Procedure for the Detection of Anomalies in Public Key Infrastructure (RSA Systems)

Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detect...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Castro Lechtaler, Antonio, Cipriano, Marcelo, Malvacio, Eduardo, Cañón, Sebastián
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2012
Materias:
SSL
RSA
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/123949
https://41jaiio.sadio.org.ar/sites/default/files/25_AST_2012.pdf
Aporte de:
Descripción
Sumario:Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detected. Its number generator was biased and creating system vulnerabilities by turning certificates predictable. This paper analyses the generic performance of a RSA cryptographic Oracle and develops a methodology to detect irregularities and anomalies in the quality of the certificates. A solution is presented to identify possible colliding primes. In this way, network administrators and information security experts can audit the performance of cryptographic modules in use.