ROCA: Return Of the Coppersmith Attack
ROCA: Return Of the Coppersmith Attack
Posted Nov 14, 2017 17:37 UTC (Tue) by tialaramex (subscriber, #21167)Parent article: ROCA: Return Of the Coppersmith Attack
In theory such keys could exist by chance, but at billions-to-one odds, so that we might be surprised to see one, and should be astonished to see more. In practice there seem to be at least a handful and perhaps dozens in certificates for the Web PKI.
It remains on my TODO list to figure out if the public keys I found are especially _more_ vulnerable than the general case discussed in the ROCA paper. Their properties are even weirder, and my intuition is that weird is bad, but my mathematics isn't good enough to turn that intuition instantly into anything concrete. At the very least their existence suggests either:
Infineon weren't the only people to have whatever bad idea is embodied by RSAlib, someone else independently made the same error
OR
Infineon also shipped other devices that pretend not to be using RSAlib but are anyway.
When I saw that these keys were mentioned in the paper at all my heart leapt - but they dismiss them, which might mean they are much smarter than me and saw there's nothing very interesting going on (just more of the same) or perhaps it just means that life is short and they, unlike me, moved on to other things. Still, at least they were mentioned, so I know I'm not hallucinating.
Posted Nov 14, 2017 23:52 UTC (Tue)
by ballombe (subscriber, #9523)
[Link]
Posted Nov 17, 2017 17:34 UTC (Fri)
by flussence (guest, #85566)
[Link] (2 responses)
Posted Nov 19, 2017 21:42 UTC (Sun)
by nix (subscriber, #2304)
[Link] (1 responses)
Posted Nov 20, 2017 14:12 UTC (Mon)
by tialaramex (subscriber, #21167)
[Link]
Unfortunately all these types of solutions are also vulnerable to a problem where somebody nicks your Yubikey, field upgrades it to a version that works against you, then gives it back. Being obliged to send the device away to the manufacturer partly averts this attack. Of course a _very_ sophisticated adversary might be able to produce a look-alike device that suits their purpose and can be substituted quickly, for example by pick-pocketing. For example if you're Bill Browder, then sure, even the current arrangement isn't going to keep you safe from the type of forces able to have your associates murdered with impunity and then blame you for their deaths. But most of us aren't Bill Browder.
ROCA: Return Of the Coppersmith Attack
Coppersmith attack.
ROCA: Return Of the Coppersmith Attack
ROCA: Return Of the Coppersmith Attack
ROCA: Return Of the Coppersmith Attack