Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Assuming there's no known exploit. The NSA might know of an exploit for that algorithm.


At the moment, the NSA still permits use of 2048-bit RSA for classified information up to SECRET. It would be highly questionable for them to do so if they knew of easily exploitable weaknesses, as they're taking the chance that other governments won't find them.

Remember, the NSA's mandate is twofold: They are a signals intelligence agency, but they are also charged with protecting government communications, much of which occur with commercially-available cryptography.

RSA does make people nervous for some valid reasons, and that's why there's a gradual transition to ECC underway, but there's little reason to expect a practical attack on RSA at 2048+ bits in the near term.

Absent an operational error on the part of Wired or Snowden, I seriously doubt the NSA will be decrypting that message in Snowden's lifetime, and almost certainly not before changes in the political climate.


That's not the only form of "exploit" http://www.scip.ch/en/?vuldb.2721


Uh, the existence of a buffer overflow (which doesn't even cause disclosure of an encrypted message) has nothing to do with the strength of the RSA algorithm, which is what the comment I replied to was talking about.


Maybe the message is another encrypted message with a different algorithm?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: