http://www.infosecurity-us.com/view/...-power-supply/
Ok, I'm all for fixing security problems, but to me, this doesn't really seem like a problem. From what I understand, they'd need physical access to the device, in it's running state while it's processing the information that you want to decrypt. So chances are, you'd want to be doing this secretly.
I think it would be pretty difficult to sneak inside a building for 104 hours with 4 or 5 full racks of 2.4Ghz machines and pull this off. It's great to see that OpenSSL is going to fix the problem, and kudos to the guys that figured it out, but is it something that was could have been exploited in the wild?
Using this technique, they were able to expose four bits of the key at a time, and assemble the entire 1024-bit key in 104 hours using a cluster of 81 2.4-GHz Pentium 4 computers.
I think it would be pretty difficult to sneak inside a building for 104 hours with 4 or 5 full racks of 2.4Ghz machines and pull this off. It's great to see that OpenSSL is going to fix the problem, and kudos to the guys that figured it out, but is it something that was could have been exploited in the wild?
Comment