Penetration Testing mailing list archives

Re: [PEN-TEST] Places to find crypto craking tools


From: Jose Nazario <jose () BIOCSERVER BIOC CWRU EDU>
Date: Fri, 1 Dec 2000 15:54:15 -0500

On Thu, 30 Nov 2000, Nicholas Harring wrote:

PGP uses RSA to encrypt session keys of a lower computational cost
algorythm. These lower cost algorythms are usually symmetric
encryption, such as 3DES or the new AES (Rjindael<sp?>).

PGP uses IDEA by default, i believe, as it's message cipher. Stallings has
a great discussion of PGP and S/MIME, plus the ciphers used, in
Cryptography and Network Security, Principles and Practice.

a PGP message (encrypted but not signed) looks essentially like this:

        K (K )|| K (M)
         u  s     s

where || means concatenation, Ku is the public key of the recipient and Ks
is the symmetrical key.

The RSA key is of a public/private keyring nature, and thus not
susceptible to password guessing type attacks, but instead susceptible
to brute forcing the keyspace.

while you are welcome to attempt to brute force the RSA public key to
obtain the private components, a better use of your time is to sieve the
publicly known bits to obtain the private information. they each used the
General Number Field Sieve code.

two great sources of information on how this is done (via high powered
math and computers) can be found on these links:

see how they solved stage 10. they had access to sieving code, which you
probably do not.
http://www.google.com/search?q=cache:codebook.org/+the+code+book+challenge&hl=en

see how alex muffet and his team cracked a 512 bit RSA public key, again
the code is not public AFAIK, but the techniques are.
http://www.rsasecurity.com/rsalabs/challenges/factoring/rsa155.html

in short, brute forcing is theoretically possible, but don't waste your
time, faster methods are out there. and yes, the idea that RSA is
difficult to break is true, it's quite difficult, but not impossible. the
general belief is that 512 bit RSA keys have fallen. time will be needed
to factor 1024 bit keys. it's safe to assume that a determined and
resource rich enemy can break generic RSA (512 bit) encryption when the
gain is right.

____________________________
jose nazario                                                 jose () cwru edu
                     PGP: 89 B0 81 DA 5B FD 7E 00  99 C3 B2 CD 48 A0 07 80
                                       PGP key ID 0xFD37F4E5 (pgp.mit.edu)


Current thread: