The paper of this attack is RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis by Daniel Genkin, Adi Shamir and Eran Tromer. Given the quality of the article and the names of the researcher, it is really hard to doubt the paper content. But be wary that press tend to make things worse than they actually are. e.g. a year ago, we had a paper on Freestart collision for full SHA-1

A 1,024‐bit RSA key is cryptographically equivalent to a 160‐bit elliptic curve cryptosystem key. John wants to produce a message digest of a 2,048-byte message he plans to send to Mary. If he uses the SHA-1 hashing algorithm, what size will the message digest for this particular message be? 1024-bit RSA (RSA_1024) 2048-bit RSA (RSA_2048) 4096-bit RSA (RSA_4096) Arguably, SSL implementations which cannot use RSA keys larger than 1024 bits ought to be changed, because they are sloppy. 1024-bit RSA is not (yet) broken (current record is for a 768-bit key) but it seems to be within reach of current technology (using a substantial amount of millions of dollars, and a very specific to-be-built machine Oct 19, 2017 · When encryption standards progressed to 1024-bit, the Lenstra group estimated that factoring the 1024-bit modulus would take about 1,000 times as long as it would to break the previous 786-bit modulus. But further progress to a larger 2048-bit encryption has made factorization even harder. Currently with apache/mod_ssl, if DHE is enabled then a 1024-bit ephemeral key will be used. I found the following quote in Adam Langley's blog:. Ideally the DH group would match or exceed the RSA key size but 1024-bit DHE is arguably better than straight 2048-bit RSA so you can get away with that if you want to.

I'm using JSCH 0.1.53 to connect to a remote SSH server, which uses a 1024-bit RSA key. We are able to connect successfully to the remote server when we also use a 1024-bit RSA key, but when we generated stronger 2048-bit keys we stopped being able to connect.

A 1024-bit RSA key invocation can encrypt a message up to 117 bytes, and results in a 128-byte value A 2048-bit RSA key invocation can encrypt a message up to 245 bytes RSA, as defined by PKCS#1,encrypts "messages" of limited size,the maximum sizeof … RSA numbers - Wikipedia

May 03, 2018 · Why 1024-bit RSA keys are not strong enough Description As early as 2007, prominent cryptographers have been warning about the advancing ability to factor large numbers and the corresponding loss in strength of RSA keys in the size most commonly used today, 1024 bits (1, 2).

RSA ® Business-Driven Security™ solutions address critical risks that organizations across sectors are encountering as they weave digital technologies deeper into their businesses. Cyber attacks See how prioritizing threats can help your organization coordinate an effective response to cyber attacks that helps minimize business impact. openssl Subject Public Key Info: RSA Public Key: (1024 bit Subject Public Key Info: Public Key Algorithm: rsaEncryption Public Key: (1024 bit) I generated a certificate using the following command. openssl genrsa -out my.key 1024 openssl req -new -key my.key -config -out my.req openssl ca -out my.crt -infiles my.req My cert contains Public Key: (1024 bit) and not "RSA Public Key: (1024 bit)" 1024 bit Public and Private Keys :: 1024 bit Public and From 1st January 2011, GlobalSign introduced RSA key size requirements to no longer accept 1024 bit Certificate Signing Requests (CSRs). This thinking was aligned with the decision, back in 1998, to create a 2048 bit Root Certificate and therefore a full 2048 bit hierarchy of services including issuing CAs, CRLs and OCSP responders. tls - 1024-bit DHE vs 2048-bit RSA - Information Security Moreover, it is not completely justified to compare the hardness of 1024-bit DH with the hardness of 2048-bit RSA, since both are in the "cannot break it" zone. A summary of all this goes thus: while 1024-bit DH is somewhat stronger (theoretically) than 1024-bit RSA, the difference is slight (say, 1024-bit DH is like 1200-bit RSA at most).