Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detect...
Guardado en:
| Autores principales: | , , , |
|---|---|
| Formato: | Objeto de conferencia |
| Lenguaje: | Inglés |
| Publicado: |
2012
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/123949 https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf |
| Aporte de: |
| id |
I19-R120-10915-123949 |
|---|---|
| record_format |
dspace |
| institution |
Universidad Nacional de La Plata |
| institution_str |
I-19 |
| repository_str |
R-120 |
| collection |
SEDICI (UNLP) |
| language |
Inglés |
| topic |
Ciencias Informáticas Asymmetric Cryptography SSL RSA Integers Primes Predictable Primes |
| spellingShingle |
Ciencias Informáticas Asymmetric Cryptography SSL RSA Integers Primes Predictable Primes Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo Cañón, Sebastián Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| topic_facet |
Ciencias Informáticas Asymmetric Cryptography SSL RSA Integers Primes Predictable Primes |
| description |
Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detected. Its number generator was biased and creating system vulnerabilities by turning certificates predictable. This paper analyses the generic performance of a RSA cryptographic Oracle and develops a methodology to detect irregularities and anomalies in the quality of the certificates. A solution is presented to identify possible colliding primes. In this way, network administrators and information security experts can audit the performance of cryptographic modules in use. |
| format |
Objeto de conferencia Objeto de conferencia |
| author |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo Cañón, Sebastián |
| author_facet |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo Cañón, Sebastián |
| author_sort |
Castro Lechtaler, Antonio |
| title |
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| title_short |
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| title_full |
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| title_fullStr |
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| title_full_unstemmed |
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems) |
| title_sort |
procedure for the detection of anomalies in public key infrastructure (rsa systems) |
| publishDate |
2012 |
| url |
http://sedici.unlp.edu.ar/handle/10915/123949 https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf |
| work_keys_str_mv |
AT castrolechtalerantonio procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems AT ciprianomarcelo procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems AT malvacioeduardo procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems AT canonsebastian procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems |
| bdutipo_str |
Repositorios |
| _version_ |
1764820450552053760 |