Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I recall a piece of research looking at all RSA public keys in certificates on the web they could find. They found a few keys that were very _very_ common. This was the result of exactly these kinds of low entropy key generation problems.

This is problematic even if no-one manages to predict the outcome of the random generator, because it means if someone throws a stupid amount of compute at the problem to brute-force the private key, they can compromise many different people.

But if the source of those repeated keys can be found, an attacker could get their own copy, reverse-engineer the key-generation process, and then try to predict the randomness. In which case they would have a rather cheap way to compromise many different keys.

Looking at it differently, if the problem is big enough, then it can leave a signature of duplicate keys being out their in the wild. These duplicate keys on their own are bad, but the signature can also be used by attackers to know much better where to look for bad entropy.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: