Probability References to Apply in the Detection of Anomalous Public Key Infrastructures

Authors

  • Antonio Castro Lechtaler CriptoLab. Escuela Superior Técnica - Universidad Nacional de la Defensa, Cabildo 15. C1426AAA Ciudad Autónoma de Buenos Aires, Argentina
  • Marcelo Cipriano CriptoLab. Escuela Superior Técnica - Universidad Nacional de la Defensa, Cabildo 15. C1426AAA Ciudad Autónoma de Buenos Aires, Argentina
  • Eduardo Malvacio CriptoLab. Escuela Superior Técnica - Universidad Nacional de la Defensa, Cabildo 15. C1426AAA Ciudad Autónoma de Buenos Aires, Argentina

Keywords:

PKI, RSA, digital certificates

Abstract

This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral pattern of a Public Key Infrastructure (PKI), thus allowing the detection of operational anomalies and the prevention of vulnerabilities of this nature.

Downloads

Download data is not yet available.

References

[1] Bello L, Bertacchini M. “Generador de Números Pseudo-Aleatorios Predecible en Debian”. III International Cyber Security Conference. Manizales, Colombia. Octubre 2009.
[2] Benaben, A; Castro Lechtaler, A; Cipriano, M; Foti, A. “Development, testing and performance evaluation of factoring algorithms whit additional information” XXVIII International Conference of the Chilean Society of Computer Sciences. Santiago de Chile. 2009.
[3] Castro Lechtaler, C; Cipriano, M; Benaben A; Quiroga, P. “Study on the effectiveness and efficiency of an algorithm to factorize N given e and d”. IX Latin American Seminar on Information Technology Security, La Habana, CUBA. 2009.
[4] Castro Lechtaler, A; Cipriano, M. “Detection of anomalies in Oracles such as OpenSS through the analysis of probabilities”. XVII Argentine Convention of Computer Sciences CACIC 2011. La Plata, Buenos Aires, October 2011.
[5] Castro Lechtaler, Antonio, Cipriano Marcelo; Malvacio Eduardo; Cañón, Sebastián; Procedure for the Detection of Anomalies in Public Key Infrastruture (RSA Systems). XIII Argentine Technological Symposium, 41 Argentine Meetings on Information Technology and Operational Research JAIIO – SADIO. La Plata, Buenos Aires, August 2012.
[6] Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo. Experi-mental detection of anomalies in public key infrastructure. XVIII Argentine Convention on Computer Sciences CACIC 2012. Bahía Blanca, Buenos Aires, October 2011.
[7] Glass, Robert “Facts and Fallacies of Software Engineering”. Addison-Wesley Professional, 2003.
[8] Lenstra, A; Hughes, J; Augier, M and others. Ron was wrong, Whit is right. e-print International Association for Cryptologic Research. 15 Feb 2012. http://eprint.iacr.org/2012/064.
[9] Young A and Yung M. An Elliptic Curve Asymmetric Backdoor in Open-SSL RSA Key Generation. Chapter 10. Cryptovirology. 2006.

Downloads

Published

2016-11-01

How to Cite

Castro Lechtaler, A., Cipriano, M., & Malvacio, E. (2016). Probability References to Apply in the Detection of Anomalous Public Key Infrastructures. Journal of Computer Science and Technology, 16(02), p. 84–88. Retrieved from https://journal.info.unlp.edu.ar/JCST/article/view/497

Issue

Section

Invited Articles

Most read articles by the same author(s)