Implications Of The Recent RSA Vulnerability

erythrocyte firasmr786 at gmail.com
Thu Mar 11 16:33:37 CET 2010


On 3/11/2010 3:29 PM, Dan Mahoney, System Admin wrote:
> On Thu, 11 Mar 2010, erythrocyte wrote:
>> Ref:
>> http://www.engadget.com/2010/03/09/1024-bit-rsa-encryption-cracked-by-carefully-starving-cpu-of-ele/
>>
> 
> Okay, let me sum up this article for you:
> 
> Researchers who had physical enough access to be able to rewire the
> private-key-holder's system's power supply were able to compromise that
> system.
> 
> If you're at that point, I don't think key length is your problem.

Alrighty. But doesn't this compromise the layer of security offered by
the passphrase? What's the point having a passphrase at all, if it's so
easy to compromise a private key?




More information about the Gnupg-users mailing list