Holy crap. Gemalto's IDPrime.NET cards - the ones they tout being Windows native compatible - are suscept. to factorization.
1) Researchers have found a process to duplicate a PRIVATE key just from the PUBLIC key. This is big.

And cheap, for a 1024bit key.
2) Gemalto are a large mfgr of smartcards. Their IDPrime.Net cards are popular because they work with Windows w/o extra software
Gemalto say their product line, which is used in huge environments like Microsoft, *may* be affected.
"It MAY be possible to determine the lock combination to your SafeCo Safe with $40 of AWS time and a pic of the locked door." 😳😳😳🤦‍♂️
But this... this is the pièce de résistance:
Gemalto cards from 2008+ are susceptible. (I'm unclear if this is only applicable to the IDPrime.Net line.). That's huge, but..
A few weeks later, different researchers optimize the factorization algo and get a 25% efficiency boost! Just by reading the original paper.
But alas, their work is for nought, as the original authors had already written a new algo that is 4x better.

So, to recap....
Massive smartcard maker says their encryption/MFA products *may* be reversable just from the public key (which is pretty bad)
Researchers already have a 4x improvement on their PoC code, and the number crunching can be done on cheap cloud time or a GPU crypto rig.
As a former #HPC guy turned #GRC, this is fascinating, astounding, super cool, and very bad, all rolled in one.

Curious to see whats next!
Missing some Tweet in this thread?
You can try to force a refresh.

Like this thread? Get email updates or save it to PDF!

Subscribe to Secwonk for Workgroups 3.11
Profile picture

Get real-time email alerts when new unrolls are available from this author!

This content may be removed anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member and get exclusive features!

Premium member ($3.00/month or $30.00/year)

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!