Biased RSA private keys: Origin attribution of GCD-factorable keys

09/14/2020
by   Adam Janovsky, et al.
0

In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported that the implementation choices in cryptographic libraries allow for qualified guessing about the origin of public RSA keys. We extend the technique to two new scenarios when not only public but also private keys are available for the origin attribution - analysis of a source of GCD-factorable keys in IPv4-wide TLS scans and forensic investigation of an unknown source. We learn several representatives of the bias from the private keys to train a model on more than 150 million keys collected from 70 cryptographic libraries, hardware security modules and cryptographic smartcards. Our model not only doubles the number of distinguishable groups of libraries (compared to public keys from Svenda et al.) but also improves more than twice in accuracy w.r.t. random guessing when a single key is classified. For a forensic scenario where at least 10 keys from the same source are available, the correct origin library is correctly identified with average accuracy of 89 guess. The technique was also used to identify libraries producing GCD-factorable TLS keys, showing that only three groups are the probable suspects.

READ FULL TEXT
research
08/10/2021

Util::Lookup: Exploiting key decoding in cryptographic libraries

Implementations of cryptographic libraries have been scrutinized for sec...
research
11/15/2020

Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exis...
research
12/24/2019

Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys

Primality generation is the cornerstone of several essential cryptograph...
research
09/22/2019

Temperature-Based Hardware Trojan For Ring-Oscillator-Based TRNGs

True random number generators (TRNGs) are essential components of crypto...
research
09/04/2019

Certified Side Channels

We demonstrate that the format in which private keys are persisted impac...
research
08/14/2019

Breaking the encryption scheme of the Moscow internet voting system

In September 2019, voters for the election at the Parliament of the city...
research
02/28/2023

Publicly verifiable delegative democracy with secret voting power

We use a commitment scheme to track every individual's voting power on a...

Please sign up or login with your details

Forgot password? Click here to reset