Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 24 Jun 2012 15:26:42 -0400
From:      Robert Simmons <rsimmons0@gmail.com>
To:        freebsd-security@freebsd.org
Subject:   Re: Hardware potential to duplicate existing host keys... RSA DSA ECDSA was Add rc.conf variables...
Message-ID:  <CA%2BQLa9BA5%2BQ%2BwdiUaUPTRWP5RSQXWWF80EB_FLVjpMC2dt_GXg@mail.gmail.com>
In-Reply-To: <op.wge77quh34t2sn@skeletor.feld.me>
References:  <CA%2BQLa9A4gdgPEn3YBpExTG05e4mqbgxr2kJ16BQ27OSozVmmwQ@mail.gmail.com> <op.wge77quh34t2sn@skeletor.feld.me>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, Jun 24, 2012 at 2:56 PM, Mark Felder <feld@feld.me> wrote:
> On Sun, 24 Jun 2012 13:34:45 -0500, Robert Simmons <rsimmons0@gmail.com>
> wrote:
>
>> In light of advanced in processors and GPUs, what is the potential for
>> duplication of RSA, DSA, and ECDSA keys at the current default key
>> lengths (2048, 1024, and 256 respectively)?
>>
>
> I've been able to duplicate keys for years simply using cp(1)
>
> Define "duplicate". Are you asking about some sort of collision? Are you
> asking about brute forcing an encrypted stream and deducing what the private
> key is?

Collisions or brute forcing an encrypted stream, either one.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2BQLa9BA5%2BQ%2BwdiUaUPTRWP5RSQXWWF80EB_FLVjpMC2dt_GXg>