<html><head><meta http-equiv="Content-Type" content="text/html charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class="">"<span style="color: rgb(34, 34, 34); font-family: opensans; font-size: 15px; font-variant-ligatures: normal; orphans: 2; widows: 2; background-color: rgb(255, 255, 255);" class="">To boost performance, the Infineon library constructs the keys' underlying prime numbers in a way that makes them prone to a </span><a href="https://en.wikipedia.org/wiki/Factorization" target="_blank" data-saferedirecturl="https://www.google.com/url?hl=en&q=https://en.wikipedia.org/wiki/Factorization&source=gmail&ust=1508283522646000&usg=AFQjCNFKOhFZv9Jy9WRZx5h6fSXrKKr3FA" style="color: rgb(255, 78, 0); font-family: opensans; font-size: 15px; font-variant-ligatures: normal; orphans: 2; widows: 2; background-color: rgb(255, 255, 255); box-sizing: inherit; text-decoration: none;" class="">process known as factorization</a><span style="color: rgb(34, 34, 34); font-family: opensans; font-size: 15px; font-variant-ligatures: normal; orphans: 2; widows: 2; background-color: rgb(255, 255, 255);" class="">, which exposes the secret numbers underpinning their security.”</span><div class=""><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="font-size: 15px; background-color: rgb(255, 255, 255);" class=""><br class=""></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="font-size: 15px; background-color: rgb(255, 255, 255);" class="">I just love those primes that are vulnerable to factorization.</span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="font-size: 15px; background-color: rgb(255, 255, 255);" class=""><br class=""></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="background-color: rgb(255, 255, 255);" class=""><span style="font-size: 15px;" class="">Looks like they didn’t use a proper primality test. </span></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="background-color: rgb(255, 255, 255);" class=""><span style="font-size: 15px;" class=""><br class=""></span></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="background-color: rgb(255, 255, 255);" class=""><span style="font-size: 15px;" class=""><br class=""></span></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="background-color: rgb(255, 255, 255);" class=""><span style="font-size: 15px;" class="">I would like to move to an ECC suite that has been designed to be ro</span></span></font></div><div style="orphans: 2; widows: 2;" class=""><font color="#222222" face="opensans" class=""><span style="font-size: 15px; background-color: rgb(255, 255, 255);" class=""><br class=""></span></font></div><div><blockquote type="cite" class=""><div class="">On Oct 16, 2017, at 2:44 PM, Geoff Keating via Public <<a href="mailto:public@cabforum.org" class="">public@cabforum.org</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><meta http-equiv="content-type" content="text/html; charset=utf-8" class=""><div dir="auto" class=""><a href="https://crocs.fi.muni.cz/public/papers/rsa_ccs17" class="">https://crocs.fi.muni.cz/public/papers/rsa_ccs17</a><div class=""></div><div class=""><br class=""></div><div class=""><span style="background-color: rgba(255, 255, 255, 0);" class="">“A newly discovered vulnerability in generation of RSA keys used by a software library adopted in cryptographic smartcards, security tokens and other secure hardware chips manufactured by Infineon Technologies AG ... Assess your keys now with the provided <a href="https://crocs.fi.muni.cz/public/papers/rsa_ccs17#detection_tools_mitigation_and_workarounds" class="urlextern" target="_blank" title="https://crocs.fi.muni.cz/public/papers/rsa_ccs17#detection_tools_mitigation_and_workarounds" rel="nofollow noopener" style="box-sizing: border-box; text-decoration: none; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px !important; background-image: none !important;">offline and online detection tools</a> and contact your vendor if you are affected.”</span></div><div class=""><span style="background-color: rgba(255, 255, 255, 0);" class=""><br class=""></span></div><div class=""><span style="background-color: rgba(255, 255, 255, 0);" class="">It sounds like for CAs, the remediation is to implement the detection tool as a pre-check before issuing a certificate, and then start on the process of checking existing certificates for the flaw.</span></div></div>_______________________________________________<br class="">Public mailing list<br class=""><a href="mailto:Public@cabforum.org" class="">Public@cabforum.org</a><br class="">https://cabforum.org/mailman/listinfo/public<br class=""></div></blockquote></div><br class=""></div></body></html>