New research: There’s no need to panic over factorable keys–just mind your Ps and Qs

We have been able to remotely compromise about 0.4% of all the public keys used for SSL web site security. The keys we were able to compromise were generated incorrectly–using predictable “random” numbers that were sometimes repeated. There were two kinds of problems: keys that were generated with predictable randomness, and a subset of these, where the lack of randomness allows a remote attacker to efficiently factor the public key and obtain the private key. With the private key, an attacker can impersonate a web site or possibly decrypt encrypted traffic to that web site. We’ve developed a tool that can factor these keys and give us the private keys to all the hosts vulnerable to this attack on the Internet in only a few hours.

via New research: There’s no need to panic over factorable keys–just mind your Ps and Qs | Freedom to Tinker.

The last time I was at this blog was many years ago when he showed how to hack electronic voting machines.