Security Market Segment LS
Monday, 16 October 2017 23:03

Crypto keys hit by major flaw in code library Featured

By

A major security vulnerability has been discovered in the implementation of RSA keypair generation in a cryptographic library used in a wide range of cryptographic chips produced by Infineon Technologies.

Researchers at the Centre for Research on Cryptography and Security at Masaryk University in the Czech Republic said tonight that the product was also present in authentication, signature and encryption tokens of other vendors and chips used for Trusted Boot of operating systems.

The flaw was disclosed to Infineon in February, with agreement that eight months would be allowed to go by without public disclosure.

"We co-operated with the manufacturer and other affected parties to help evaluate and mitigate this vulnerability during this period. Major vendors including Microsoft, Google, HP, Lenovo, Fujitsu already released the software updates and guidelines for a mitigation. We are now notifying general public and releasing tools for assessment of the individual keys," the researchers wrote.

They said the vulnerability had been present in NIST FIPS 140-2 and CC EAL 5+ certified devices since at least 2012.

roca impact

"The vulnerability does NOT depend on a weak or a faulty random number generator – all RSA keys generated by a vulnerable chip are impacted," the researchers wrote. "The attack was practically verified for several randomly selected 1024-bit RSA keys and for several selected 2048-bit keys."

They said a remote attacker could compute an RSA private key from the value of a public key. "The private key can be misused for impersonation of a legitimate owner, decryption of sensitive messages, forgery of signatures (such as for software releases) and other related attacks.

"The actual impact of the vulnerability depends on the usage scenario, availability of the public keys and the lengths of keys used. We found and analysed vulnerable keys in various domains including electronic citizen documents, authentication tokens, trusted boot devices, software package signing, TLS/HTTPS keys and PGP. The currently confirmed number of vulnerable keys found is about 760,000 but possibly up to two to three magnitudes more are vulnerable."

They said they had made available tools for testing for vulnerable keys:

Offline testers: Python/Java/C++ applications and tutorials. All offline tools are under the MIT licence so they can be embedded into other testing applications and services.

Online testers: Upload public key to https://keychest.net/roca or https://keytester.cryptosense.com to test your key.

Email S-MIME/PGP tester: Send a signed email to roca@keychest.net to obtain an automatic email response with the analysis of the signing key vulnerability.

Tyler Moffitt, a senior threat researcher at security firm Webroot, said the flaw was discovered in the generation of RSA keys used by a software library (RSA Library version v1.02.013) which is adopted in cryptographic smartcards, security tokens and other secure hardware chips.

"The software and hardware containing these flaws has been used for national identity cards, software- and application-signing, and trusted platform modules protecting government and corporate computers for companies like tech giants Google and Microsoft," he told iTWire.

"This five-year-old vulnerability completely breaks the general use and security of using public key cryptography since you're supposed to be able to share your public key without any risk.

"Now any attacker can take your public key and find out the private key which allows them to commit identity theft. Those currently using these crypto identity cards can re-apply for e-Residency or follow other options as disclosed by the officials.”


Subscribe to ITWIRE UPDATE Newsletter here

Now’s the Time for 400G Migration

The optical fibre community is anxiously awaiting the benefits that 400G capacity per wavelength will bring to existing and future fibre optic networks.

Nearly every business wants to leverage the latest in digital offerings to remain competitive in their respective markets and to provide support for fast and ever-increasing demands for data capacity. 400G is the answer.

Initial challenges are associated with supporting such project and upgrades to fulfil the promise of higher-capacity transport.

The foundation of optical networking infrastructure includes coherent optical transceivers and digital signal processing (DSP), mux/demux, ROADM, and optical amplifiers, all of which must be able to support 400G capacity.

With today’s proprietary power-hungry and high cost transceivers and DSP, how is migration to 400G networks going to be a viable option?

PacketLight's next-generation standardised solutions may be the answer. Click below to read the full article.

CLICK HERE!

WEBINAR PROMOTION ON ITWIRE: It's all about webinars

These days our customers Advertising & Marketing campaigns are mainly focussed on webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

We have a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you.

MORE INFO HERE!

BACK TO HOME PAGE
Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments