Factoring as a Service

نویسندگان

  • Luke Valenta
  • Shaanan Cohney
  • Alex Liao
  • Joshua Fried
  • Satya Bodduluri
  • Nadia Heninger
چکیده

The difficulty of integer factorization is fundamental to modern cryptographic security using RSA encryption and signatures. Although a 512-bit RSA modulus was first factored in 1999, 512-bit RSA remains surprisingly common in practice across many cryptographic protocols. Popular understanding of the difficulty of 512-bit factorization does not seem to have kept pace with developments in computing power. In this paper, we optimize the CADO-NFS and Msieve implementations of the number field sieve for use on the Amazon Elastic Compute Cloud platform, allowing a non-expert to factor 512-bit RSA public keys in under four hours for $75. We go on to survey the RSA key sizes used in popular protocols, finding hundreds or thousands of deployed 512-bit RSA keys in DNSSEC, HTTPS, IMAP, POP3, SMTP, DKIM, SSH, and PGP.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Factoring Health Equations; Comment on “Do You Recommend an Interdisciplinary Field to Your Graduate Student?”

The International Journal of Health Policy and Management (IJHPM) is a new journal that aims to stimulate not only inter-disciplinary research relating to health, but even an entire new generation of such journals. The challenges of improving human health worldwide clearly suggest ‘why’ such a journal is needed, but ‘how’ bridges and junctions across fields of study towards this end might be fo...

متن کامل

Validation of Self-Directed Learning Scale in Students of Isfahan University of Medical Sciences

Introduction: As a method of instruction in adult education, Self-directed Learning has been widely used in universities across the globe. This study aimed to validate Self-directed Learning Scale (SRSSDL) in Students of Isfahan University of Medical Sciences. Methods: In this cross-sectional survey study, 400 students of Isfahan University of Medical Sciences completed a self-directed learn...

متن کامل

Interrelation Among RSA Security, Strong Primes, and Factoring

The security of RSA depends critically on the inability of an adversary to compute private key from the public key. The problem of computing private key from public key is equivalent to the problem of factoring n into its prime factors. Therefore it is important for the RSA user to select prime numbers in such a way that the problem of factoring n is computationally infeasible for an adversary....

متن کامل

Factorization-Based Fail-Stop Signatures Revisited

Fail-stop signature (FSS) schemes are important primitives because in a fail-stop signature scheme the signer is protected against unlimited powerful adversaries as follows: Even if an adversary breaks the scheme’s underlying computational hard problem and hence forges a signature, then with overwhelming probability the signer is able to prove that a forgery has occurred (i.e. that the underlyi...

متن کامل

On the Construct Validity of the Reading Section of the University of Tehran English Proficiency Test

University of Tehran administers a test known as The University of Tehran English Proficiency Test (the UTEPT) to PhD candidates on a yearly basis. By definition, the test can be considered a high-stakes one. The validity of high stakes tests needs to be known (Roever, 2001). As Mesick (1988) maintains, if the validity of high stakes tests are not known, it might have some undesirable consequen...

متن کامل

Factoring Algorithms

c © Eli Biham May 31, 2010 274 Factoring Algorithms (10) Factoring Algorithms (cont.) The factoring problem is as old as mathematics. It is known that Fermat sent a letter to other mathematicians proving he can factor numbers whose factors were not known earlier. However, the ability to factor was never a major problem, as number theory never had any application in daily use. This was changed w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015