Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Math Advance Threatens Computer Security
DISCOVER ^ | 12.28.2007 | Stephen Ornes

Posted on 01/04/2008 10:44:14 PM PST by neverdem

An international team of mathematicians announced in May that they had factored a 307-digit number—a record for the largest factored number and a feat that suggests Internet security may be on its last legs.

“Things are becoming less and less secure,” says Arjen Lenstra, a computer scientist at the École Polytechnique Fédérale (EPFL) in Switzerland, who organized the effort.

Messages in cyberspace are encrypted with a random 1,024-bit number generated by multiplying two large primes together. But if hackers using factorization can break the number into its prime multipliers, they can intercept the message. Factorization currently takes too long to be a serious threat, but that may soon change.

Lenstra and his colleagues chose the number (21,039 – 1), which weighs in at 1,017 bits—slightly less than the 1,024-bit numbers used to secure Internet messages. His team used the special number field sieve, a filtering method first suggested by John Pollard in 1988, to find the factors.

For a hacker using a single computer, the job would have required a hundred years of processing time. By sharing the load over about 500 computers, however, Lenstra and his collaborators reduced that time to six months.

Although Lenstra’s number is close in size to those used for online security, he estimates that it would be more than a thousand times as difficult to crack a random 1,024-bit number. He says it could happen in the next decade, though, in light of rapidly accelerating technology.


TOPICS: Business/Economy; Culture/Society; Government; News/Current Events; Technical
KEYWORDS: computer; cryptography; encryption; math; mathematics; privacy; science; security; tech
Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last

1 posted on 01/04/2008 10:44:15 PM PST by neverdem
[ Post Reply | Private Reply | View Replies]

To: neverdem

One hopes that within a decade, we can up the bit size of keys again.


2 posted on 01/04/2008 10:48:05 PM PST by js1138
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

I guess I’m missing something here but using 500 computers and cracking a code in 6 months that’s only 1/1,000 as difficult as the typical internet encrypted message doesn’t seem like a serious immediate threat. Certainly not worthy of the headline.


3 posted on 01/04/2008 10:49:04 PM PST by saganite (Lust type what you what in the “tagline” space)
[ Post Reply | Private Reply | To 1 | View Replies]

To: js1138

I’m pretty sure they’re talking about asymetric (public key) encryption. What about symetric? How about asymetric for the sole purpose of exchanging symetric keys?...then using the symetric keys for stream encryption...such as the alphabet angencies do now? :-) The only truly effective way to crack that is with somebody willing to hand over the key tapes!


4 posted on 01/04/2008 10:55:45 PM PST by hiredhand (My kitty disappeared. NOT the rifle!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: All

And, of course, if we go to 2048 bit keys, that’d take well into the next millenia (unless they get those quantum computers up).

Bottom line, there is no perfect or ‘forever’ security. It’s only for ‘how long’. Usually that is something that can be made long enough. The article’s primary interest, really, is that they made some guy’s theory from 1988 work.


5 posted on 01/04/2008 10:57:01 PM PST by farlander (Try not to wear milk bone underwear - it's a dog eat dog financial world)
[ Post Reply | Private Reply | To 3 | View Replies]

To: neverdem
It might take a while, but as the old saying goes, "if one man can make it, another man can break it".
6 posted on 01/04/2008 11:05:27 PM PST by JoJo Gunn (Help control the Leftist population. Have them spayed or neutered. ©)
[ Post Reply | Private Reply | To 1 | View Replies]

To: js1138

On the Tuesday after someone posts their hack for the 1,024 bit key Microsoft will send out the 2,048 bit patch. Most of our computers will then die. MS will, of course, point out that if we upgrade to Vista everything will be just dandy...for a while.


7 posted on 01/04/2008 11:05:54 PM PST by PeterFinn (A muslim in the White House would be an Obamination.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: PeterFinn

Actually the government is the agency that limits encryption key length.


8 posted on 01/04/2008 11:17:00 PM PST by js1138
[ Post Reply | Private Reply | To 7 | View Replies]

To: neverdem

don’t most ssl sites (e.g. paypal) use 128 bit encryption and/or 256 bit encryption?


9 posted on 01/04/2008 11:27:07 PM PST by vbmoneyspender
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem
By sharing the load over about 500 computers, however, Lenstra and his collaborators reduced that time to six months.

Botnets are significantly larger, with 20,000 or more zombie hosts (source). That six months time span could be shortened dramatically by using a botnet...

10 posted on 01/05/2008 12:01:24 AM PST by rabscuttle385 (It takes courage to grow up and turn out to be who you really are.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: saganite; farlander; JoJo Gunn; PeterFinn; rabscuttle385; js1138; hiredhand
Elcomsoft turns your PC into a password cracking supercomputer (gulp)

Posted Oct 24th 2007 9:16AM by Thomas Ricker
Filed under: Misc. Gadgets

alt
 

You know all that talk about GPUs being the new CPUs? Well it's not just a lot of hot, ventilated air. Thanks in large part to the launch of development kits like nVidia's CUDA, Russian outfit Elcomsoft has just filed for a US patent which leverages GPUs to crack passwords. Their approach harnesses the massively parallel processing capabilities of modern graphics cards to make minced-meat of corporate-strength password protection. An NTLM-hashed Microsoft Vista password, for example, can now be cracked in 3 to 5 days (instead of two months) using a simple, off-the-shelf, $150 graphics card -- less complicated passwords can take just minutes. Dial the GPU up to an $800 GeForce 8800 Ultra and Elcomsoft's approach will crack passwords at a rate some 25 times faster than existing CPU-only approaches. Yippee?

[Via NewScientist, thanks Sultan]

Read [warning: PDF]

http://www.engadget.com/2007/10/24/elcomsoft-turns-your-pc-into-a-password-cracking-supercomputer/

11 posted on 01/05/2008 12:37:56 AM PST by CarrotAndStick (The articles posted by me needn't necessarily reflect my opinion.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: neverdem

Ha, ha. They’ll decrypt my e-mail, and gain this secret, “Sorry I couldn’t come last night. I was tired after messing with the kids all day. Shall we meet tomorrow instead for lunch?”!


12 posted on 01/05/2008 12:41:44 AM PST by guitarist
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem
Lenstra and his colleagues chose the number (21,039 – 1)

That is called a Mersenne number, a special class of numbers 2n-1. The mathematics for searching for Mersenne primes among these special numbers is well known. They have found primes up to n=32,582,657.

No RSA knapsack algorithm is going to use a Mersenne number as a factor in computing a totient function.

That is not to say that a fast general factorization method won't be discovered tomorrow, but this ain't it.

13 posted on 01/05/2008 1:21:26 AM PST by Gideon7
[ Post Reply | Private Reply | To 1 | View Replies]

To: El Gato; Ernest_at_the_Beach; Robert A. Cook, PE; lepton; LadyDoc; jb6; tiamat; PGalt; Dianna; ...
New Route For Heredity Bypasses DNA

Egypt: 4 Women Die of Bird Flu

Judge Imposes Stricter Rules on Navy to Protect Marine Life (limits Navy use of medium-range sonar)

FReepmail me if you want on or off my health and science ping list.

14 posted on 01/05/2008 1:23:54 AM PST by neverdem (Call talk radio. We need a Constitutional Amendment for Congressional term limits. Let's Roll!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CarrotAndStick

I gues it won’t only be gamers using Nvidia new nforce 780i chipset. Nothing like a having 3 GeForce 8800 GXT or Ultras, 8 Gigs of Ram and a Intel Core 2 Extreme QX9650 overclocked from 3 to 4GHZ. Of course this will cost at least $5000. Then again if you can break into banks...


15 posted on 01/05/2008 1:40:27 AM PST by rmlew (Felix sit novus annus)
[ Post Reply | Private Reply | To 11 | View Replies]

To: js1138
Actually the government is the agency that limits encryption key length.

Hehehe... because they don't like waiting 6 months...

16 posted on 01/05/2008 2:04:43 AM PST by AmericaUnited
[ Post Reply | Private Reply | To 8 | View Replies]

To: hiredhand
I’m pretty sure they’re talking about asymetric (public key) encryption. What about symetric? How about asymetric for the sole purpose of exchanging symetric keys?...then using the symetric keys for stream encryption...such as the alphabet angencies do now? :-) The only truly effective way to crack that is with somebody willing to hand over the key tapes!
This is how SSL works, so it's what is done for every HTTPS connection you make with your browser. There is a validation of the server's certificates, followed by a key exchange phase using asymmetric encryption, followed by the actual SSL data connection which uses symmetric encryption. During the key exchange phase a shared secret is exchanged, which is then used as the key in the symmetric encryption. The primary reason for this is that the symmetric encryption is less computationally expensive than asymmetric.
17 posted on 01/05/2008 3:23:19 AM PST by Scutter
[ Post Reply | Private Reply | To 4 | View Replies]

To: hiredhand
We're probably AOK until Diffie-Hellman bites the dust.

The ultimate form of encryption is the good, old-fashioned lie. :)

18 posted on 01/05/2008 3:57:19 AM PST by The Duke (I have met the enemy, and he is named 'Apathy'!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: neverdem
An international team of mathematicians announced in May

curious as to this timing - The government is more heavy-handed with controlling computer encryption than just about anything else imo.

Anyone wanting to know the background behind computer "keys" and history of government intervention should read Steven Levy's entertaining book, "Crypto: How the Code Rebels Beat the Government - Saving Privacy in the Digital Age".

19 posted on 01/05/2008 6:22:53 AM PST by LurkedLongEnough (Music washes away the dust of every day life. ---Art Blakey)
[ Post Reply | Private Reply | To 1 | View Replies]

To: neverdem

Thanks neverdem. Also of interest:

Free Software Brings Affordability, Transparency To Mathematics
ScienceDaily | Dec. 7, 2007 | ScienceDaily and University of Washington.
Posted on 01/05/2008 12:28:08 AM EST by Ernest_at_the_Beach
http://www.freerepublic.com/focus/f-chat/1948617/posts


20 posted on 01/05/2008 6:52:15 AM PST by SunkenCiv (https://secure.freerepublic.com/donate/____________________Profile updated Sunday, December 30, 2007)
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-58 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson