Public Key Used To Secure HTTPS Fails ‘Sanity Check’

in Off-Topic
Source: Public Key Used To Secure HTTPS Fails ‘Sanity Check’ | BitCyber Security
Researchers find two out of every 1,000 public keys can be easily cracked
Researchers find two out of every 1,000 public keys can be easily cracked
Knowledge has no value if it is not shared.
Knowledge can cure ignorance, but intelligence cannot cure stupidity.
Knowledge can cure ignorance, but intelligence cannot cure stupidity.
Comments
-
AlexNguyen Member Posts: 358 ■■■■□□□□□□
The response from RSA: Who is fooling who;RSA brushes off crypto research findings that RSA algorithm is flawed | BitCyber SecurityKnowledge has no value if it is not shared.
Knowledge can cure ignorance, but intelligence cannot cure stupidity. -
ptilsen Member Posts: 2,835 ■■■■■■■■■■
I was thinking what RSA was saying right off the bat. It sounds to me like 0.2% of x.509 certificates used for HTTPS are either generated improperly or generated using poor implementations of RSA.
If I used a five-character alphabetic password on a AES-256-bit-full-disk-encrypted drive, that would not represent a flaw in AES; it would represent a flaw in my implementation.