Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys? (2024)

Biz & IT —

"Factorization as a service" in Amazon cloud is so easy novices can do it.

Dan Goodin -

Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys? (1)

The cost and time required to break 512-bit RSA encryption keys has plummeted to an all-time low of just $75 and four hours using a recently published recipe that even computing novices can follow. But despite the ease and low cost, reliance on the weak keys to secure e-mails, secure-shell transactions, and other sensitive communications remains alarmingly high.

The technique, which uses Amazon's EC2 cloud computing service, is described in a paper published last week titled Factoring as a Service. It's the latest in a 16-year progression of attacks that have grown ever faster and cheaper. When 512-bit RSA keys were first factored in 1999, it took a supercomputer and hundreds of other computers seven months to carry out. Thanks to the edicts of Moore's Law—which holds that computing power doubles every 18 months or so—the factorization attack required just seven hours and $100 in March, when "FREAK," a then newly disclosed attack on HTTPS-protected websites with 512-bit keys, came to light.

In the seven months since FREAK's debut, websites have largely jettisoned the 1990s era cipher suite that made them susceptible to the factorization attack. And that was a good thing since the factorization attack made it easy to obtain the secret key needed to cryptographically impersonate the webserver or to decipher encrypted traffic passing between the server and end users. But e-mail servers, by contrast, remain woefully less protected. According to the authors of last week's paper, the RSA_EXPORT cipher suite is used by an estimated 30.8 percent of e-mail services using the SMTP protocol, 13 percent of POP3S servers. and 12.6 percent of IMAP-based e-mail services.

"The RSA_EXPORT support for mail protocols is certainly the most alarming," Nadia Heninger, one of six researchers at the University of Pennsylvania to co-write the report, told Ars. "It seems that the word got out to maintainers to update their cipher suites for HTTPS after the FREAK attack, but not for their mail servers."

The RSA_EXPORT cipher suite is a remnant from Clinton administration laws that restricted the export of software using strong encryption. Even after the laws were no longer in effect, many software providers failed to remove functions that made it trivial for attackers to force servers to use 512-bit keys. But amazingly, even in cases where the antiquated cipher suite isn't in use, a surprising number of servers still use the weak 512-bit keys, not just for e-mail but for a variety of other extremely sensitive purposes.

Long tail of short keys

Some 10,000 servers that use the DNSSEC specification to cryptographically protect domain name system records against tampering rely on a 512-bit key, the researchers estimate. The number of 512-bit keys used to remotely access servers and computers with the SSH protocol was 508, and the number of DomainKeys Identified Mail (DKIM) keys used to prevent e-mail spoofing was 108, or almost one percent of those found online. The weak DKIM keys are significant given the massive amount of awareness they received three years ago.

A full seven percent of HTTPS-protected websites use 512-bit keys, too. Those sites are already wide open to attack since 512-bit HTTPS certificates must be self-signed rather than backed by a browser-trusted certificate authority. That means it was already trivial for man-in-the-middle attackers to swap out the existing self-signed certificate with a fraudulent one. But being able to obtain the private key of the existing certificate offers attackers a greater array of choices, including stealth.

The researchers concluded that despite widespread awareness that 512-bit keys are highly susceptible to breaking, the message still hasn't adequately sunk in with many administrators. The researchers wrote:

512-bit RSA has been known to be insecure for at least fifteen years, but common knowledge of precisely how insecure has perhaps not kept pace with modern technology. We build a system capable of factoring a 512-bit RSA key reliably in under four hours. We then measure the impact of such a system by surveying the incidence of 512-bit RSA in our modern cryptographic infrastructure, and find a long tail of too-short public keys and export-grade cipher suites still in use in the wild. These numbers illustrate the challenges of keeping an aging Internet infrastructure up to date with even decades-old advances in cryptanalysis.

Now, these lax administrators may soon run out of time. With the new hack-by-numbers template and the ultra-low cost and time requirements for factoring 512-bit keys, it's only a matter of time until they're cloned and used in in-the-wild attacks.

Breaking 512-bit RSA with Amazon EC2 is a cinch. So why all the weak keys? (2024)

FAQs

How long does it take to crack RSA 512? ›

But keep in mind that as computing power increases, cryptosystems become easier to crack through brute force. For example, a report on the RSA website estimates that a 512-bit RSA key can be factored for less than $1,000,000 in cost and eight months of effort now.

Are 1024 bit RSA keys secure? ›

RSA encryption keys have become very common in digital security to maintain data integrity and secure communications primarily. However, advances in recent years, particularly in cryptography research and computing capabilities, have made 1024-bit encryption keys vulnerable to cyber attacks.

What is RSA 3072? ›

RSA and ECDSA are two widely used public-key cryptographic algorithms to encrypt and decrypt data. With RSA 3072-bit and ECDSA 384/521-bit certificates, the longer key size will enhance security, making it more difficult for an attacker to decrypt the communication.

Why is it hard to break RSA? ›

‍RSA encryption is strong because factoring is a one-way problem. It's very easy to multiply two primes together, but very difficult to find prime factors of a large number. That's what the technology relies on.

How long does it take to break a RSA key? ›

Breaking a 2048-bit RSA key would take 1 billion years with a classical computer. A quantum computer could do it in 100 seconds. The immediate focus on examining post-quantum security solutions is no longer optional.

What is the largest RSA key cracked? ›

As of 2020 the largest RSA key publicly known to be cracked is RSA-250 with 829 bits. The Finite Field Diffie-Hellman algorithm has roughly the same key strength as RSA for the same key sizes.

Are RSA keys deprecated? ›

Microsoft has announced that it will depreciate Windows RSA keys shorter than 2048 bits. This step encourages organizations to avoid weaker algorithms and adopt stronger ones for server authentication. Rivest-Shamir-Adleman (RSA) keys are cryptographic keys used in the RSA encryption algorithm.

Why can't I use 1024 bit RSA for ecommerce? ›

Internet standards and regulatory bodies disallowed the use of 1024-bit keys in 2013, recommending specifically that RSA keys should have a key length of 2048 bits or longer,” Microsoft explained. Companies using older software and hardware could run into trouble, as these tools will probably no longer work.

Which is better, RSA 2048 or 4096? ›

A 4096 bit key does provide a reasonable increase in strength over a 2048 bit key, and according to the GNFS complexity, encryption strength doesn't drop off after 2048 bits. There's a significant increase in CPU usage for the brief time of handshaking as a result of a 4096 bit key.

What is a good RSA key size? ›

They define the relative protection provided by different types of algorithms in “bits of security.” NIST recommends the use of keys with a minimum strength of 112 bits of security to protect data until 2030, and 128 bits of security thereafter. A 2048-bit RSA key provides 112-bit of security.

What is the NIST recommended key size for RSA? ›

NIST specifically seeks input from federal agencies on the suitability of the digital signature algorithms and key sizes specified in SP 800-78-5. The draft revisions accommodate RSA signatures with 2048-bit and 3072-bit keys, and ECDSA signatures with the P-256 and P-384 curves, for authentication services.

How long does RSA decryption take? ›

Since RSA is based on arithmetic modulo large numbers it can be slow in constrained environments. For example, 1024-bit RSA decryption on a small handheld device such as the Palm III can take as long as 40 seconds.

How long does it take to break Bitlocker? ›

Assuming we could somehow process 500 trillion passwords an hour (which would be 3,623 times more than the ~138 billion passwords per hour capability of a desktop computer in 2008 under 10% load), it would still take us ~7.7 x 10^19 years to brute force crack this 48 character numerical recovery password.

How long would it take to crack 256 encryption? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

How long does it take to decrypt a Bitlocker drive? ›

NOTE: Decryption can take anywhere from 20 minutes to a couple of hours. The time depends on the amount of data that has been encrypted, the speed of the computer, and whether the process is interrupted. Interruptions include the computer being turned off or going to sleep.

Top Articles
How to Activate Ghost Mode in Coin Master - Playbite
Why Questions About Tether’s Reserve Assets Still Matter
Fort Morgan Hometown Takeover Map
Pga Scores Cbs
THE 10 BEST Women's Retreats in Germany for September 2024
Teamexpress Login
2013 Chevy Cruze Coolant Hose Diagram
How Quickly Do I Lose My Bike Fitness?
Helloid Worthington Login
Syracuse Jr High Home Page
Foodland Weekly Ad Waxahachie Tx
Kvta Ventura News
Www Craigslist Com Phx
Kürtçe Doğum Günü Sözleri
Napa Autocare Locator
Unterwegs im autonomen Freightliner Cascadia: Finger weg, jetzt fahre ich!
Byui Calendar Fall 2023
Zack Fairhurst Snapchat
Milanka Kudel Telegram
*Price Lowered! This weekend ONLY* 2006 VTX1300R, windshield & hard bags, low mi - motorcycles/scooters - by owner -...
Heart Ring Worth Aj
Watch Your Lie in April English Sub/Dub online Free on HiAnime.to
Redfin Skagit County
Drift Hunters - Play Unblocked Game Online
Craigslist Lake Charles
Urban Dictionary Fov
Abga Gestation Calculator
Ordensfrau: Der Tod ist die Geburt in ein Leben bei Gott
6465319333
Fbsm Greenville Sc
10 Most Ridiculously Expensive Haircuts Of All Time in 2024 - Financesonline.com
W B Crumel Funeral Home Obituaries
Planet Fitness Santa Clarita Photos
877-292-0545
Leena Snoubar Net Worth
Entry of the Globbots - 20th Century Electro​-​Synthesis, Avant Garde & Experimental Music 02;31,​07 - Volume II, by Various
Silive Obituary
RECAP: Resilient Football rallies to claim rollercoaster 24-21 victory over Clarion - Shippensburg University Athletics
Sun Tracker Pontoon Wiring Diagram
Courtney Roberson Rob Dyrdek
Linkbuilding uitbesteden
Wordle Feb 27 Mashable
Ssc South Carolina
9:00 A.m. Cdt
How To Get To Ultra Space Pixelmon
The Cutest Photos of Enrique Iglesias and Anna Kournikova with Their Three Kids
Marcel Boom X
antelope valley for sale "lancaster ca" - craigslist
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Appsanywhere Mst
Denys Davydov - Wikitia
Latest Posts
Article information

Author: Patricia Veum II

Last Updated:

Views: 5952

Rating: 4.3 / 5 (44 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Patricia Veum II

Birthday: 1994-12-16

Address: 2064 Little Summit, Goldieton, MS 97651-0862

Phone: +6873952696715

Job: Principal Officer

Hobby: Rafting, Cabaret, Candle making, Jigsaw puzzles, Inline skating, Magic, Graffiti

Introduction: My name is Patricia Veum II, I am a vast, combative, smiling, famous, inexpensive, zealous, sparkling person who loves writing and wants to share my knowledge and understanding with you.