Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
- Autores
- Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo
- Año de publicación
- 2013
- Idioma
- inglés
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
Sociedad Argentina de Informática e Investigación Operativa - Materia
-
Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/76729
Ver los metadatos del registro completo
id |
SEDICI_f032d4dcdc16a493614c5d86fe9aa895 |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/76729 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.Castro Lechtaler, AntonioCipriano, MarceloMalvacio, EduardoCiencias Informáticasasymmetric cryptographyPKIOpenSSLRSAinteger primespredictable primesPublic key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.Sociedad Argentina de Informática e Investigación Operativa2013-09info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf49-56http://sedici.unlp.edu.ar/handle/10915/76729enginfo:eu-repo/semantics/altIdentifier/url/http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdfinfo:eu-repo/semantics/altIdentifier/issn/1850-2806info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:13:34Zoai:sedici.unlp.edu.ar:10915/76729Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:13:34.749SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
title |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
spellingShingle |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. Castro Lechtaler, Antonio Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes |
title_short |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
title_full |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
title_fullStr |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
title_full_unstemmed |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
title_sort |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
dc.creator.none.fl_str_mv |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo |
author |
Castro Lechtaler, Antonio |
author_facet |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo |
author_role |
author |
author2 |
Cipriano, Marcelo Malvacio, Eduardo |
author2_role |
author author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes |
topic |
Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes |
dc.description.none.fl_txt_mv |
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present. Sociedad Argentina de Informática e Investigación Operativa |
description |
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present. |
publishDate |
2013 |
dc.date.none.fl_str_mv |
2013-09 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/76729 |
url |
http://sedici.unlp.edu.ar/handle/10915/76729 |
dc.language.none.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/url/http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf info:eu-repo/semantics/altIdentifier/issn/1850-2806 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
dc.format.none.fl_str_mv |
application/pdf 49-56 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1844616006505332736 |
score |
13.070432 |