Newsletter Archives
-
MS-DEFCON 2: 24H2 is around the corner
ISSUE 21.36.1 • 2024-09-05 By Susan Bradley
I can always tell when fall is in the air.
No, it’s not a decrease in temperatures — we’re still very hot here in Central California. No, it’s not that pumpkin-spice aroma around coffee shops.
It’s the technology headlines about imminent updates from Redmond and Cupertino. Naturally, that means I’m raising the MS-DEFCON level to 2. Here are a few things you should consider.
Anyone can read the full MS-DEFCON Alert (21.36.1, 2024-09-05).
-
Goodin: Millions of high-security crypto keys crippled by newly discovered flaw
What a morning for security news!
Unlike the KRACK announcement – factually correct, certainly disturbing, but nothing to worry about at the moment – this is a horse of a much darker color.
Dan Goodin reports in Ars Technica about a newly discovered flaw in public key encryption that uses RSA Library version v1.02.013. Quoting Graham Steel at Cryptosense:
It means that if you have a document digitally signed with someone’s private key, you can’t prove it was really them who signed it. Or if you sent sensitive data encrypted under someone’s public key, you can’t be sure that only they can read it. You could now go to court and deny that it was you that signed something—there would be no way to prove it, because theoretically, anyone could have worked out your private key.
It’s a complex issue with immediate ramifications. IF you thought that fancy 2048-bit encrypted key is going to protect you, think again:
When generated properly, an RSA key with 2048 bits should require several quadrillion years to be factorized with a general-purpose computer… While costs and times vary for each vulnerable key, the worst case, factorizing a 2048-bit RSA key generated with the faulty Infineon library … would require no more than 17 days and $40,300 using a 1,000-instance machine on Amazon Web Service and $76 and 45 minutes to factorize an affected 1024-bit key.
What can you do about it? Nothing, unless you’re distributing RSA keys. But be on the lookout for new keys — ones generated by a different RSA library, or a different method entirely. If someone gives you a new ID card, this vulnerability could be at the heart of it.