Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Microsoft Encryption Security Software Technology

In Face of Flame Malware, Microsoft Will Revamp Windows Encryption Keys 100

coondoggie writes "Starting next month, updated Windows operating systems will reject encryption keys smaller than 1024 bits, which could cause problems for customer applications accessing Web sites and email platforms that use the keys. The cryptographic policy change is part of Microsoft's response to security weaknesses that came to light after Windows Update became an unwitting party to Flame Malware attacks, and affects Windows XP, Windows Server 2003, Windows Server 2003 R2, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 operating systems."
This discussion has been archived. No new comments can be posted.

In Face of Flame Malware, Microsoft Will Revamp Windows Encryption Keys

Comments Filter:
  • by rsmith-mac ( 639075 ) on Wednesday July 11, 2012 @07:06PM (#40622275)

    That's a pretty serious "fact". And not to sound like a smart-ass Wikipedia editor, but some kind of citation would be great.

    One can certainly believe there are moles at Microsoft/Apple. One can even reasonably assume that the United States Government has the power to compel Microsoft/Apple to do things that are in the U.S.'s best interests. However for a foreign mole to be able to insert back doors into the Windows source code - which I would add is fairly well vetted since most governments and educational institutions have read access to the source - would be quite remarkable to the point of being unbelievable.

  • by nzac ( 1822298 ) on Wednesday July 11, 2012 @07:22PM (#40622539)

    Because doubling the key length roughly increases the required time by 7. Increasing compute time by 7^20 is a little extreme, when just doubling it is good for a while.

  • by nzac ( 1822298 ) on Wednesday July 11, 2012 @07:27PM (#40622591)

    Sorry got my maths wrong its only about about 300 million times longer.

  • True, but as ITWorld's Kevin Fogarty says;

    Still, the assumption seems to be true metaphorically, if not physically, so it's safer to assume Microsoft and its software have both been compromised. Given the track record of Stuxnet, Duqu and Flame for compromising everything they're aimed at, that assumption isn't even much of a stretch.

    http://www.itworld.com/security/281553/researcher-warns-stuxnet-flame-show-microsoft-may-have-been-infiltrated-nsa-cia [itworld.com]

    Personally, I use Linux because it's lower maintenance and less overhead, and gets out of my way when I'm working, but if I was a business lead, I'd certainly be avoiding Windows for anything requiring data security. The wonder is that we're not seeing users suing over compromised data/systems.

  • by cavreader ( 1903280 ) on Wednesday July 11, 2012 @09:00PM (#40623465)

    Why do people assume there is a large group of developers that actually understand OS source code and are capable of locating and correcting any problems found? Most of the people with the necessary skills to do this are already busy working for companies that actually pay them for their services. The vast majority of security issues are discovered by companies and individuals who specialize in this area and expect payment for their services. OS troubleshooting and development also requires well stocked labs to test all of the different permutations of hardware and software behaviors. The low hanging fruit has already been grabbed which forces deeper analysis of the OS code to locate potential issues and determine the impact their proposed changes will have. Just because someone is half way competent in Application development does not mean they have the skills needed to understand OS development. OS development is quite different than Application development. Just downloading the OS source code and building it can be a gigantic pain in the ass when trying to sort out all of the dependencies and compiler configurations for a particular environment.

    I you want a secure system you are better off making sure the system administrators and application developers are doing their jobs. Some of most harmful security issues have exploited known issues that were corrected way before someone started exploited them. And those happens because system administrators failed to stay current on their security related service packs.

Lots of folks confuse bad management with destiny. -- Frank Hubbard

Working...