If you ’re used to seeing a equipment like this on a daily cornerstone , you in all probability assume that it ’s a vital security system measure to keep your employer ’s connection and data unattackable . A team of computer scientist solicit to differ , however — because they ’ve cracked the encryption it uses all-embracing open .
Update : RSA has now explain why the situation is n’t quite as bad it sounds ina web log post on their website .
Ars Techinca reportshow a squad of European estimator scientists leveled their stack at the encryption API used in RSA ’s SecurID 800 token , which is often regard by magnanimous organisation to be an implausibly secure way to stack away the credentials needed to access confidential datum . They managed todevelop an approachthat require just 13 minutes to crack the equipment ’s encryption . Ars Technicadescribes how it work :

If equipment such as the SecurID 800 are a Fort Knox , the cryptographic wrapper is like an armored machine used to protect the digital plus while it ’s in transit . The flack works by repeatedly tap a midget failing in the negligee until its contents are converted into plaintext . One version of the attack employ an improved variation of a technique introduced in 1998 that works against keys using the RSA cryptographic algorithmic rule . By subtly change the ciphertext thousands of times and putting each one through the import physical process , an attacker can step by step reveal the underlying plaintext , D. Bleichenbacher , the original scientist behind the feat , discovered . Because the technique relies on “ padding ” inside the cryptographic envelope to produce clues about its contents , cryptanalyst call it a “ cushioning prophet plan of attack . ” Such attacks rely on so - call side - channel to see if ciphertext corresponds to a right padded plaintext in a targeted arrangement .
The same attack in reality also works on plenty of other twist , include electronic ID cards carried by all Estonian citizens and a number of other certificate tokens provide by other companies , including the Aladdin eTokenPro and iKey 2032 made by SafeNet , the CyberFlex manufactured by Gemalto , and Siemens ’ CardOS .
The nature of the flack does require the hack to have physical admission to the token , but if access to a system is required , that does n’t seem like a heap breaker . harmonise to the research worker RSA is mindful of the via media and is in the process of planning a mending . In the meantime , keep your center on you key watch pocket . [ Project - Team ProseccoviaArs Technica ]

Image by EMC
EncryptionSecurity
Daily Newsletter
Get the good technical school , skill , and finish news show in your inbox daily .
word from the time to come , delivered to your present .
You May Also Like












![]()
