Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.

Autores
Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo
Año de publicación
2013
Idioma
inglés
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
Sociedad Argentina de Informática e Investigación Operativa
Materia
Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/76729

id SEDICI_f032d4dcdc16a493614c5d86fe9aa895
oai_identifier_str oai:sedici.unlp.edu.ar:10915/76729
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.Castro Lechtaler, AntonioCipriano, MarceloMalvacio, EduardoCiencias Informáticasasymmetric cryptographyPKIOpenSSLRSAinteger primespredictable primesPublic key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.Sociedad Argentina de Informática e Investigación Operativa2013-09info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf49-56http://sedici.unlp.edu.ar/handle/10915/76729enginfo:eu-repo/semantics/altIdentifier/url/http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdfinfo:eu-repo/semantics/altIdentifier/issn/1850-2806info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-29T11:13:34Zoai:sedici.unlp.edu.ar:10915/76729Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-29 11:13:34.749SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
spellingShingle Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
Castro Lechtaler, Antonio
Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
title_short Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_full Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_fullStr Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_full_unstemmed Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_sort Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
dc.creator.none.fl_str_mv Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author Castro Lechtaler, Antonio
author_facet Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author_role author
author2 Cipriano, Marcelo
Malvacio, Eduardo
author2_role author
author
dc.subject.none.fl_str_mv Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
topic Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
dc.description.none.fl_txt_mv Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
Sociedad Argentina de Informática e Investigación Operativa
description Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
publishDate 2013
dc.date.none.fl_str_mv 2013-09
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/76729
url http://sedici.unlp.edu.ar/handle/10915/76729
dc.language.none.fl_str_mv eng
language eng
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/url/http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf
info:eu-repo/semantics/altIdentifier/issn/1850-2806
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
49-56
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1844616006505332736
score 13.070432