Create an Account
username: password:
 
  MemeStreams Logo

MemeStreams Discussion

search


This page contains all of the posts and discussion on MemeStreams referencing the following web page: TI-83 Plus OS Signing Key Cracked - ticalc.org. You can find discussions on MemeStreams as you surf the web, even if you aren't a MemeStreams member, using the Threads Bookmarklet.

TI-83 Plus OS Signing Key Cracked - ticalc.org
by Decius at 5:12 pm EDT, Aug 30, 2009

I find this extremely interesting - one of the threats that well known cryptographic keys face is "angry mob cryptanalysis" - a bunch of people get together on the Internet and crack your key. If there is enough widespread interest in cracking your key that the masses have enough computing power between them to crack it, the mob wins and your private key becomes a matter of public knowledge.

This is a risk for code signing keys because they make it hard for people to do what they want their their computers. While its interesting on paper I'm not aware that it ever happened in practice until today. All of the distributed computing efforts to crack keys that I'm aware of have focused on "public challenges" that are intended to be cracked, or were otherwise organized as security demonstrations rather than as real attacks. Maybe someone on MemeStreams will recall an older example of this that I'm forgetting.

(I'm talking about cases where cracking the cryptography was a means to an end and not the end itself. The hash collision attack from December was extremely cool but it doesn't qualify, because they were breaking the security of the system for the sole purpose of demonstrating that it could be done - rather than because they wanted to get at the thing that the security protects.**)

The ever-mysterious Benjamin Moody posted a cryptic message on the United-TI forum yesterday. In it, he listed the factorization of the 512-bit RSA modulus used by TI's OS signing key for the 83+ (the "0004 key").

With this achievement... Third party operating systems can thus be loaded on any 83+ calculators... Complete programming freedom has finally been achieved on the TI-83 Plus!.

In this case the key is old, and due to the nature of the platform in question a relatively small, 512 bit key was chosen. The guy was able to crack the key by himself without organizing a mob. He posted some details about his cracking effort:

- The factorization took, in total, about 1745 hours, or a bit less than 73 days, of computation. (I've actually been working on this since early March; I had a couple of false starts and haven't been able to run the software continously.)
- My CPU, for reference, is a dual-core Athlon64 at 1900 MHz.
- The sieving database was 4.9 gigabytes and contained just over 51 million relations.
- During the "filtering" phase, Msieve was using about 2.5 gigabytes of RAM.
- The final processing involved finding the null space of a 5.4 million x 5.4 million matrix.

However, it appears that a mob has formed to target some of the other keys on the TI:

A distributed computing project has been set up. Information about how to join the effort to crack the OS keys for the rema... [ Read More (0.1k in body) ]


 
 
Powered By Industrial Memetics