Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | Next revisionBoth sides next revision | ||
public:papers:rsa_ccs17 [2018-01-24 08:19] – [ROCA: Vulnerable RSA generation (CVE-2017-15361)] xsvenda | public:papers:rsa_ccs17 [2018-01-24 08:19] – [ROCA: Vulnerable RSA generation (CVE-2017-15361)] xsvenda | ||
---|---|---|---|
Line 3: | Line 3: | ||
**< | **< | ||
- | **Date: 16th October, 2017** | + | **Release date: 16th October, 2017** |
A newly discovered vulnerability in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AG allows for a practical factorization attack, in which the attacker computes the private part of an RSA key. The attack is feasible for commonly used key lengths, including 1024 and 2048 bits, and affects chips manufactured as early as 2012, that are now commonplace. Assess your keys now with the provided [[https:// | A newly discovered vulnerability in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AG allows for a practical factorization attack, in which the attacker computes the private part of an RSA key. The attack is feasible for commonly used key lengths, including 1024 and 2048 bits, and affects chips manufactured as early as 2012, that are now commonplace. Assess your keys now with the provided [[https:// |