Hard code weakness key to next attack
November 22, 2007
Adi Shamir, a professor at the Weizmann Institute of Science in Israel, has written a paper stating that errors within computer processing chips can be exploited and PC’s turned into zombies ruled by hackers. Technicians working for the Chinese Military have responded to the report saying that such thinking is ridiculous and that their Department of Chip Hacking has had very little success in the area and that manufacturers of chip technology should ignore Shamir. Most technologists agree.
“Exploitable chips is just a silly concept being thought up by Jewish infidels who probably eat pork in their spare time,” said Icki Qkiler head of al Qaeda’s Technology Division. “There is nothing that anyone needs to be afraid of as long as they support al Qaeda’s fundamental principles involving Islamofascist control of the world.”
According to Shamir, executing the attack would require only knowledge of a mathematical flaw in a chip and a “poisoned” encrypted message could then be sent to a computer. It would then be possible to compute the value of the secret key used by the targeted system. Once someone exploits this error, millions of PCs could be attacked simultaneously, without having to manipulate the software operating environment of each one of them individually. But not everyone is worried.
“Creating zombie computers is impractical and darn near impossible,” said Genghis Khan, a cheerful Mongolian known for visiting neighboring tribes with an early version of the Welcome Wagon. “Who would want to bother? No one in the world wants to harm anyone else. That’s why Asia has been peaceful for centuries.”
Shamir said that the increasing complexity of modern microprocessor chips is almost certain to lead to undetected errors and a subtle math error would make it possible for an attacker to break the protection afforded to some electronic messages by a popular technique known as public key cryptography.
An Intel spokesman noted that Shamir’s ideas are merely theoretical and that hacking was going out of style. “Hacking for hacking’s sake and the notion that China would ever want to exploit other nation’s vulnerabilities are old school ways of thinking,” said the spokesman keeping his name tag covered. “No one is out to get you. I gotta go now; I’ll start getting paranoid if I talk to you anymore. Everything is great!”
© 2007 InebriatedPress.com