top | item 6294707

(no title)

aa0 | 12 years ago

Couldn't a cross-comparison be used, encrypting different known blocks and observing certain key properties? I would imagine that any kind of reversible operation would be able to be deduced if it can be applied to specific data that reveals its true form/operation.

discuss

order

deanfranks|12 years ago

Not with a strong cypher. Any single bit change in the source will result in what looks like a new pseudo-random output.

Determining the private key given the public key in RSA-2048 requires factorizing large blocks of very large numbers which is not practical given current computing hardware. People are working on "smart" attacks that solve the factorization problem from a theoretical math angle instead of a brute force computational approach and there is some consensus that RSA-2048 may be broken in the next few years. A transition to Elliptic Curve Cryptography (ECC) is underway and RSA has never been approved for Suite-A or Suite-B encryption which might lead one to believe that the NSA has known about the weakness of RSA for a long time.

aa0|12 years ago

I see, makes sense - it is easy to multiply big nums together but insane to factor the bignums out of them. You explained it more succinctly than I've ever understood it, thanks a ton!