Extract numbers from a key

Johan Wevers johanw at vulcan.xs4all.nl
Thu Aug 4 17:11:18 CEST 2011


On 04-08-2011 16:14, vedaal at nym.hush.com wrote:

> All that is necessary, is to use pre-canned primes, 
> (i.e. to generate a prime which falls within a range of primes 
> stored in an offsite area by the implementation.)

This would be fat to easy noticed by inspecting the sourcecode. If you
just limited the generation of primes to Mersenne (2^n - 1) or Fermat
numbers (2^n + 1) with a very limited range of n, decryption would still
be easy but it would not be so easily noticed.

An even more subtle way to add a backdoor would be tampering with the
RNG that creates the session keys and the factors in key generation. A
bug such as this existed in the Unix version of pgp 5.0 and it took
quite some time before it was found.

-- 
Met vriendelijke groet,

Johan Wevers




More information about the Gnupg-users mailing list