Historias
Slashboxes
Comentarios
 
Este hilo ha sido archivado. No pueden publicarse nuevos comentarios.
Mostrar opciones Umbral:
Y recuerda: Los comentarios que siguen pertenecen a las personas que los han enviado. No somos responsables de los mismos.
  • Concretamente

    (Puntos:2)
    por opsi (6421) el Jueves, 20 Diciembre de 2007, 23:48h (#994709)
    ( http://blog.opsiland.info/ )

    This is how it works: There are a bunch of constants -- fixed numbers -- in the standard used to define the algorithm's elliptic curve. These constants are listed in Appendix A of the NIST publication, but nowhere is it explained where they came from. What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random-number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.
    solo 32 bits!!
    --

    Indifference will be the downfall of mankind, but who cares?

    Puntos de inicio:    1  punto
    Modificador por Bonus-Karma   +1  

    Total marcador:   2  
  • Re:Concretamente

    (Puntos:3, Informativo)
    por _26oo_ (13091) el Viernes, 21 Diciembre de 2007, 01:07h (#994722)
    En realidad dice 32 bytes.
    [ Padre ]