Discover
/
Article

Researchers find flaw in public key encryption

FEB 15, 2012
Physics Today
New York Times : Arjen K. Lenstra of école Polytechnique Fédérale de Lausanne, Switzerland, James P. Hughes of California, and their colleages have discovered a weakness in the public-key cryptography algorithm used worldwide for online shopping, banking, and other secure internet services. The algorithm uses the product of two large prime numbers, along with another number, to generate a public “key"; to encrypt data, a second person uses a formula that contains the public number. For this to be secure, the original two prime numbers must be randomly generated. Lenstra and his team analyzed several databases of public keys using the Euclidean algorithm to find the greatest common divisor of two integers. They found that in two out of every one thousand public keys, the numbers weren’t truly random. Lenstra’s team wasn’t able to discover why the random number generators failed in those cases, and they noted that the problem appears in the work of more than one software developer.
Related content
/
Article
/
Article
The availability of free translation software clinched the decision for the new policy. To some researchers, it’s anathema.
/
Article
The Nancy Grace Roman Space Telescope will survey the sky for vestiges of the universe’s expansion.

Get PT in your inbox

pt_newsletter_card_blue.png
PT The Week in Physics

A collection of PT's content from the previous week delivered every Monday.

pt_newsletter_card_darkblue.png
PT New Issue Alert

Be notified about the new issue with links to highlights and the full TOC.

pt_newsletter_card_pink.png
PT Webinars & White Papers

The latest webinars, white papers and other informational resources.

By signing up you agree to allow AIP to send you email newsletters. You further agree to our privacy policy and terms of service.