{"id":1724,"date":"2007-11-16T23:50:50","date_gmt":"2007-11-17T06:50:50","guid":{"rendered":"http:\/\/dabacon.org\/pontiff\/?p=1724"},"modified":"2007-11-16T23:50:50","modified_gmt":"2007-11-17T06:50:50","slug":"cryptosystem-insecurity-season","status":"publish","type":"post","link":"https:\/\/dabacon.org\/pontiff\/2007\/11\/16\/cryptosystem-insecurity-season\/","title":{"rendered":"Cryptosystem Insecurity Season"},"content":{"rendered":"<p>Seems it &#8217;tis the season for warnings about the security of cryptosystems.  The New York Times has an article on the latest <a href=\"https:\/\/myaccount.nytimes.com\/auth\/login?URI=www-nc.nytimes.com\/2007\/11\/17\/technology\/17code.html&amp;REFUSE_COOKIE_ERROR=SHOW_ERROR\">issue<\/a> here.  It seems that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Adi_Shamir\">Adi Shamir<\/a> (the S in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Rsa\">RSA<\/a>) has a note out describing how faults in chip hardware could render cryptosystems insecure.  It&#8217;s not at all clear to me how this differs from analysis where the faults are injected into the hardware (such as described <a href=\"ftp:\/\/ftp.rsasecurity.com\/pub\/pdfs\/bulletn5.pdf\">here<\/a>) because the article doesn&#8217;t contain any real details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seems it &#8217;tis the season for warnings about the security of cryptosystems. The New York Times has an article on the latest issue here. It seems that Adi Shamir (the S in RSA) has a note out describing how faults in chip hardware could render cryptosystems insecure. It&#8217;s not at all clear to me how &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dabacon.org\/pontiff\/2007\/11\/16\/cryptosystem-insecurity-season\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Cryptosystem Insecurity Season&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[20,84],"tags":[],"class_list":["post-1724","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-technology"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/comments?post=1724"}],"version-history":[{"count":0,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/posts\/1724\/revisions"}],"wp:attachment":[{"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/media?parent=1724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/categories?post=1724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dabacon.org\/pontiff\/wp-json\/wp\/v2\/tags?post=1724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}