Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness i...
Guardado en:
| Autores principales: | , , |
|---|---|
| Formato: | Objeto de conferencia |
| Lenguaje: | Inglés |
| Publicado: |
2013
|
| Materias: | |
| Acceso en línea: | http://sedici.unlp.edu.ar/handle/10915/76729 http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf |
| Aporte de: |
| id |
I19-R120-10915-76729 |
|---|---|
| record_format |
dspace |
| institution |
Universidad Nacional de La Plata |
| institution_str |
I-19 |
| repository_str |
R-120 |
| collection |
SEDICI (UNLP) |
| language |
Inglés |
| topic |
Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes |
| spellingShingle |
Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| topic_facet |
Ciencias Informáticas asymmetric cryptography PKI OpenSSL RSA integer primes predictable primes |
| description |
Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number.
Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised.
This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present. |
| format |
Objeto de conferencia Objeto de conferencia |
| author |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo |
| author_facet |
Castro Lechtaler, Antonio Cipriano, Marcelo Malvacio, Eduardo |
| author_sort |
Castro Lechtaler, Antonio |
| title |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| title_short |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| title_full |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| title_fullStr |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| title_full_unstemmed |
Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. |
| title_sort |
anomaly search in a public key infrastructure openssl v1.0 1e. |
| publishDate |
2013 |
| url |
http://sedici.unlp.edu.ar/handle/10915/76729 http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf |
| work_keys_str_mv |
AT castrolechtalerantonio anomalysearchinapublickeyinfrastructureopensslv101e AT ciprianomarcelo anomalysearchinapublickeyinfrastructureopensslv101e AT malvacioeduardo anomalysearchinapublickeyinfrastructureopensslv101e |
| bdutipo_str |
Repositorios |
| _version_ |
1764820484539547649 |