Unique Encryption Keys Not So Unique
You may have seen some of the recent articles regarding a research paper that documented a discovered flaw in some commonly used encryption schemes, including those used for online transactions. I think it’s important to point out that the sky isn’t falling. That said this may be a good time to check your encryption processes and determine if this really applies to you. Within the paper the researchers determined using 1024-bit RSA provides “99.8% security at best.” This isn’t systemic for all processes; the researchers did not find the same problem after looking at 5 million OpenPGP keys (which is the source of the paper’s title). Without getting too far into the technical aspects of the paper, the researchers found that numbers used in the creation of the keys weren’t so random after all. This culminated in critical parts of the algorithm being similar to another key. Thus the keys were the same. What does this mean for you and your organization? Time to check your encryption settings and certificates. If you outsource this as part of your e-commerce solution, have the vendor validate their settings. If you use RSA keys you might consider changing them, of course this isn’t something that most organizations can/will do with minimal impact. One of the big questions I foresee is if this will affect your PCI Compliance? At this time no. While many recognize that risk posed by the redundant keys found by the researchers is significantly less than it might otherwise be, you most likely will be safe. However this is something to keep tabs on. If further research continues to find issues with how the prime numbers are generated within the methods, it may be time to start the switch. Overall, it’s important to remember that if you use the RSA keys, the sky isn’t falling all around you, just 0.2% of it is.
Explore More Blog Posts
Turning Regulation into a Resilience Advantage: 6 Top Pentesting Tips for CISOs
Regulations and cyber threats are moving at breakneck speed. And so are expectations from boards, regulators, and auditors. For today’s CISOs, the real question isn’t “Are we compliant?” it’s “Are we resilient?”
Webinar Recap: How to Keep Your CISO Out of Jail
Learn how CISOs can reduce legal risk by documenting decisions, fostering security culture, and aligning cybersecurity with business goals.
Decrypting VM Extension Settings with Azure WireServer
The Azure WireServer service provides configuration data to Azure Virtual Machines. Join us as we walkthrough the process of decrypting that data to find sensitive information.