Probability References to Apply in the Detection of Anomalous Public Key Infrastructures
Keywords:PKI, RSA, digital certificates
This article calculates the theoretical probability of finding repeated primes in a given sample of unbiased issued digital certificates. These values can be used as reference for developing a statistical procedure to audit and control the behavioral pattern of a Public Key Infrastructure (PKI), thus allowing the detection of operational anomalies and the prevention of vulnerabilities of this nature.
 Benaben, A; Castro Lechtaler, A; Cipriano, M; Foti, A. “Development, testing and performance evaluation of factoring algorithms whit additional information” XXVIII International Conference of the Chilean Society of Computer Sciences. Santiago de Chile. 2009.
 Castro Lechtaler, C; Cipriano, M; Benaben A; Quiroga, P. “Study on the effectiveness and efficiency of an algorithm to factorize N given e and d”. IX Latin American Seminar on Information Technology Security, La Habana, CUBA. 2009.
 Castro Lechtaler, A; Cipriano, M. “Detection of anomalies in Oracles such as OpenSS through the analysis of probabilities”. XVII Argentine Convention of Computer Sciences CACIC 2011. La Plata, Buenos Aires, October 2011.
 Castro Lechtaler, Antonio, Cipriano Marcelo; Malvacio Eduardo; Cañón, Sebastián; Procedure for the Detection of Anomalies in Public Key Infrastruture (RSA Systems). XIII Argentine Technological Symposium, 41 Argentine Meetings on Information Technology and Operational Research JAIIO – SADIO. La Plata, Buenos Aires, August 2012.
 Castro Lechtaler, Antonio; Cipriano, Marcelo; Malvacio, Eduardo. Experi-mental detection of anomalies in public key infrastructure. XVIII Argentine Convention on Computer Sciences CACIC 2012. Bahía Blanca, Buenos Aires, October 2011.
 Glass, Robert “Facts and Fallacies of Software Engineering”. Addison-Wesley Professional, 2003.
 Lenstra, A; Hughes, J; Augier, M and others. Ron was wrong, Whit is right. e-print International Association for Cryptologic Research. 15 Feb 2012. http://eprint.iacr.org/2012/064.
 Young A and Yung M. An Elliptic Curve Asymmetric Backdoor in Open-SSL RSA Key Generation. Chapter 10. Cryptovirology. 2006.