2012
DOI: 10.1007/978-3-642-32009-5_37
|View full text |Cite
|
Sign up to set email alerts
|

Public Keys

Abstract: Abstract. We performed a sanity check of public keys collected on the web and found that the vast majority works as intended. Our main goal was to test the validity of the assumption that different random choices are made each time keys are generated. We found that this is not always the case, resulting in public keys that offer no security. Our conclusion is that generating secure public keys in the real world is challenging. We did not study usage of public keys.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
31
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 77 publications
(35 citation statements)
references
References 18 publications
0
31
0
Order By: Relevance
“…Examples of nonce repetition are flawed implementations [8,10,19,22,34], bad management of nonces by the user, and backup resets or virtual machine clones when the nonce is stored as a counter.…”
Section: Introductionmentioning
confidence: 99%
“…Examples of nonce repetition are flawed implementations [8,10,19,22,34], bad management of nonces by the user, and backup resets or virtual machine clones when the nonce is stored as a counter.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, nonce misuse is a security threat in plenty of practical applications, not necessarily limited to the lightweight setting. Examples include flawed implementations of nonces [12,14,21,22,31], bad management of nonces by the user, and backup resets or virtual machine clones when the nonce is stored as a counter.…”
Section: Introductionmentioning
confidence: 99%
“…For schemes like RSA [34], ElGamal [11] or DSA [36], the most common size of the modulus for parameters in use is large; 1024 bits long [20,28]. The typical modulus size will increase to 2048 and 3072 bits over the coming years, in order to comply with the current 112-and 128-bit security standard (cf.…”
Section: Introductionmentioning
confidence: 99%