Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.

Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness i...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Castro Lechtaler, Antonio, Cipriano, Marcelo, Malvacio, Eduardo
Formato: Objeto de conferencia
Lenguaje:Inglés
Publicado: 2013
Materias:
PKI
RSA
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/76729
http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf
Aporte de:
id I19-R120-10915-76729
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Inglés
topic Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
spellingShingle Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
topic_facet Ciencias Informáticas
asymmetric cryptography
PKI
OpenSSL
RSA
integer primes
predictable primes
description Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
format Objeto de conferencia
Objeto de conferencia
author Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author_facet Castro Lechtaler, Antonio
Cipriano, Marcelo
Malvacio, Eduardo
author_sort Castro Lechtaler, Antonio
title Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_short Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_full Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_fullStr Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_full_unstemmed Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
title_sort anomaly search in a public key infrastructure openssl v1.0 1e.
publishDate 2013
url http://sedici.unlp.edu.ar/handle/10915/76729
http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf
work_keys_str_mv AT castrolechtalerantonio anomalysearchinapublickeyinfrastructureopensslv101e
AT ciprianomarcelo anomalysearchinapublickeyinfrastructureopensslv101e
AT malvacioeduardo anomalysearchinapublickeyinfrastructureopensslv101e
bdutipo_str Repositorios
_version_ 1764820484539547649