produce ServerKeyExchange messages which contain RSA signatures which are zero. Encoding of the number zero varied. In some cases, zero or one bytes were transmitted. Sometimes the length of the signature matched the size of the RSA modulus. The latter suggests that the server implementation may have omitted the copy of the computed signature. This could happen if RSA-CRT
ascii_field: 'We observed one rather peculiar factorization of a RSA modulus, involving factor 23. What happened was that the public key in the X.509 certificate was corrupted in some (there was a bit flip, according to the server operator), and equation (1) accidentally revealed the factor 23. The corrupted modulus had other small factors, too, and a large composite factor with an unknown factorization.'
assbot: Loper OS » Phuctor Broke Several RSA Keys. ... ( http://bit.ly/1UjY1Qk )
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=141733920801 (Luciano Buszmicz (Never forget: 2 + 2 = 5 for extremely large values of 2.) <lbuszmicz@zimbra.itx.net>; ) - http://nosuchlabs.com/gpgkey/1C37B216D569982CD4D18802D703548E1A352C5E3C3F6057CEC02FFAFF9C8ABD#A2E1D97BFA1AA0431B12F36B8AB2669779FA7D59960E8323C98B9DA9158B4469
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=4294967297 (Luciano Buszmicz (Never forget: 2 + 2 = 5 for extremely large values of 2.) <lbuszmicz@zimbra.itx.net>; ) - http://nosuchlabs.com/gpgkey/1C37B216D569982CD4D18802D703548E1A352C5E3C3F6057CEC02FFAFF9C8ABD#9098364A0C829D2334C1FEB28BB32586DD715CDA7CA82EA77EDB06C310FB6268
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=357 (__test__ <__test__@ribble.cn>; ) - http://nosuchlabs.com/gpgkey/553307AFE540EF3E57BB4D3558C9C7FA88F2C4B81CBCB9F5ADEF116B4055E582#5A0C130A24BF1E31756C501252C9F008E2453391CF4B48D78272C73DCA8CB16A
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=4294967297 (Andrew Orr <andrew@andreworr.ca>; ) - http://nosuchlabs.com/gpgkey/D9C5494A7B03BBA6E8699AF3EBACA1A2E3ED77906921EB829571A5AEF2623FBC#211791FC37A1BB035F09E688CE238EE61F2933B6A01D2FC7512BD771F4C23032
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=519691042937 (Andrew Orr <andrew@andreworr.ca>; ) - http://nosuchlabs.com/gpgkey/D9C5494A7B03BBA6E8699AF3EBACA1A2E3ED77906921EB829571A5AEF2623FBC#BD2846B267D49C865911E7513CAF4254669848792AA6903D280A0F8EBD2813F6
deedbot-: [Recently Phuctored RSA Moduli] Phuctored RSA Modulus, GCD=609 (Blevins <<wblevins@ix.netcom.com>>; THIS KEY HAS BEEN REVOKED <PLEASE DO NOT USE>; ) - http://nosuchlabs.com/gpgkey/B6D497A91DB9DE78E559BF952FFC44A45C0C8CA5FAB4A23E547F125A6541B7A6#B437CABB5475E65CED65A102B206BE9857C3FD0C9A24DF62941BF5FF46D73AB5
funkenstein_: it's also hard to make good rsa privkeys with dice
funkenstein_: i'm surprise nobody has an RSA coin out yet
asciilifeform: 'gpg: encrypted with RSA key, ID 00000000' << win
assbot: gpg: encrypted with 2048-bit RSA key, ID 0FBEF185, created 2012-04-25 "Pe - Pastebin.com ... ( http://bit.ly/1MPUFFR )
asciilifeform: re: the rsa thing, 'superencryption' is the term of art
mircea_popescu: punkman currently a symmetric session key is rsa encrypted.
punkman: what's the difference of full rsa to current gpg?
mike_c: full rsa would make for some long messages
punkman: full rsa?
mircea_popescu: should be fun once pgp is implemented properly as full rsa.
mats: asciilifeform: just realized it does not use rsa. derp.
phf: g the wrong RSA key." message format spec explains "First 2 bytes of the Message Digest inside the RSA-encrypted integer, to help us figure out if we used the right RSA key to check the signature."
phf: so to continue this archaeological dig, GPG 2.6 clarifies the usage of 2 octets. reads the header, reads the rsa ciphertext, decrypts rsa. rsa contains a digest of some fields from header and the body of message. so first thing he does next is check the first 2-octets of digest againts the 2-octets in header. if the two don't match program bails with "Error: RSA-decrypted block is corrupted. This may be caused either by corrupted data or by usin
mircea_popescu: and if youy for some incomprehensible reason MUST use a hybrid scheme, use the following : 1. generate random 4096 hash ; 2. cut your message up into N chunks of size up to 2048 ; 3. xor the chunks with 1; encrypt each chunk via rsa
mircea_popescu: i wasn't at any point contemplating "rsa encryption = rsa run once over the message herp"
mircea_popescu: no. rsa encryption = a succession of individually encrypted blocks.
assbot: 1 results for 'rsa padding' : http://s.b-a.link/?q=rsa+padding
asciilifeform: !s rsa padding
mircea_popescu: make the damned thing match throughout. bapg = 4096 rsa, 4096 hash, etc.
asciilifeform: using naked rsa.
asciilifeform: either the legend of mr cocks is disinfo (i cannot rule this out at all) or usg had rsa before rivest, shamir, adelman.
asciilifeform: recall who had rsa transform in 1976 ?
mircea_popescu: it is ACTUALLY preferable for teh republic that whether rsa is or is not np-complete is not known.
mircea_popescu: measure rsa rigidity.
mircea_popescu: that's actually weaker than rsa in practice.
asciilifeform: even in rsa.
asciilifeform: phf, mircea_popescu: how, if the layers use distinct keys, each en-rsa'd separately ?
mircea_popescu: 1. full rsa. 2. proper signature encapsulation. 3. sane structuring of the keys. 4. etfc.
asciilifeform: gpg: Signature made Thu Aug 20 05:23:31 2015 EDT using RSA key ID 8B232B13
mircea_popescu: the time i consider changing off rsa is a time after i've taken a piss on the ruins of the white house.
mircea_popescu: and no, they don't get to uise the "quantum" gimmick to push ecc against rsa. like they didn't manage the past three or four gimmicks.
mircea_popescu: that said, static allocation goes a long way. this connects to the "fixed time" discussion re rsa yest.
mircea_popescu: mats not on correctly implemented rsa.
assbot: random - Offline RSA strong prime test similar to Phuctor? - Information Security Stack Exchange ... ( http://bit.ly/1JURgDy )
asciilifeform: (on classic stackexchange, occasionally folks do speak, e.g., http://security.stackexchange.com/questions/89713/offline-rsa-strong-prime-test-similar-to-phuctor/89718#89718 )
assbot: Choose your own exponents in RSA? - Information Security Stack Exchange ... ( http://bit.ly/1Kir7KP )
asciilifeform: http://security.stackexchange.com/questions/89787/choose-your-own-exponents-in-rsa
assbot: Choose your own exponents in RSA? | Question and Answer ... ( http://bit.ly/1Kir3dM )
mircea_popescu: http://qandasys.info/choose-your-own-exponents-in-rsa/#comment-502914
mircea_popescu: http://dpaste.com/25PZKC1 < if anyone somehow cares, re phuctor and rsa exponents. since my comment is still unapproved a day later.
ascii_field: the (largely lysenkoine and fraudulent, but bear with me) promise of 'homomorphic' is that you can, ostensibly, make a circuit where determining function is similar to breaking rsa
BingoBoingo: asciilifeform: That. Or like Elliptic curve in lieu of RSA
TRS80_: shinohai: 2015-08-10T08:10:23+0000: Phuctored RSA Modulus, GCD=4294967297 (Thomas Hofmann <toho89@gmail.com>; ) <http://nosuchlabs.com/gpgkey/9AD29DC660DB7496B01D608486E6062A27E35F35C32CFD3E2F35FC1409374187#E5D971BED516F3DAD920A90EF1FC17998F15DC52F179A95E45EA559544E77A4D> | 2015-08-10T08:10:23+0000: Phuctored RSA Modulus, GCD=4294967297 (Julia Reda <reda.julia@googlemail.com>; ) (1 more message)
asciilifeform: and rsa is ~much~ simpler than, e.g., bitcoin.
asciilifeform: onlooker: consider, for instance, the predicament of somebody trying to correctly implement plain old rsa algo.
kakobrekla: gpg: encrypted with RSA key, ID 16B8E32E
mircea_popescu: gpg: encrypted with 4096-bit RSA key, ID 16B8E32E, created 2011-07-22
punkman: (and yes RSA keys can do both, it's just a flag gpg sets on the keys)
kakobrekla: punkman i hoped for 'gpg: encrypted with RSA key, ID 05D01131' or what
mircea_popescu: gpg: encrypted with RSA key, ID 3594E367
mircea_popescu: gpg: Signature made Wed 05 Aug 2015 12:13:13 AM ART using RSA key ID 01ABFFC7
ascii_field: gpg: Signature made Tue Aug 4 23:13:13 2015 EDT using RSA key ID 01ABFFC7
mircea_popescu: gpg: Signature made Wed 05 Aug 2015 12:13:13 AM ART using RSA key ID 01ABFFC7
asciilifeform: on top of this, i hope it is obvious to everyone that the problem of divining any bits of the private key from the public, mutilated or not, is equivalent to breaking rsa
punkman: "the most often observed fault during RSA-computations exposed to glitch attacks is the erroneous modification of the moduli."
punkman: and referenced in that: http://libra.msra.cn/Publication/1767685/on-authenticated-computing-and-rsa-based-authentication
assbot: Why One Should Also Secure RSA Public Key Elements ... ( http://bit.ly/1HfEKbp )
Adlai finds, while trying to type out the difference between this hunt (rsa factor collision) and that (reused/predictable k-values), that it's quite elusive
decimation: I should think rsa would fit in 8mb
asciilifeform: her name is udp with rsa payload.
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (Marco Hien ; ) <http://nosuchlabs.com/gpgkey/A627338D751C449EA54C0BA518ABCB2E215D939534F7D149C246EA9EA0D36279#2A71D1921B057ACB9C5258F5C984DF1048D6D0C9FE3FB03696525545C8A0BF98>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=459561500779 (Marco Hien ; ) <http://nosuchlabs.com/gpgkey/A627338D751C449EA54C0BA518ABCB2E215D939534F7D149C246EA9EA0D36279#3410BF059FEC317A7C927FDFD2A73249AED3B85E3AB4C4DE47EF4A23A091D5CA>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=3 (randomnoize (Tor relay operator) ; randomnoize (Tor relay operator) ; ) <http://nosuchlabs.com/gpgkey/9319605DD9BFB5972272003BC0D6D2E999783C7256A75BF1BE08178A359F9542#105DED03AF97CA6EDB6C41B47B7947A3B987A055C2756723E9C5671609CADB38>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Sven Arnold ; ) <http://nosuchlabs.com/gpgkey/DC9D7BC1ADFF9D074C29DA18CB7224920FDAABD2348152DE296A6293FF3C1914#1A76F4EB3DC6C31C58912BB58D3C9DCDC00B82C9614792BADBFB0CE75DE943B3>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Julia Reda ; ) <http://nosuchlabs.com/gpgkey/B412BD191BF10DAB6AAB6A8779A3F08D31AC5E3FB748DDBFB1DB18CDF05B6BEF#6269187B70BE0F1B4094A0DCA78923F50E78C97F8B3999BAB3DE5974003B393F>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Thomas Hofmann ; ) <http://nosuchlabs.com/gpgkey/9AD29DC660DB7496B01D608486E6062A27E35F35C32CFD3E2F35FC1409374187#E5D971BED516F3DAD920A90EF1FC17998F15DC52F179A95E45EA559544E77A4D>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=641 (Thomas Hofmann ; ) <http://nosuchlabs.com/gpgkey/9AD29DC660DB7496B01D608486E6062A27E35F35C32CFD3E2F35FC1409374187#5C36ECF7F72E7DF2F75AB382EDB5C4F3F55890F8AAC2E9A7BF79BCCCF7E24B07>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=3 (Joe Schmuckley; ) <http://nosuchlabs.com/gpgkey/976AAB6D6B7F325843FF0E3653C219B9D6738C5F016F72973E311181614ECAF5#928C2E1186A73348A919DFD04535B989BDD9497C80AE2DC96788955BFB99ECC9>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Andreas Heimann ; ) <http://nosuchlabs.com/gpgkey/C62FFD2679BE0909B2C7D7FB2356995AF9650D3E280600D31534FDB9A7F170A3#A325D14C8F2FC51D65A4157508CD1E626380D8E9F340A33F11BD25BF1936DCCF>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=3 (randomnoize (Tor relay operator) ; randomnoize (Tor relay operator) ; ) <http://nosuchlabs.com/gpgkey/9319605DD9BFB5972272003BC0D6D2E999783C7256A75BF1BE08178A359F9542#105DED03AF97CA6EDB6C41B47B7947A3B987A055C2756723E9C5671609CADB38>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (Marco Hien ; ) <http://nosuchlabs.com/gpgkey/A627338D751C449EA54C0BA518ABCB2E215D939534F7D149C246EA9EA0D36279#2A71D1921B057ACB9C5258F5C984DF1048D6D0C9FE3FB03696525545C8A0BF98>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=459561500779 (Marco Hien ; ) <http://nosuchlabs.com/gpgkey/A627338D751C449EA54C0BA518ABCB2E215D939534F7D149C246EA9EA0D36279#3410BF059FEC317A7C927FDFD2A73249AED3B85E3AB4C4DE47EF4A23A091D5CA>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=12884901891 (PGP Corporation Update Signing Key; PGP Corporation Update Signing Key ; ) <http://nosuchlabs.com/gpgkey/0D9057DA7AEE12C725AA9408D47F4FFC3769BEF7891A0F9C0A9F38420C5C08AB#F79436B629322C70C523BAA5BE0D3D4DDA011578F84122B8CA3ABD15C52A9567>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Sven Arnold ; ) <http://nosuchlabs.com/gpgkey/DC9D7BC1ADFF9D074C29DA18CB7224920FDAABD2348152DE296A6293FF3C1914#1A76F4EB3DC6C31C58912BB58D3C9DCDC00B82C9614792BADBFB0CE75DE943B3>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Julia Reda ; ) <http://nosuchlabs.com/gpgkey/B412BD191BF10DAB6AAB6A8779A3F08D31AC5E3FB748DDBFB1DB18CDF05B6BEF#6269187B70BE0F1B4094A0DCA78923F50E78C97F8B3999BAB3DE5974003B393F>
lobbesbot: New post: http://nosuchlabs.com/rss Phuctored RSA Modulus, GCD=4294967297 (Thomas Hofmann ; ) <http://nosuchlabs.com/gpgkey/9AD29DC660DB7496B01D608486E6062A27E35F35C32CFD3E2F35FC1409374187#E5D971BED516F3DAD920A90EF1FC17998F15DC52F179A95E45EA559544E77A4D>