• Home
  • About Us
  • Subscribe
  • Advertise
  • Newsroom
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • Current Issue
    • Latest News
    • Special Report
    • Up Close
    • Opinion
  • News by Sector
    • Real Estate & Construction
    • Banking & Finance
    • Health Care
    • Education & Talent
    • North Idaho
    • Technology
    • Manufacturing
    • Retail
    • Government
  • Roundups & Features
    • Calendar
    • People
    • Business Licenses
    • Q&A Profiles
    • Cranes & Elevators
    • Retrospective
    • Insights
    • Restaurants & Retail
  • Supplements & Magazines
    • Book of Lists
    • Building the INW
    • Market Fact Book
    • Economic Forecast
    • Best Places to Work
    • Partner Publications
  • E-Edition
  • Journal Events
    • Elevating the Conversation
    • Workforce Summit
    • Icons
    • Women in Leadership
    • Rising Stars
    • Best Places to Work
    • People of Influence
    • Business of the Year Awards
  • Podcasts
  • Sponsored
  • INW Senior
Home » Scientists find weakness in common digital security system

Scientists find weakness in common digital security system

RSA authentication is popular encryption used in various devices

July 1, 2010
News Wise

The most common digital security technique used to protect both media copyright and Internet communications has a major weakness, University of Michigan computer scientists have discovered.

RSA authentication is a popular encryption method used in media players, laptop computers, smartphones, servers, and other devices. Retailers and banks also depend on it to ensure the safety of their customers' information online.

The scientists found they could foil the security system by varying the voltage supply to the holder of the "private key," which would be the consumer's device in the case of copy protection and the retailer or bank in the case of Internet communication. It is highly unlikely that a hacker could use this approach on a large institution, the researchers say.

The findings would be more likely to concern media companies and mobile device manufacturers, as well as those who use them.

Andrea Pellegrini, a doctoral student in the university's department of electrical engineering and computer science, presented a paper on the research in March at a Design, Automation and Test in Europe (DATE) conference in Dresden, Germany.

"The RSA algorithm gives security under the assumption that as long as the private key is private, you can't break in unless you guess it. We've shown that that's not true," says Valeria Bertacco, an associate professor in that department.

The private keys contain more than 1,000 digits of binary code. To guess a number that large would take longer than the age of the universe, Pellegrini says. Using their voltage tweaking scheme, the U-M researchers were able to extract the private key in about 100 hours.

They carefully manipulated the voltage with an inexpensive device built for that purpose. Varying the electric current essentially stresses out the computer and causes it to make small mistakes in its communications with other clients. Those faults reveal small pieces of the private key. Once the researchers caused enough faults, they were able to reconstruct the key offline.

This type of attack doesn't damage the device, so no tamper evidence is left.

"RSA authentication is so popular because it was thought to be so secure," says Todd Austin, a professor in the electrical engineering and computer science department. "Our work redefines the level of security it offers. It lowers the safety assurance by a significant amount."

Although the published paper on the topic discusses only the problem, the professors say they've identified a solution. It's a common cryptographic technique called "salting" that changes the order of the digits in a random way every time the key is requested.

"We've demonstrated that a fault-based attack on the RSA algorithm is possible," Austin says. "Hopefully, this will cause manufacturers to make a few small changes to their implementation of the algorithm. RSA is a good algorithm, and I think, ultimately, it will survive this type of attack."

The research was funded by the National Science Foundation and the Gigascale Systems Research Center.

    Latest News
    • Related Articles

      Scientists 'turn off' severe food allergies in lab mice

      System turns digital design into building components

      MS gene variant more common in women, study finds

    News Wise

    Mayo Clinic seeks to dispel myths about ovarian cancer

    More from this author
    Daily News Updates

    Subscribe today to our free E-Newsletters!

    Subscribe

    Featured Poll

    How much are you spending on holiday shopping this year?

    Popular Articles

    • By Tina Sulzle

      Trader Joe's puts forward plans in Spokane Valley

    • Vintage (10) c
      By Tina Sulzle

      Aloha Vintage marketplace opens in Millwood

    • 1319f8394524761fe62efd46371b1cb6
      By Dylan Harris

      Silverwood to be acquired by Atlanta company

    • By Journal of Business Staff

      Nordstrom Rack eyes new North Spokane location

    • Topgolf web
      By Ethan Pack

      Topgolf project moves forward in Liberty Lake

    • News Content
      • News
      • Special Report
      • Up Close
      • Roundups & Features
      • Opinion
    • More Content
      • E-Edition
      • E-Mail Newsletters
      • Newsroom
      • Special Publications
      • Partner Publications
    • Customer Service
      • Editorial Calendar
      • Our Readers
      • Advertising
      • Subscriptions
      • Media Kit
    • Other Links
      • About Us
      • Contact Us
      • Journal Events
      • Privacy Policy
      • Tri-Cities Publications

    Journal of Business BBB Business Review allianceLogo.jpg CVC_Logo-1_small.jpg

    All content copyright ©  2025 by the Journal of Business and Northwest Business Press Inc. All rights reserved.

    Design, CMS, Hosting & Web Development :: ePublishing