Probability References to Apply in the Detection of Anomalous Public Key Infrastructures

This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral pattern of a Public Key Infrastructure (PKI), thu...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Castro Lechtaler, Antonio, Cipriano, Marcelo, Malvacio, Eduardo
Formato: Articulo
Lenguaje:Inglés
Publicado: 2016
Materias:
PKI
RSA
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/57266
http://journal.info.unlp.edu.ar/wp-content/uploads/2016/12/JCST-43-Paper-3.pdf
Aporte de:
id I19-R120-10915-57266
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
PKI
RSA
digital certificates
spellingShingle Ciencias Informáticas
PKI
RSA
digital certificates
Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
topic_facet Ciencias Informáticas
PKI
RSA
digital certificates
description This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral pattern of a Public Key Infrastructure (PKI), thus allowing the detection of operational anomalies and the prevention of vulnerabilities of this nature.
format Articulo
Articulo
author Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author_facet Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author_sort Castro Lechtaler, Antonio
title Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
title_short Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
title_full Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
title_fullStr Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
title_full_unstemmed Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
title_sort probability references to apply in the detection of anomalous public key infrastructures
publishDate 2016
url http://sedici.unlp.edu.ar/handle/10915/57266
http://journal.info.unlp.edu.ar/wp-content/uploads/2016/12/JCST-43-Paper-3.pdf
work_keys_str_mv AT castrolechtalerantonio probabilityreferencestoapplyinthedetectionofanomalouspublickeyinfrastructures
AT ciprianomarcelo probabilityreferencestoapplyinthedetectionofanomalouspublickeyinfrastructures
AT malvacioeduardo probabilityreferencestoapplyinthedetectionofanomalouspublickeyinfrastructures
bdutipo_str Repositorios
_version_ 1764820478072979457