1024-bit RSA encryption cracked by undervolting

Posted on Wednesday, March 10 2010 @ 3:00 CET by Thomas De Maesschalck
Researchers at the University of Michigan have cracked the RSA 1024-bit protection by undervolting the voltage of the processor such that it generated a single hardware error per clock cycle, which helped the scientists to slowly piece together the password.
Now, three eggheads (or Wolverines, as it were) at the University of Michigan claim they can break it simply by tweaking a device's power supply. By fluctuating the voltage to the CPU such that it generated a single hardware error per clock cycle, they found that they could cause the server to flip single bits of the private key at a time, allowing them to slowly piece together the password. With a small cluster of 81 Pentium 4 chips and 104 hours of processing time, they were able to successfully hack 1024-bit encryption in OpenSSL on a SPARC-based system, without damaging the computer, leaving a single trace or ending human life as we know it.
More info at Engadget.


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments