2013
DOI: 10.1007/978-3-642-42045-0_18
|View full text |Cite
|
Sign up to set email alerts
|

Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild

Abstract: Abstract. This paper explains how an attacker can efficiently factor 184 distinct RSA keys out of more than two million 1024-bit RSA keys downloaded from Taiwan's national "Citizen Digital Certificate" database. These keys were generated by government-issued smart cards that have built-in hardware random-number generators and that are advertised as having passed FIPS 140-2 Level 2 certification.These 184 keys include 103 keys that share primes and that are efficiently factored by a batch-GCD computation. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
50
0
2

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 75 publications
(52 citation statements)
references
References 12 publications
(13 reference statements)
0
50
0
2
Order By: Relevance
“…Amar Pandey says about correlation attack through his research article named as "Correlation Attacks on Stream Cipher" [11]. To success the correlation attack, the hackers need to known about the structure of key stream generator.…”
Section: ×8mentioning
confidence: 99%
See 1 more Smart Citation
“…Amar Pandey says about correlation attack through his research article named as "Correlation Attacks on Stream Cipher" [11]. To success the correlation attack, the hackers need to known about the structure of key stream generator.…”
Section: ×8mentioning
confidence: 99%
“…If the entire structure of the generator is known and the secret key is only the initial states of LFSRs, then for a key stream generator consisting of n LFSRs. In Brute force attack, the total number of keys to be tried for the break is П(2 L i -1) where L i is the length of the i th LFSR( Linear Feedback Shift Registers) [11].…”
Section: ×8mentioning
confidence: 99%
“…The NAXOS protocol after application of the Cremers-Feltz compiler [11]. 3 Our construction instantiated with a secure NIKE scheme in the random-oracle model. 4 Our construction instantiated with a standard-model NIKE scheme.…”
Section: Efficiency Comparison With Other Orke Protocolsmentioning
confidence: 99%
“…However in practice, there are many famous examples where a flawed (i.e., low-entropy) generation of random numbers has led to serious security flaws. These include, for instance, the Debian OpenSSL bug, 1 the results of Lenstra et al [28] and Heninger et al [17] on the distribution of public keys on the Internet, or the case of certified smart cards considered by Bernstein et al [3].…”
Section: Introductionmentioning
confidence: 99%
“…This is due to issues including poor algorithmic design, software bugs, insufficient or poor estimation of system entropy, and the handling of randomness across virtual machine resets [29]. The results of randomness failures can be catastrophic and newsworthy in practice -DSA, ECDSA and Schnorr private signing keys can be exposed [9,29]; plaintext recovery for low entropy plaintext becomes possible in the the public key encryption setting; key generation processes can be severely weakened [13,25,23,10]; ephemeral Diffie-Hellman keys can become predictable leading to compromise of session keys [19]; and electronic wallet security can be compromised [11].…”
Section: Introductionmentioning
confidence: 99%