Prosperity Park, on 03 April 2012 - 08:21 AM, said:
To my knowledge: no key, no decoding. It can be done, but its beyond my abilities. U of M figured out how to do it, but it's not easy
"[color=#333333]The search for a given pair (M, S) that has a single fault in a position covered by a specified window W is computationally intensive. If S is a faulty signature then the attacker cannot easily determine the number or position of the faults in the signature. The researchers generated 10,000 signatures, of which 8,800 were faulty, and tried to recover the 1024-bit exponent. Using an 81-processor cluster this took 104 hours, with the guess-and-verify step for each window taking 2.5 seconds. The private key was recovered after 650 single fault signatures processed."[/color]
The best bet is to keep monitoring transmissions and continued surveillance on known suspects.
						
				
						
				

						
				

						
				









								

