Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Privacy

Millions of High-Security Crypto Keys Crippled by Newly Discovered Flaw (arstechnica.com) 55

Slovak and Czech researchers have found a vulnerability that leaves government and corporate encryption cards vulnerable to hackers to impersonate key owners, inject malicious code into digitally signed software, and decrypt sensitive data, reports ArsTechnica. From the report: The weakness allows attackers to calculate the private portion of any vulnerable key using nothing more than the corresponding public portion. Hackers can then use the private key to impersonate key owners, decrypt sensitive data, sneak malicious code into digitally signed software, and bypass protections that prevent accessing or tampering with stolen PCs. The five-year-old flaw is also troubling because it's located in code that complies with two internationally recognized security certification standards that are binding on many governments, contractors, and companies around the world. The code library was developed by German chipmaker Infineon and has been generating weak keys since 2012 at the latest. The flaw is the one Estonia's government obliquely referred to last month when it warned that 750,000 digital IDs issued since 2014 were vulnerable to attack. Estonian officials said they were closing the ID card public key database to prevent abuse. On Monday, officials posted this update. Last week, Microsoft, Google, and Infineon all warned how the weakness can impair the protections built into TPM products that ironically enough are designed to give an additional measure of security to high-targeted individuals and organizations.
This discussion has been archived. No new comments can be posted.

Millions of High-Security Crypto Keys Crippled by Newly Discovered Flaw

Comments Filter:
  • by Anonymous Coward on Monday October 16, 2017 @12:48PM (#55378195)

    Would using the Rust programming language have helped avoid this flaw?

  • by sqorbit ( 3387991 ) on Monday October 16, 2017 @12:48PM (#55378201)
    Can we combine all these articles under just one title "Your Security is Flawed. You're Not Secure"?
    • by XXongo ( 3986865 )

      Can we combine all these articles under just one title "Your Security is Flawed. You're Not Secure"?

      No. Because it actually does make a difference what is insecure, and how.

    • by DontBeAMoran ( 4843879 ) on Monday October 16, 2017 @12:59PM (#55378261)

      Captain: What happen ?
      Mechanic: Somebody set up us the weak security.
      Operator: We get hacked.
      Captain: What !
      Operator: Main screen turn on.
      Captain: It’s you !!
      CATS: How are you gentlemen !!
      CATS: All your data are belong to us.
      CATS: You are on the way to sell your data to the highest bidder.
      Captain: What you say !!
      CATS: You have no chance to hide your personal info make your time.
      CATS: Ha ha ha ha
      Operator: Captain !!
      Captain: Take off every ‘TFA’!!
      Captain: You know what you doing.
      Captain: Move ‘MPA2’.
      Captain: For great protection.

  • As much as i really _hate_ to say i told you so.

    But seriously, i told you so.

    Next up, curve 25519 and millions of apple fan boys crying into their caramel latte.

    • Re:vindicated (Score:4, Insightful)

      by hey! ( 33014 ) on Monday October 16, 2017 @02:38PM (#55378901) Homepage Journal

      Next up, curve 25519 and millions of apple fan boys crying into their caramel latte.

      If that happens, it won't just be Apple fan boys who are put out.

      In any case, it doesn't take a math genius to predict something like this would happen with factorization. There was no breakthrough on the fundamental problem, only a discovery of a weak key choice algorithm. This is where nearly every exploit in the world comes from: not from advances in mathematics, but the discovery of sloppy implementations.

      The problem with software is that it is almost irresistibly considered finished when it looks right.

  • Time for a Key Audit (Score:2, Informative)

    by Anonymous Coward

    If you use a Yubikey or other smart card for key generation, revoke them and generate new keys using OpenSSL. Any system relying on TPM 1.4 is also suspect. This flaw affects keys generated using Infineon smartcards. Currently 1024 bit keys are trivially broken and 2048 bit keys are broken but could cost tens of thousands of dollars in compute to crack. 3072 and 4096 bit keys are still quite safe but if regeneration is practical then you should still do it. The attack could always improve and reach them.

    • by Allasard ( 565291 ) on Monday October 16, 2017 @01:02PM (#55378279)
      Here is Yubico's statement on what features of the Yubikey 4 are affected:
      https://www.yubico.com/2017/10... [yubico.com]
    • by epine ( 68316 )

      The attack could always improve and reach them.

      Since there is no known crypto where an attack can't break a reduced version, this is pretty much tautologically true everywhere and always.

      I think this actually functions as a form of tipping-point porn: when some crack finally scars the low-end of what you might actually care about, however little (e.g. 1024 bits), it's declared as having broken over the New Orleans flood control system and now the water is really coming, as if the deluge hadn't started ages

  • by Anonymous Coward

    What makes you think that any of these vulnerabilities weren't (1) already known by the various government spy associations, or (2) intentionally introduced to weaken encryption to support the endless "War on Terror"?

    "The flaw resides in the Infineon-developed RSA Library version v1.02.013, specifically within an algorithm it implements for RSA primes generation." Oh, you mean this Infineon [nist.gov] that was working to produce libraries for the "NSA's Cryptographic Interoperability Strategy (CIS)" back in 2013?

  • Specific details (Score:5, Interesting)

    by JoshuaZ ( 1134087 ) on Monday October 16, 2017 @01:09PM (#55378323) Homepage
    I'm having trouble finding the specific details. It looks like they aren't releasing all the details publicly until a conference on November 2nd https://crocs.fi.muni.cz/public/papers/rsa_ccs17 [fi.muni.cz] but it appears to be a problem only with RSA keys they generate and has to do with how they are generating large primes, not a fundamental flaw in RSA. This has happened before with some implementations. For example, some early RSA implementations (and occasionally some ones still today made by people who have no business programming them) would chose primes in the following way: Pick a random big odd number and check if it is prime, and if so use it. If not, add 2 and check again, keep going until you have a prime. The problem with this method is that some primes end up being much more likely to be selected than others. For example, if you are picking two digit primes then the only way this way to pick 109 is if one picked 109 on the nose, but 127 becomes much more likely to be picked because if your initial number is 121,123,125 or 127 then it gets picked. It seems like some much more subtle variant of something like this is at fault.
  • by Anonymous Coward

    "Last week, Microsoft, Google, and Infineon all warned how the weakness can impair the protections built into TPM products that ironically enough are designed to give an additional measure of security to high-targeted individuals and organizations."

    Wrong TPM and Intel's ME and other AMD equivalents are NSA backdoors. We are so fast to jump on Kaspersky's backdoor issues and just assume that American controlled companies don't have the same vulnerabilities. It may be a different natuon's spook that has acces

  • And, as we all know, a crippled key cannot be trusted.

    Beware crippled keys! They might not appear to limp, but they are crippled all the same.

    (Only don't say this in front of Kripkenstein, rather than his secret Japanese wife, or he might just kill you.)

  • "the weakness can impair the protections built into TPM products that ironically enough are designed to give an additional measure of security"

    What the hell was ironic about that?

"The whole problem with the world is that fools and fanatics are always so certain of themselves, but wiser people so full of doubts." -- Bertrand Russell

Working...