ŠVENDA, Petr, Matúš NEMEC, Peter SEKAN, Rudolf KVAŠŇOVSKÝ, David FORMÁNEK, David KOMÁREK and Václav MATYÁŠ. The Million-Key Question – Investigating the Origins of RSA Public Keys. Online. In Thorsten Holz, Stefan Savage. Proceedings of 25th USENIX Security Symposium. Austin, Texas: USENIX Association, 2016, p. 893-910. ISBN 978-1-931971-32-4.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name The Million-Key Question – Investigating the Origins of RSA Public Keys
Authors ŠVENDA, Petr (203 Czech Republic, guarantor, belonging to the institution), Matúš NEMEC (703 Slovakia, belonging to the institution), Peter SEKAN (703 Slovakia, belonging to the institution), Rudolf KVAŠŇOVSKÝ (703 Slovakia, belonging to the institution), David FORMÁNEK (203 Czech Republic, belonging to the institution), David KOMÁREK (203 Czech Republic, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Austin, Texas, Proceedings of 25th USENIX Security Symposium, p. 893-910, 18 pp. 2016.
Publisher USENIX Association
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
WWW URL
RIV identification code RIV/00216224:14330/16:00088076
Organization unit Faculty of Informatics
ISBN 978-1-931971-32-4
UT WoS 000385263000053
Keywords in English rsa; fingerprinting; cryptographic library; side-channel analysis
Tags core_A, firank_1
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 14/5/2020 15:18.
Abstract
Can bits of an RSA public key leak information about design and implementation choices such as the prime generation algorithm? We analysed over 60 million freshly generated key pairs from 22 open- and closedsource libraries and from 16 different smartcards, revealing significant leakage. The bias introduced by different choices is sufficiently large to classify a probable library or smartcard with high accuracy based only on the values of public keys. Such a classification can be used to decrease the anonymity set of users of anonymous mailers or operators of linked Tor hidden services, to quickly detect keys from the same vulnerable library or to verify a claim of use of secure hardware by a remote party. The classification of the key origins of more than 10 million RSA-based IPv4 TLS keys and 1.4 million PGP keys also provides an independent estimation of the libraries that are most commonly used to generate the keys found on the Internet. Our broad inspection provides a sanity check and deep insight regarding which of the recommendations for RSA key pair generation are followed in practice, including closed-source libraries and smartcards.
Links
GA16-08565S, research and development projectName: Rozvoj kryptoanalytických metod prostřednictvím evolučních výpočtů
Investor: Czech Science Foundation
MUNI/A/0935/2015, interní kód MUName: Zapojení studentů Fakulty informatiky do mezinárodní vědecké komunity (Acronym: SKOMU)
Investor: Masaryk University, Category A
PrintDisplayed: 24/4/2024 22:28