advertisement
advertisement

This is page 2 of:

New Retail Crypto Hole: Check Your Keys Now

February 15th, 2012

It gets worse. “More seriously, we stumbled upon 12,720 different 1024-bit RSA moduli that offer no security. Their secret keys are accessible to anyone who takes the trouble to redo our work. Assuming access to the public key collection, this is straightforward compared to more traditional ways to retrieve RSA secret keys.

“What surprised us most is that many thousands of 1024-bit RSA moduli, including thousands that are contained in still valid X.509 certificates, offer no security at all. This may indicate that proper seeding of random number generators is still a problematic issue,” the report said.

The paper points out some issues that need attention, but it also overreaches, such as when it said that “0.2 percent of the keys offer no security.” Actually, they offer roughly the same security as the lock on your front door: It will discourage millions of casual walk-ins, even though it won’t stop a professional thief who has targeted your house.

The major retail security exec said she had a plan for minimizing her chain’s exposure. “My first-glance reaction is not to panic needlessly. I plan to wait for researchers to identify a key generation system that avoids the current pitfalls, then rotate my keys on their normal schedule. I might exercise a ‘compromised key scenario’ for practice, but not out of fear. That would all change if the facts get worse, of course.”

The retail security exec said the cause of the problem is partially sloppy retail IT procedures. The same chains at risk because of that sloppiness will likely remain at risk when the fixes are published, due to the probability of more sloppiness.

“The weak keys and collisions were likely caused by using the default configurations of some key generators and (that chain’s IT team) not properly following directions to install it in a secure fashion. This means they likely did not properly seed their random number generators,” she said. “Someone will identify these poor configurations and publish them. This will allow organizations to check their systems and, if their configuration is the same, they should reconfigure their key generation system and replace all their keys. Many shops who originally failed to follow the instructions for careful installation of their systems will also fail to heed these warnings.”

Any security risk is only dangerous to the extent that cyberthieves have the means to exploit the hole and, indeed, do so. “Some bad guys are likely to begin trying to replicate their work, if they haven’t already. But it will take them some amount of time before they hit a goldmine. There may be a few weak keys identified rapidly, leading to a couple of minor public embarrassments,” the retail cryptography expert said. “If it’s revealed that a certificate authority’s signing key was among those compromised, that will be big news, along the lines of the now-defunct DigiNotar. If you currently use 1024-bit RSA keys, it’s likely the future recommendation will be to replace them with 2048-bit (or larger) keys. Some shops will react very quickly and are probably replacing every key this week. There will be minor fallout as some mistakes will be made in the rush.”

She also had a good suggestion: “This is a good time to review your ‘Key Compromise Plan.’ You did create a Key Compromise Plan as a part of your PCI compliance work, didn’t you?” she asked. “If you received a notification from the SSL Observatory to replace your weak keys, and haven’t acted upon it yet, do so now. There will likely be recommendations forthcoming to re-install updated versions of certain key generating software packages, and to generate new keys after they’ve been installed. That will likely be the best time to act.”

Considering how much effort has already gone into rainbow tables and the like, we can be reasonably sure there are currently thieves who have created those tools and are running them on every public key they can find. That means for the one in 500 at risk, they really are at risk.


advertisement

Comments are closed.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.