ROCA Is The New KRACK

ROCA Is The New KRACK

Tester here: https://github.com/crocs-muni/roca

via Kam-Yung Soh

Originally shared by Jan Wildeboer

This is a helluva lot more frightening than #KRACK. RSA keys can be factorised fast when they come from Infineon chips and are generated by their library. OUCH!

Disclosure of Infineon RSA vulnerability (ROCA) https://roca.crocs.fi.muni.cz . Tester for vuln. keys. TPM,Bitlocker,eID,GitHub SSH,PGP...impacted


"A newly discovered vulnerability in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AG allows for a practical factorization attack, in which the attacker computes the private part of an RSA key. The attack is feasible for commonly used key lengths, including 1024 and 2048 bits, and affects chips manufactured as early as 2012, that are now commonplace. "

UPDATE The workaround is to generate the public/private key with known good implementations (openSSL, for example) and store the keys on the chips. #OpenFTW
https://roca.crocs.fi.muni.cz

Comments

Popular posts from this blog

Entremet

Flushbunkingly Gloriumptious

Originally shared by Kam-Yung Soh