ROCA: Vulnerable RSA generation (CVE-2017-15361)
Security Hardware Alert! Check Your Pubkey Now!
If you are using any type of security hardware
>Smartcard, TPM, HSM, Yubikey, whatever.
And you generated RSA keys onchip?
>Thinking your RSA private key is unextractable.
<Not even close.
Your RSA key may be factored!
Researchers identified a vulnerability in a widely used smardcard cryptography library developed by Infineon Technologies AG, a major security chip vendor, allowing the attacker to factor RSA public keys efficiently.
Millions of cards and devices are affected, including
>TPM: e.g. Google, Lenovo, Microsoft tablets and laptops (TPM chip)
>HSM: e.g. Commercial hardware encryption module to protect SSL/TLS private key.
>NIST FIPS 140-2 or CC EAL 5+ certificated? pwned.
>some financial cards and national ID cards
>Your personal Yubikey or other smartcards for SSH and PGP encryption.
Creating security problems for applications like (((Secure Boot))), PGP/S-MIME encryption, HTTPS/TLS, code signing, security tokens, etc.
Are You Affected?
Check Your X509/PEM/OpenPGP/S-MIME public key:
>https://keychest.net/roca
Offline Check:
>https://github.com/crocs-muni/roca
If affected, immediately revoke your key and try again. Generate your next one from a secure computer system instead, and transfer the key into the card later.
Check Your Yubikey and Ask for a Replacement:
(firmware read-only, not upgrade-able)
>https://www.yubico.com/keycheck/
Cost
>RSA-512 - 2 CPU hours (the cost of $0.06);
>RSA-1024 - 97 CPU days (the cost of $40-$80);
>RSA-2048 - 140.8 CPU years, (the cost of $20,000 - $40,000).
Though the attack is not lightning fast, 140.8 CPU years is not difficult at all. 200 gaming PCs can crack a RSA key within a year. And all attackers can only get faster.
The full research is going to be presented at ACM CCS 2017 in November. The WPA2 attack (>>806357) is also presented here. What a shocking conference for this year.