Since 1977, RSA public-key encryption has protected privacy and verified
authenticity when using computers, gadgets and web browsers around the globe,
with only the most brutish of brute force efforts (and 1,500 years of processing
time) felling its 768-bit variety earlier this year. Now, three eggheads (or
Wolverines, as it were) at the University of Michigan claim they can break it
simply by tweaking a device’s power supply. By fluctuating the voltage to the
CPU such that it generated a single hardware error per clock cycle, they found
that they could cause the server to flip single bits of the private key at a
time, allowing them to slowly piece together the password. With a small cluster
of 81 Pentium 4 chips and 104 hours of processing time, they were able to
successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system,
without damaging the computer, leaving a single trace or ending human life as we
know it.
-
Knocked-Out AOL: How The AOL Servers Were Hacked
AOL Corporation has always been a kind of honey pie for all possible kinds of hackers. Mi… -
Microsoft touts HTML5 as the core of next year`s Internet Explorer 9
Ryan Gavin, Microsoft's senior director of Internet Explorer, is remarkably chirpy for a … -
Casual hack: Hacking the NevoSoft games
Casual game is a kind of computer game designed for a wide range of users. The term "… -
Air colander: A tale about how one large wireless provider was hacked
Admit that "Wireless Internet in every home" is a very attractive slogan. It so… -
Hackers tap into ECU to kill engine, brakes and more
During the 17 years this writer worked on braking and stability control systems, we occas… -
How to peep in other laptop built-in webcam: Learn how to use a built-in webcam for one’s own purposes
Some people truly believe their laptop built-in webcams can pry them so they fearfully be…
-
7 steps from Injection to the Admin Access via RDP
Any break-in pursues its own aim, which determines its value. It's up to you to decide wh… -
Ex-employees are a major threat to security — survey
Research carried out by Bell Micro, the IT systems distributor, claims to show that 67% o… -
Hordes of new threats ahead for mobile networks
Malware on smartphones is just the first in a series of new security threats for mobile n… -
Make Tor go the whole hog
If you think that ensuring one’s Internet privacy is the only mean of the Tor software th… -
Scammers scrape RAM for bank card data
Forget keyloggers and packet sniffers. In the wake of industry rules requiring credit car… -
Latvia investigates major tax data leak
The Latvian government is trying to determine how hackers were able to access some 7.4 mi…
Чтобы оставить мнение, нужно залогиниться
Check Also
Выносим всё! Какие данные о нас хранит Google и как их вернуть себе через Takeout
Как известно, Google хранит огромное количество данных о своих пользователях, чем его непр…