chevron_left chevron_right
Login Register invert_colors photo_library


Stay updated and chat with others! - Join the Discord!
Thread Rating:
  • 0 Vote(s) - 0 Average


Help im infected (locker v 4.94 ransomware) filter_list
Author
Message
RE: Help im infected (locker v 4.94 ransomware) #11
@Hyper_ you're an idiot.
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47

[+] 1 user Likes Reiko's post
Reply

RE: Help im infected (locker v 4.94 ransomware) #12
(05-28-2015, 11:17 PM)Reiko Wrote: @Hyper_ you're an idiot.

Learn something about encryption, it's called research.

Reply

RE: Help im infected (locker v 4.94 ransomware) #13
(05-28-2015, 11:48 PM)Hyper_ Wrote: Learn something about encryption, it's called research.

You're fucking stupid.
XMPP - wrath@xmpp.jp

Reply

RE: Help im infected (locker v 4.94 ransomware) #14
(05-29-2015, 12:23 AM)nothing.nobody Wrote: You're fucking stupid.

Your stupidity is amusing. Explain.

Do you know what one-time pad is?

I guess you are a member of the incoming skid invasion?

Reply

RE: Help im infected (locker v 4.94 ransomware) #15
(05-28-2015, 11:48 PM)Hyper_ Wrote: Learn something about encryption, it's called research.

Show me a paper that says RSA 2048 has been factored, let alone 4096.

H Peter Anvin's key does not count, that was a special case.
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47

Reply

RE: Help im infected (locker v 4.94 ransomware) #16
I provided a link: http://www.extremetech.com/extreme/17310...puters-cpu
"Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone"

I also said, it would be completely impossible with one-time pad, if you misunderstand the comment.

Reply

RE: Help im infected (locker v 4.94 ransomware) #17
(05-29-2015, 12:38 AM)Hyper_ Wrote: I provided a link: http://www.extremetech.com/extreme/17310...puters-cpu
"Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone"

I also said, it would be completely impossible with one-time pad, if you misunderstand the comment.

Side-channel attacks also don't count. You cannot do that to every implementation of RSA, or even a good implementation of RSA.

You also can't do that from more than a few meters away from someone actively decrypting or signing data with their RSA key.

Furthermore, an OTP is infeasible in most cases because of the sheer size of the key. It has to be as large as the plaintext to be entirely secure.


EDIT: He read this, then went to go Google something that makes me wrong. That's why he hasn't responded yet. Here, let me make it a little harder and quote something from your own link
Quote:Without going into too much detail, the researchers focused on a very specific encryption implementation: The GnuPG (an open/free version of PGP) 1.x implementation of the RSA cryptosystem
GnuPG 1.* is basically dead. 2.0.27 is the current "stable" version, and this particular attack does not work on its implementation of RSA. Nor does it work on the "modern" GnuPG, or any smartcard implementation I'm aware of.

Even the "classic" version has been updated to defeat these side-channel attacks, as noted on gnupg.org
Quote:GnuPG 1.4.19 released (2015-02-27) important

GnuPG 1.4.19 is now available. This release mitigates two new of side channel attack methods as well as a couple of other bugs. {more}

If I am wrong, put your money where your mouth is. Factor my RSA public key and decrypt this.
-----BEGIN PGP MESSAGE-----
Version: GnuPG v2
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=FRAf
-----END PGP MESSAGE-----
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47

Reply

RE: Help im infected (locker v 4.94 ransomware) #18
(05-29-2015, 12:41 AM)Reiko Wrote: Side-channel attacks also don't count. You cannot do that to every implementation of RSA, or even a good implementation of RSA.

You also can't do that from more than a few meters away from someone actively decrypting or signing data with their RSA key.

Furthermore, an OTP is infeasible in most cases because of the sheer size of the key. It has to be as large as the plaintext to be entirely secure.


EDIT: He read this, then went to go Google something that makes me wrong. That's why he hasn't responded yet. Here, let me make it a little harder and quote something from your own link
GnuPG 1.* is basically dead. 2.0.27 is the current "stable" version, and this particular attack does not work on its implementation of RSA. Nor does it work on the "modern" GnuPG, or any smartcard implementation I'm aware of.

Even the "classic" version has been updated to defeat these side-channel attacks, as noted on gnupg.org

If I am wrong, put your money where your mouth is. Factor my RSA public key and decrypt this.
-----BEGIN PGP MESSAGE-----
Version: GnuPG v2
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=FRAf
-----END PGP MESSAGE-----

Yeah, thanks for clearing it up for me.

Reply

RE: Help im infected (locker v 4.94 ransomware) #19
(05-29-2015, 12:38 AM)Hyper_ Wrote: I provided a link: http://www.extremetech.com/extreme/17310...puters-cpu
"Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening — yes, with a microphone"

I also said, it would be completely impossible with one-time pad, if you misunderstand the comment.

Yes, now please tell me how to crack a remote box's 4096-bit encrypted SSH RSA key by listening to your computer. Oh wait, you fucking can't.

Like Reiko said, side channel attacks don't count because they're simply useless unless you have physical access to the computer. Kill yourself.
XMPP - wrath@xmpp.jp

Reply

RE: Help im infected (locker v 4.94 ransomware) #20
(05-29-2015, 01:05 AM)Hyper_ Wrote: Yeah, thanks for clearing it up for me.

WOW. Your attitude sure changed quick.
PGP
Sign: F202 79C9 76F7 40BB 54EC 494F 5DEF 1D70 14C1 C4CC
Encrypt: A5B3 1B21 55E1 80AF 4C6E DE83 467B 8EFC 3DEE 681C
Auth: CD55 E8A5 1A08 2933 8BA6 BC88 D81F 1943 739A 3C47

Reply






Users browsing this thread: 1 Guest(s)