RSA-640 Factored 299
gslin writes to tell us MathWorld News is reporting that RSA-640 has been factored. F. Bahr, M. Boehm, J. Franke, and T. Kleinjung, memebers of the German Federal Agency for Information Technology Security (BSI) announced they had cracked the 193-digit number last Friday using the General Number Field Sieve. The team purportedly used 80 opteron CPUs and 5 months to achieve victory.
easy (Score:5, Funny)
What do I win?
Re:easy (Score:2)
Re:easy (Score:2)
Re:easy (Score:2)
(2 * 2 ^ 2) * 2 * ( 2 * 2 ^ 2 ) * (2 + i) * (2 - i)
Time to turn off the Internet... (Score:4, Funny)
Factor? (Score:2, Interesting)
Seriously, this is interesting stuff. Of course, everytime we come up with a new security mechanism, computing power will overcome it. Fortunately, not everyone can do this sort of thing, and it takes time. But, as a mathematician, it is interesting to see both the methods used to crack this sort of thing, and, at least to me, more interestingly, the methods that are used to come up with new encryption systems. I cannot wait to see what will occur in several years, and even bigger pr
Re:Factor? (Score:5, Insightful)
-Not always true. Say I can come up with a 2048 bit encryption, that is just increase the key size from 256 to 2048, I can to that in a second. It is going to take _a lot more time_ for the computing power to overcome that increase.
If quantum computing will come around, I'll just switch to quantum encryption. Then you'll have to break the laws of QM to "break" the scheme. There are already rudimentary quantum encryption devices but there are no quantum computers that can take on even a 64 bit key space.
The best bet instead of brute force is to do "human engineering" and look for other ways to obtain the information. The inherent math of the algorithm is rarely the weakest link, it is the people and then the particular implementations of the algorithms that are exploited the most.
Re:Factor? (Score:2)
At least when most people say it, they seem to talk about using the laws of quantum physics to detect eavesdroppers on a fiber optic line.
Wikipedia's article on quantum cryptography seems to agree.
http://en.wikipedia.org/wiki/Quantum_cryptography [wikipedia.org]
Re:Factor? (Score:3, Insightful)
The 'encryption' does take place - it is encoding information using quantum states (so far photon polarization or particle entanglement) which would make
Re:Factor? (Score:3, Funny)
And yes, I am a Tom Clancy fanboy
Re:Factor? (Score:2)
I'm too lazy to dig up references for this, some karma whore can search eprint/arXiv and add the re
Re:Factor? (Score:2)
There are a couple of schemes of using quantum states/encoding to create a communication channel such that eavesdropping can be detected, thus eliminating the "man-in-the-middle" attacks. One can use the "action at a distance" or enanglement or one can also use the fact that states that are not orthogonal to each other cannot be reliable detected and that 'entangled' particles
Re:Factor? (Score:5, Interesting)
Re:Factor? (Score:5, Funny)
Bill Gates wrote something similar in The Road Ahead:
The obvious mathematical breakthrough would be development of an easy way to factor large prime numbers.
Sorry to break it to you boys but I know an algorithm that can do that in constant time: the factors of any prime number are 1 and the number itself.
Re:Factor? (Score:2)
It has already been done a couple of times, but is still too expensive for mass production, but there _i
Re:Factor? (Score:3, Informative)
1) You factor large COMPOSITE numbers, not large prime numbers.
2) P = NP is almost surely false. I mean, it's not proven, but it's not like anybody believes it to be true. It would just be too damn incredible if it were true.
3) What do you mean "encryption wont be possible"??? Just because you can factor large numbers quickly, doensn't mean you can encrypt stuff. You can't use RSA, that's true, but there are other asymetric ciphers. AES will sure as hell stil
Re:Factor? (Score:3, Informative)
Nonsense. First of all, factoring per se only affects RSA encryption.
It's likely that a major advance in factoring would also affect the security of Diffie-Hellman key exchange and ElGamal encryption, but it's not an absolute certainty
Re:Factor? (Score:4, Insightful)
Re:Factor? (Score:3, Informative)
Network based attack are far more common that physical attacks for a lot of good reasons. The main ones are:
1. Need for proximity is often removed
2. There is anonimity (much of the time)
3. There are less legal consquenses
4. Culpability is harder to prove (Log files don't stand
Re:Factor? (Score:3, Informative)
Re:Factor? (Score:2)
So practically you don't really get better or "more" secure encryption by using 2048 bi
Congrats (Score:2, Funny)
Now what was the question
Hmmm. (Score:5, Funny)
Re:Hmmm. (Score:5, Interesting)
Regards,
Steve
Re:Hmmm. (Score:2)
Re:Hmmm. (Score:2, Interesting)
Re:Hmmm. (Score:2)
Re:Hmmm. (Score:2)
Processor time? (Score:2, Interesting)
Re:Processor time? (Score:2, Informative)
Re:Processor time? (Score:2, Informative)
algorithms run time) is actually sequential and can not be parallelized in any way shape or form.
Arash Partow
Re:Processor time? (Score:2)
Re:Processor time? (Score:3, Informative)
The CPU time spent on finding these factors by a collection of parallel computers amounted very approximately to the equivalent of 55 years work for a single 2.2 GHz Opteron-based computer. Although that's a rough approximation, it certainly puts the magnitude of effort cracking these numbers involves.
Re:Processor time? (Score:2)
Also bear in mind that increasing the size of the number by a single binary digit doubles the search space needed to find a solution. RSA-640 has, obviously, 640 binary digits. However, most common RSA keys have at least 1024 bits, and some have upwards of 4000 bits. Do the math and you can see that there's a loooong way to go before anything that is currently being used will be cracked in
Re:Processor time? (Score:5, Informative)
We're not talking about symmetric cryptography here. We're dealing with large prime numbers and lots of funny math. The General Number Field Sieve factoring algorithm is not O(2^n) like a brute force search on AES would be. The actual order of growth of the GNFS algorithm is:
This can be found numerous places on the web. So adding one bit to your RSA key does far, far less for you than adding one bit to symmetric cipher like AES. You can do the math yourself, but you'll find that you need to add >>1 bits to an RSA key to double its strength.
Re:Processor time? (Score:3, Informative)
It looks like a 1024-bit number will take about 73,500 times as long as a 640-bit number to factor using GNFS. Which correlates to about 2.4 million Opteron-years, based on the German factoring of RSA-640.
Here's a table:
bits|GNFS complexity
384| 8.09434E+16
512| 1.75249E+19
640| 1.78448E+21
768| 1.07460E+23
896| 4.37451E+24
1024|1.31176E+26
1536|1.30666E+31
2048|1.52656E+35
3072|5.77594E+41
4096|1.28186E+47
My understanding of GNFS is that only the sieving
Re:Processor time? (Score:3, Interesting)
And that figure ignores the electriciy used by the other components in the computers (be they servers, workstations, or whatever).
Still, the $30K in prize money goes a long way toward paying the electric bill.
And, as RSA says (Score:2)
In general it's like the X-Prize. The money wasn't intended to be an amount such that winning it would be a major financial reward, it was intended to be a goal to reach and give you enough to ho
Arrgh! (Score:5, Funny)
I got part of it (Score:5, Funny)
Re:I got part of it (Score:2)
Re:I got part of it (Score:5, Informative)
Not really. Both of the factors are prime, so that means that the last digit cannot be 0, 4, 6 or 8. Its also very unlikely to end in 2 or 5, since there is exactly one prime number ending in each of those digits, and those can be ruled out by simple observation. That leaves 4 digits --- 1, 3, 7 and 9, thus there are 16 possible combinations for the two last digits. You narrowed it down to 4 of those possibilities: 1 and 9, 3 and 3, 7 and 7, 9 and 1. So your elimination rate is a mere 75%. Sorry to disappoint.
Signed:
The Math(s) Nazi
I got 100% (Score:3, Funny)
Re:I got part of it (Score:4, Funny)
If only there were some magical way of turning numbers from base-16 into base-10. Then those tricks would suddenly be useful again...
Re:I got part of it (Score:2)
It works in all bases. (Score:5, Funny)
For instance, in base 16, 3 * F (45 dec) is 2D, and 2+D=F.
This leads to a (slow) algorithm for primality check. For a given number r, simply (hah!) check all the bases up to about log_b(r) to see if all your base r belong to us.
mod parent GEEK. (Score:2)
"640 bits... (Score:5, Funny)
Dual Cores (Score:2, Funny)
Oh wait. No, that wouldn't have worked. Nevermind.
Re:Dual Cores (Score:2, Interesting)
Zombie Cluster (Score:5, Funny)
Re:Zombie Cluster - not feasable =( (Score:4, Informative)
To put this in perspective, it would require about 1.4 billion 500 MHz machines, each with about 170 Gbytes of memory to do the sieving for a 1024-bit number in the same time as RSA-512. While a hacker might try to steal cycles on the Internet by creating a ?Number Field Sieve Worm? it is hard to see how such an attack could find enough machines with enough memory to make such an attack feasible. Further, such an attack would be detected and shut down rather quickly as with the Robert Morris worm. Of course increasing speed will reduce the required number accordingly. It would take a single Cray with 6 Terabytes of memory approximately 70 million days (192,000 years) to solve the matrix. One could reduce this to a mere 19 years with 10000 Crays each with only 600 Mbytes of memory running perfectly in parallel. It is likely that within 10 years common desktop machines will be as fast or faster than a Cray C90 is now. However, it is unlikely in the extreme that 10000 machines running in parallel will be anywhere close to 10000 times as fast as one machine. It would require 10 million such machines running perfectly in parallel to solve the matrix in about the same time as that for RSA-512.
So basically, according to the article from RSA it's not feasable... but still an interesting IDEA. Maybe a worm that installs something like folding@home that would have immediate benefits.
Re:Zombie Cluster - not feasable =( (Score:2)
If only. Really, if only.
The thing is, though, Vijay frowns on that. It would not make him happy. If you have control over more than a few PCs, he wants proof you have the authority to do that. Not up front, mind you, but the folding community will eventually ask "Who is that guy?" once you've accumulated enough points, and you'd better have a good answer, like you have the authority to run so many clients, or
Re:Zombie Cluster - not feasable =( (Score:3, Insightful)
It could always happen that some bright guy finds a more efficient (or more easily distributed) way to attack the problem. This is always a risk with encryption that relies on "computationally hard" problems.
I'll wait for RSA-2048 (Score:4, Interesting)
Melissa
Re:I'll wait for RSA-2048 (Score:5, Funny)
p.s. all your xbox is belong to us.
Re:I'll wait for RSA-2048 (Score:2)
Sounds like a good idea for a pure OSS distributed application. Of course then Microsoft would run rogue clients to stuff up the factoring process.
Does anybody else thing this is feasible? Is it worth working on?
An idea (Score:5, Funny)
Re:An idea (Score:2, Funny)
Uh, huh... (Score:2)
Re:An idea (Score:4, Insightful)
RSA keys are based on having two large prime numbers whose product is then difficult to factor. In general, the larger these numbers are, the harder it is to factor: trial division is O(sqrt(n)), and even the best methods of factoring are still of increasing time for increasing numbers. Using a general method, a 1.44mb key would take a LONG time to factor. However, there is one very important caveat...
If you go high enough, people don't know very many primes. In fact, there are lists of the largest known primes. I'd wager that there are less than a few thousand known primes greater than 2^720k, probably a lot less. This means that if you have a 1.44Mb number which you know to be the product of two primes, then either you can do trial divisions from a short list to factor the number, or else someone has discovered a new large prime.
In short, if you have a large enough key, the task of generating primes is difficult enough that factoring becomes much easier. To give you an idea of how difficult finding primes is, n has about a 1/(ln n) chance of being prime, and using a specialized algorithm, it takes about a day to check a mersenne number of this size for primality. General algorithms are, of course, slower. This means that, to perhaps an order of magnitude or two, it would take about million 1Ghz computer days to find two new suitible primes to multiply together. Of course, if you do this, its not likely that someone will crack your key without a quantum computer, but its also not likely that you will find a key pair until quantum computers are widespread.
I guess if you want big keys like that, you should look into eliptic curves. At least by the time you generate a key, there is a chance that it won't be trivial to break!
wikipedia article and easy money (Score:3, Informative)
RSA Cracked (Score:4, Funny)
One of the great Two problems Solved (Score:2, Funny)
WTF is the General Number Field Sieve... (Score:5, Informative)
Now for those with the mathematical maturity to delve into the algorithm, I suggest the book Prime Numbers: A Computational Perspective [amazon.com] by R. Crandall and C. Pomerance (link to Amazon.com lifted from Google, no referrals), which is certainly one of the best introductions to the algorithm that I have read.
By the way, if anyone wants to help perform huge factorizations in a distributed computing network, check out the NFSNET [nfsnet.org], although they mostly apply SNFS on values from the Cunningham tables, no cryptographic targets.
Re:WTF is the General Number Field Sieve... (Score:2, Informative)
Actually, it's not quite that bad. Big-O notation [wikipedia.org] helps you to calculate the time it takes to run these algorithms, and there's a formula that helps you determine order-of-magnitude runtime for each digit. (Big-O calculations don't tell you how long it will take in hours, but it WILL help you approximate runtime relative to runtime that you already know.) For instance you can calculate
Unix factor fails me again! (Score:4, Funny)
`310741824049004372135075003588856793003734602284
How does this compare to RC5-64? (Score:2)
If I'm not mistaken, shouldn't it be 2^129 times more difficult to factor a 193 bit number than a 64 bit one? Perhaps I'm not understanding something.. someone want to clue me in?
Re:How does this compare to RC5-64? (Score:5, Informative)
1) The number RSA-640 has 193 *decimal* digits, but 640 bits (as the number in RSA-640 indicates).
2) You are comparing symetric key suzes (RC5-64 = 64 bit) with assymetric key sizes (RSA-640 640 bit). You can't compare these key sizes directly. Assymetric key sizes are much bigger than symetric key sizes for the same level of security. So you are trying to compare numebrs that simply cannot be compared.
Marcel
Re:How does this compare to RC5-64? (Score:4, Interesting)
So you are trying to compare numebrs that simply cannot be compared.
Well, you can compare them, but you have to factor in the relationship between the complexity of the attack and the keysize in each case. In the case of RC5, brute force search of the keyspace is O(2^n) where n is the size of the key in bits. As a previous post mentions, the GNFS algorithm's complexity is O(e^(1.9229+O(1))*ln(n)^(1/3)*ln(ln(n))^(2/3)), where n is the number to be factored.
So to compare the complexity of these two attacks you just need to see if 2^64 is larger or smaller than e^(1.9229*ln(2^640)^(1/3)*ln(ln(2^640))^(2/3)).
Unless I made a mistake, the complexity of RSA-640 is about 5.5e13, whereas RC5-64 is about 1.8e19, so RC5-64 is approximately 300,000 times harder than RSA-640. I'm not sure that GNFS is as easy to massively parellelize as RC5 searching, though, so in practice RSA-640 may be harder than RC5-64, even though it has lower complexity. Also, big-O complexity ignores constant multipliers, so if each step in the GNFS algorithm is, say, a million times more complex than each RC5 trial encryption, than RSA-640 may actually be three times as hard as RC5.
Okay, so maybe you can't compare them :-)
What a guy! (Score:2, Funny)
Recommended key sizes (Score:5, Interesting)
http://www.keylength.com/ [keylength.com]
How does DSA stack up? (Score:2)
Not the largest RSA number factored to date (Score:3, Interesting)
Maybe there's other factors at work here besides prize money? (ROFL etc).
RSA 640... (Score:2)
...should be enough to anybody!
Spending tax dollars vs common sense (Score:2, Interesting)
Cost of "one day breaker" system (Score:2, Interesting)
Sorry, but isn't this just a waste of electricity? (Score:3, Interesting)
It's like figuring out how many times you'd need to toss a coin before you'd be likely to get 7 heads in a row... and after figuring this out, actually tossing the coin until you get 7 heads. Anybody who actually did that would a moron. It would show nothing... much like these "factor this" challenges.
not the point (Score:3, Interesting)
However, this is not the point. The point is to prove ANYONE (not only cryptanalyst) that it CAN be broken, though it takes some processing, and there is no alternative for doing.
Re:One of Bill Gates' dreams... (Score:2, Funny)
Re:Time Matters (Score:4, Insightful)
Re:Time Matters (Score:2)
Re:Time Matters (Score:2)
Re:Time Matters (Score:2)
Re:Time Matters (Score:3, Informative)
But non-decipherable stuff is archived (Score:2)
So, do feel safe about having your personal secrets made public eventually, no matter how careful you are at encryption?
Re:Time Matters (Score:3, Insightful)
Although it's identical to the issue that the UK police claim they currently have. Which is why they want 90 days to lock citizens up without charge while they 'factor' their hard-drives.
Re:Irrelevant (Score:5, Insightful)
Re: (Score:2)
Re:Uh . . . wth? (Score:2)
But the question is (Score:2)
I mean let's say I am in a situation where my data is only worth it for 6 months, maybe the data is an access code and it changes every 6 months. Let's also say what it guards is pretty low dollar, my bank account maybe. Ok so my crypto needs to be good enough that someone with at mo
Re:Irrelevant (Score:4, Insightful)
Factoring is almost certainly not NP-hard. It could very well be that P != NP, and yet factoring is easy.
Re:Irrelevant (Score:2)
Ahem, not exactly.
Re:Irrelevant (Score:4, Interesting)
"Integer factorization is widely suspected to be outside both of those classes [NP-complete and co-NP-complete]."
Just because a problem is outside P, doesn't mean it's NP-hard. Which is exactly what I said to start with.
Re:Factored... Big Deal (Score:3, Informative)
Re:Factored... Big Deal (Score:3, Interesting)
The 212 digit one (RSA-704) won't be cracked for a long, long time yet using current algorithms like the ones the RSA-640 winners did. 640->704 doesn't sound like much, but it is monumental. I did some back-of-the-envelope math. I'm naively assuming that with a 64-bit gain in key size, the problem complexity is 2^32 harder (since one factor is always under the square root). I'm sure that seive algorithm they're using manages to cut that 2^32 down some, but it's not going to make a practical differenc
Re:Factored... Big Deal (Score:2, Interesting)
Scratch that, I read some more about the GNFS they're using, and while I don't claim to understand completely, I don't think it would take them 2^32 longer to reach RSA-704 - it may well be in reach in the relatively near future.
Re:celeron's (Score:5, Informative)
(Score:1, Funny)
by rufuseddy (781982) on Tuesday November 08, @11:35PM (#13985872)
(http://www.oceighty.net/ [oceighty.net])
blah, if they would of used 80 celeron's they would have cracked it twice as fast.......
Dude, what's wrong with you? You wrote "would of"[sic] and "would have" in the same sentence! To make matters worse, you didn't capitalize a proper noun ("Celeron"), you used an apostrophe before an "s" in a plural twice, you didn't capitalize the first word of a sentence, and you ended your "sentence" with seven periods. Go back to the fifth grade. Do not pass go. Do not collect 200 dollars.
Re:celeron's (Score:2, Funny)
Re:what about the xbox rsa-2048 (Score:3, Interesting)
About 1200 years.
Progress in computation of the solution is linear. Moore's law is exponential. By year 3200 the computers will be strong enough to crack it in 6 months.