[cryptography] Non-governmental exploitation of crypto flaws?

Jeffrey Walton noloader at gmail.com
Fri Dec 2 17:26:27 EST 2011


On Sun, Nov 27, 2011 at 3:10 PM, Steven Bellovin <smb at cs.columbia.edu> wrote:
> Does anyone know of any (verifiable) examples of non-government enemies
> exploiting flaws in cryptography?  I'm looking for real-world attacks on
> short key lengths, bad ciphers, faulty protocols, etc., by parties other
> than governments and militaries.  I'm not interested in academic attacks
> -- I want to be able to give real-world advice -- nor am I looking for
> yet another long thread on the evils and frailties of PKI.
>
"In July 2009, Benjamin Moody, a United-TI forum user, published the
factors of a 512-bit RSA key used to sign the TI-83+ series graphing
calculator....",
http://en.wikipedia.org/wiki/Texas_Instruments_signing_key_controversy.



More information about the cryptography mailing list