According to GnuPG Crypto Lybrary report on Monday, July 03, 2017, the RSA-1024 encryption used widely in cryptography around the world could be broken.
As the report says the security team worked on it, discovered a critical vulnerability that allowed RSA-1024 completely broke.
The vulnerability, labeled CVE-2017-7526 could cause local FLUSH+RELOAD side-channel attack. The research team of Technical University of Eindhoven and partners find out
"left-to-right sliding window" method leaks a lot of information about exponent bits than for right-to-left, allowing full RSA key recovery.
Libgcrypt has released a fix for Libgcrypt version 1.7.8. Debian and Ubuntu.
Source:
http://thehackernews.com/2017/07/gnupg-libgcrypt-rsa-encryption.html
https://lists.gnupg.org/pipermail/gnupg-announce/2017q2/000408.html
https://www.debian.org/security/2017/dsa-3901
https://www.ubuntuupdates.org/package/core/zesty/main/updates/libgcrypt20-dev
[https://en.wikipedia.org/wiki/RSA_numbers](https://en.wikipedia.org/wiki/RSA_numbers]
Image source:
https://webapp.zedge.net/browse/wallpaper/?id=10760964#featured
Hamidreza Asgari
July 5, 2017
thanks a lot for the info great job thanks a lot for sharing and keep on posting ;)
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
meep
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
You're welcome and thanks
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit