zlacker

[parent] [thread] 4 comments
1. EthanH+(OP)[view] [source] 2014-12-29 01:31:02
Yes and given that I'm kinda surprised we haven't seen any docs talking about breaking 1024-bit RSA. That should have been their bread and butter, at least as far as DNI is concerned, a few years ago.
replies(1): >>tptace+5
2. tptace+5[view] [source] 2014-12-29 01:33:18
>>EthanH+(OP)
What 'yuhong said: it could be expensive, with NSA having the capability to break only one every couple months. They might need to carefully coordinate which keys they break, in which case it would be an important secret which CA keys were broken.
replies(1): >>xnull2+w7
◧◩
3. xnull2+w7[view] [source] [discussion] 2014-12-29 05:33:46
>>tptace+5
Do you think that the NSA would bother breaking CA keys? We know that they have shadow certificates and have much success infiltrating CAs to steal their keys and that they have been able to forge them without having to break the keys (via the previously unknown MD5 collision - as they did for Stuxnet. Seems to me like there are more valuable certs to go after (diplomats' certs, smartcard certs, OS update certs, ...).
replies(1): >>spacef+Qd
◧◩◪
4. spacef+Qd[view] [source] [discussion] 2014-12-29 09:14:59
>>xnull2+w7
So many "diplomats' certs" are used in machines by Crypto AG from Switzerland. And guess what, they had one major incident years ago - and even people working there have simply no clue who owns and control the company.

I'd say most of commercial crypto systems are rigged. https://pbs.twimg.com/media/B5-aW_8CEAAUzji.jpg:large

replies(1): >>EthanH+lo
◧◩◪◨
5. EthanH+lo[view] [source] [discussion] 2014-12-29 13:43:18
>>spacef+Qd
I've been interested in Crypto AG for many years and would like to know more. Do you have a source that Crypto AG is still used to store certs that diplomats use?

I guess there is this: http://www.crypto.ch/en/solutions/crypto-secure-diplomatic-m...

[go to top]