Haven’t read this yet but it looks significant. The attack relies on the presence of a fault so it’s not like every ssh key everywhere is broken. But the abstract says 100s of broken keys have been found.
Haven’t read this yet but it looks significant. The attack relies on the presence of a fault so it’s not like every ssh key everywhere is broken. But the abstract says 100s of broken keys have been found.
Were these algorithms reverse engineered and made public years ago anyway? I half remember something about that.