log☇︎
5134 entries in 0.95s
asciilifeform: alphonse23_: http://doc.sagemath.org/html/en/thematic_tutorials/numtheory_rsa.html << worked examples
asciilifeform: alphonse23_: rsa is not especially complicated. you can understand the basic idea after an hour's study
williamdunne: RSA in general
asciilifeform: or rsa in general
alphonse23_: for instance, I'd like to actually understands rsa factoring
trinque: alphonse23_: note that this does not mean RSA in the abstract is broken
alphonse23_: this is the channel that announced that they factore a 4067 rsa key
pete_dushenski: "As in the great days of the Studio System, NSA's star male lead spent a lot of time loaned out to other studios this Spring. The critically panned "RSA In The Soup!" trilogy was just packaged recently, while filming for the Thermonuked Chicken Saga continues." << haha priceless
Lk4_DPB: i was at some event in milano and they talked about assets as a the place that knoews best about bitcoin adn that discovered a probem with rsa keys
jurov: i mean there can be multiple rsa keys in one gpg key, no?
asciilifeform: (key containing no rsa moduli will not be stored or processed)
asciilifeform: jurov: phuctor deals -only- with rsa moduli.
jurov: yes, but gpg keys are not pure rsa
asciilifeform: beyond this, it helps to review how rsa works.
asciilifeform: ;;later tell mircea_popescu paused pump, resumed werker. we have around 1/4 of the total rsa keys available submitted (or processed) at this point.
asciilifeform: incidentally, it would be a mistake to conclude that nsa was specifically raging against rsa and only it
decimation: "Steve?s design was rejected, not because it was unsound, but because NSA did not want to see ANY encryption work going on in the public domain ARPA project, some say because they did not want to see the world be ?too secure? by default. (Rivest and friends had just invented RSA, and the government was trying to declare it Top Secret, then later prohibited under ITAR munitions control export laws)."
assbot: Logged on 27-05-2015 09:23:44; mircea_popescu: Other issues with ZKP include the RSA private key used to initiate the accumulator, which must be trusted to be destroyed by the generating party. << for the record, this isn't "other issues". this is enough to render the entire thing a joke.
mircea_popescu: Other issues with ZKP include the RSA private key used to initiate the accumulator, which must be trusted to be destroyed by the generating party. << for the record, this isn't "other issues". this is enough to render the entire thing a joke. ☟︎
mircea_popescu: <ascii_field> incidentally, the thing mircea_popescu suggested doing in his article, http://trilema.com/2015/the-universal-rsa-keys - won't work <<
mircea_popescu: as to the symmetries : http://trilema.com/wp-content/uploads/2015/05/rsa-mystery-one.png for instance doesn't seem like it's 100% bit shifted
ascii_field: incidentally, the thing mircea_popescu suggested doing in his article, http://trilema.com/2015/the-universal-rsa-keys - won't work
asciilifeform: mircea_popescu: nope. last night when got home, turned on experiment where it snarfs from pre-filtered (i.e. having rsa moduli) keys
mircea_popescu: but no, what i want is dual rsa-cs for b-a's dream-reimplementaton of pgp
mircea_popescu: is rsa 4096 bit a guarantee you will have an n 4096 bits long (i think) or is it actually you will have two primes 2048 bits long each, with high bit set each.
mircea_popescu: not as in "what rsa means", as in "what rsa 4096" means
mats: https://crypto.stackexchange.com/questions/5791/why-is-it-important-that-phin-is-kept-a-secret-in-rsa
scoopbot_revived: The "universal" RSA keys http://trilema.com/2015/the-universal-rsa-keys/
kakobrekla bets on rsa
Apocalyptic: "RSA e(17 bits) - 01 00 01" on the last two Public Subkey Packet
asciilifeform: http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/#comment-114308
mircea_popescu: http://log.bitcoin-assets.com/?date=21-05-2015#1142235 << so wait, we have actual experimental confirmation for the fabled http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/#selection-383.0-383.773 ?! ☝︎
asciilifeform: jurov: http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations
mircea_popescu: he quotes "Note that it is not said nor implied here that there's any sort of theoretical vulnerability related to using 65537 as an exponent for RSA.". the full quote is "Note that it is not said nor implied here that there's any sort of theoretical vulnerability related to using 65537 as an exponent for RSA. The point is that you don't know what exact implementation flaws the NSA is or may be relying on, and for this
mircea_popescu: http://security.stackexchange.com/questions/89787/choose-your-own-exponents-in-rsa
ascii_field: Hasimir: yes. you can write a proggy to create this type of key from any rsa pubkey you like.
ascii_field: incidentally, i just walked the totality of sks db looking for -all- rsa keys with pub-exponents equal to 281479271743489.
ascii_field: downloaded most RSA keys from a keyserver and tried to factor....'
ascii_field: ;;later tell mircea_popescu http://blog.spaf.us/post/119499216803/two-security-researchers-break-rsa-4096-bit-keys << hard to even believe. someone ought to contact the man (assuming he exists in life) and ask, if he shat this out
asciilifeform: mircea_popescu: expect a great many of these 'will unseat rsa' idiocies.
asciilifeform: hence the immediate angle of 'omg1111!!!111!11 rsa broke'
mircea_popescu: asciilifeform the amusing tactical implication here is that well... they actually would have loved to say rsa is bad.
asciilifeform: 'consider this excellent snake oil to replace tired old rsa' aha.
asciilifeform: in other news, the buggers know no bounds, http://www.networkworld.com/article/2925215/security0/new-protocol-from-guardtime-hopes-to-unseat-rsa-for-authentication-digital-signatures.html
assbot: Logged on 21-05-2015 06:59:12; mircea_popescu: http://netsledov.ru/issledovateli-bezopasnosti-vzlomali-4096-bitnye-rsa-kluchi/ moar ru. apparently they really like alf.
mircea_popescu: http://netsledov.ru/issledovateli-bezopasnosti-vzlomali-4096-bitnye-rsa-kluchi/ moar ru. apparently they really like alf. ☟︎
mircea_popescu: http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/#comment-114287 << achtung asciilifeform
scoopbot_revived: The issue of exponents in RSA http://trilema.com/2015/the-issue-of-exponents-in-rsa/
BingoBoingo: mircea_popescu: tbh, someone has to explain this "subkeys" retardation to me sometime. fucking pseudohierarchy devoid of meaning. << Within your big GPG keyblock you can have multiple keys, say a 4096 RSA for signing and another 4096 to encrypt to. Beyond that you can keep stuffing moar keys in there just because...
ascii_field: Apocalyptic: as a general rule, an rsa modulus generated without regard to rules (primality testing, pollard-rho, the lot) is cheap to factor.
ascii_field: mircea_popescu: quite a few. which is consistent with the 'random bits make terrible rsa moduli' thing.
ascii_field: and the panic is entirely the work of the enemy, who is passing around the idiot strawman that 'rsa was broken. oh wait, no it wasn't! disregard the whole thing!'
ascii_field: Hasimir: so far each of the cases i have examined in detail had -at least one- legit rsa modulus in subkeys
ascii_field: Hasimir: the shenanigans exposed appear to have an intent which includes - but not necessarily limited to - passing off spurious rsa keys for various names
ascii_field: Hasimir: understand, someone can create a key containing an rsa modulus of the kind described here using a modified copy of your, e.g., el gamal, key
mircea_popescu: if he also has a rsa key by the same name, he will be in the list of rsa keys.
Hasimir: you only deal with rsa, you only claim to have rsa priv keys, but you list dsa/elgamal keys as broken ...
mircea_popescu: it's a rsa factorization service.
ascii_field: Apocalyptic: there is a reason why generating proper rsa keys is cpu-expensive
ascii_field: the experiment specifically concerns moduli, not keys. a key contains zero or more rsa moduli
mircea_popescu: well, it would be the rsa wouldn't it.
Hasimir: it has an rsa signing subkey
ascii_field: Hasimir: we only see it here if it had one or more rsa subkeys.
Hasimir: RSA flaw?
ascii_field: violates every assumption behind hardness of rsa, yes
Apocalyptic: (note that this isn't even stricly a RSA key anymore)
Apocalyptic: I mean you can get a standard 4096-bit sane RSA key, multiply N by 3 and there you go
mircea_popescu: ascii_field : http://security.stackexchange.com/questions/89713/offline-rsa-strong-prime-test-similar-to-phuctor << shilling intensifies!
BingoBoingo: Updated http://qntra.net/2015/05/weak-4096-bit-rsa-key-in-strong-set-factored-more-factored-keys-follow/
ascii_field: in other news, herr kaspersky let in comment: https://threatpost.ru/2015/05/20/otstavit-paniku-4096-bitnye-rsa-klyuchi-ne-skomprometirovany/#comment-36991
mircea_popescu: "Some widely deployed RSA implementations choke on big RSA public exponents. E.g. the RSA code in Windows (CryptoAPI, used by Internet Explorer for HTTPS) insists on encoding the public exponent within a single 32-bit word; it cannot process a public key with a bigger public exponent."
Hasimir: no, not seriously, there's a big difference between some bunch of people with crap entropy sources and rsa being borked
mircea_popescu: http://log.bitcoin-assets.com/?date=20-05-2015#1139775 << ahahaha wait seriously !? because of teh rsa ? ☝︎
Hasimir: assuming rsa isn't screwed by then, of course ;)
asciilifeform: 'debunked, rsa not broken' << 'this thread is about kittenz' (TM)
asciilifeform: mircea_popescu: ru lags as usual, https://threatpost.ru/2015/05/20/otstavit-paniku-4096-bitnye-rsa-klyuchi-ne-skomprometirovany
mircea_popescu: cat trilema-20may2015.txt | grep -c "more-factored-rsa-keys-and-assorted-other-considerations"
mircea_popescu: davout 138.More factored RSA keys, and assorted other considerations (trilema.com)3 points by davout 2 hours ago | discuss << it's greyed out, so i guess it got neg'd somehow.
asciilifeform: mircea_popescu: item in question treated rsa weakening from the use of peculiarly large exponents.
scoopbot_revived: More factored RSA keys, and assorted other considerations http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/
mircea_popescu: http://trilema.com/2015/more-factored-rsa-keys-and-assorted-other-considerations/
mircea_popescu: unrelatedly, for the journos and other news fiends watching the log : i came to a resolution of a major sticking point re the rsa factorisation thing, large article coming in a few hours.
mod6: gnupg v1.4.13's rsa.c yup
trinque: ahaha this is rsa.c
trinque: Congressman Mike Rogers told the RSA audience more than once that metadata in bulk surveillance collection "is just the 'To: From:' like the front of an envelope."
ascii_field: http://www.zdnet.com/article/the-dhs-brings-its-infantile-cyber-fantasy-world-to-rsa-2015 << l0ltr0n1c
jurov: did they found the rsa keys?
justJanne: I wonder how much calculation power it would take to break 4096-bit RSA.
justJanne: davout: discussion about RSA, tbh.
deedbot-: [Trilema] On how the factored 4096 RSA keys story was handled, and what it means to you. - http://trilema.com/2015/on-how-the-factored-4096-rsa-keys-story-was-handled-and-what-it-means-to-you/
assbot: Logged on 18-05-2015 14:23:20; asciilifeform: http://news.softpedia.com/news/Researchers-Break-RSA-4096-Bit-Keys-481475.shtml << oddly, one fishwrap got the name spelled.
Apocalyptic: <ascii_field> at least one falls under the classical 'generated and correctly signed with dud key' // is that key at least a classic RSA key, meaning its modulus consists of only 2 prime factors as opposed to the case discussed yesterday ?
asciilifeform: http://news.softpedia.com/news/Researchers-Break-RSA-4096-Bit-Keys-481475.shtml << oddly, one fishwrap got the name spelled. ☟︎
BingoBoingo: http://www.reddit.com/r/programming/comments/36c3ac/weak_4096_bit_rsa_key_in_strong_set_factored_more/
mircea_popescu: ‘Holy shit, they broke RSA!’ or ‘This is false advertising, they didn’t really do anything!’ imbeciles, << no but it's THE CONTROVERSY
asciilifeform: http://www.theregister.co.uk/2015/05/18/big_rsa_keys_are_vulnerable_says_researcher << more lulz
BingoBoingo: On standby for errors http://qntra.net/2015/05/weak-4096-bit-rsa-key-in-strong-set-factored-more-factored-keys-follow/
justJanne: For RSA you obviously need groups, spaces, bodies, rings, etc.
justJanne: Right now I'm taking second semester classes, last week homework was doing RSA on paper.
justJanne: decimation: that's true. RSA keygens use a probabilistic prime test.