Sean Gallagher / Ars Technica
Sean Gallagher / Ars Technica
Controversial Cryptography Company Crown Sterling Touts Decryption Accomplishment, Experts Immediately Deride Company’s Claim
Controversial digital cryptography company Crown Sterling issued a press release claiming that it had decrypted two RSA 256-bit asymmetric public keys in approximately 50 seconds from a standard laptop computer before a gathering of what the press release says is “approximately 100 academics and business professionals,” a claim met with great derision among experts who understand cryptography. Crown Sterling also released a video of the decryption demonstration. Crown Sterling has been promoting its “Time AI” cryptographic system which it says will fix the breakable-ness of RSA cryptography by using an entirely different method of generating keys, one that doesn’t rely on factoring large prime numbers. The company is suing cybersecurity conference Black Hat for alleged breach of contract over a sponsored presentation it gave at the event in August, which generated jeers from the presentation attendees.
Schneier on Security: Crown Sterling Claims to Factor RSA Keylengths First Factored Twenty Years Ago
Yahoo Finance: Crown Sterling Decrypts RSA Asymmetric Public Keys in Live Demonstration
@thepacketrat: Video here.
@lesleycarhart: Wow, the hole just gets deeper and deeper...
@TheSweetKat: Breaking news: Crown Sterling cracks symmetric encryption method known as ROT-13
@gregotto: Crown Sterling (the company that is suing Black Hat) just sent out a press release saying it decrypted RSA keys Thursday in front of a room full of academics in California yesterday.If you were in that room, I would like to speak with you
@LargeCardinal: I think @matthew_d_green has done stuff on this, but these numbers don't seem that impressive... Doing some digging now.
@henrykploetz: Well, this is Sagemath on my Ultrabook (X1 Carbon 2017). I'm assuming the default implementation is single-threaded. So, "50 seconds" is exactly the expected performance on a 4-core laptop.
@erratarob: Cracking 256-bit RSA keys is simple and not a convincing demonstration. Whatever you demo in a controlled setting with a laptop is not believable, since you can cheat. This means nothing.Solving any real-world problem, such as the above key, is what would convince people.
@malwaretechblog: Who exactly are they trying to impress? You can factor 256 bit RSA on a smartphones in < 1h, and 512 bit is doable in a few mins with a EC2 cluster.
@matthew_d_green: These Crown Sterling people are going to launch a cryptocurrency, mark my words.
@XorNinja: Say what you want about Crown Sterling, but this is definitely a breakthrough in cryptography bullshit
@taviso: I googled some of the strings in the output, it looks like a modified version of cado-nfs, e.g. the tasks.threads message comes from here ? https://scm.gforge.inria.fr/anonscm/gitweb?p=cado-nfs/cado-nfs.git;a=blob;f=scripts/cadofactor/toplevel.py;hb=6b6df64249cf60eeace0f7611a266d972af74d56#l806