Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)

Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detect...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Castro Lechtaler, Antonio, Cipriano, Marcelo, Malvacio, Eduardo, Cañón, Sebastián
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2012
Materias:
SSL
RSA
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/123949
https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf
Aporte de:
id I19-R120-10915-123949
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
Asymmetric Cryptography
SSL
RSA
Integers Primes
Predictable Primes
spellingShingle Ciencias Informáticas
Asymmetric Cryptography
SSL
RSA
Integers Primes
Predictable Primes
Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
Cañón, Sebastián
Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
topic_facet Ciencias Informáticas
Asymmetric Cryptography
SSL
RSA
Integers Primes
Predictable Primes
description Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detected. Its number generator was biased and creating system vulnerabilities by turning certificates predictable. This paper analyses the generic performance of a RSA cryptographic Oracle and develops a methodology to detect irregularities and anomalies in the quality of the certificates. A solution is presented to identify possible colliding primes. In this way, network administrators and information security experts can audit the performance of cryptographic modules in use.
format Objeto de conferencia
Objeto de conferencia
author Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
Cañón, Sebastián
author_facet Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
Cañón, Sebastián
author_sort Castro Lechtaler, Antonio
title Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
title_short Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
title_full Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
title_fullStr Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
title_full_unstemmed Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)
title_sort procedure for the detection of anomalies in public key infrastructure (rsa systems)
publishDate 2012
url http://sedici.unlp.edu.ar/handle/10915/123949
https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf
work_keys_str_mv AT castrolechtalerantonio procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems
AT ciprianomarcelo procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems
AT malvacioeduardo procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems
AT canonsebastian procedureforthedetectionofanomaliesinpublickeyinfrastructurersasystems
bdutipo_str Repositorios
_version_ 1764820450552053760