Contribution oo the Theory and Practice of Generating RSA Algorithm Keys

The RSA cryptographic algorithm is widely used in data protection and electronic business. One of the most important parameter of the achieved level of security is the quality of the generated cryptographic keys with which the algorithm is applied. In this paper a few cases in which poorly generated RSA cryptographic keys caused dis-accreditation of the system are described. The recommendations and checks that must be fulfilled during generation of RSA algorithm cryptographic keys are formulated in order that keys were considered safe for implement on.

[1]  Eric Wustrow,et al.  Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices , 2012, USENIX Security Symposium.

[2]  Vashek Matyas,et al.  The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli , 2017, CCS.

[3]  Карл Норрман,et al.  Cryptographic key generation , 2008 .

[4]  Vashek Matyas,et al.  The Million-Key Question - Investigating the Origins of RSA Public Keys , 2016, USENIX Security Symposium.

[5]  R. Lehman Factoring large integers , 1974 .

[6]  Ueli Maurer,et al.  Breaking RSA Generically Is Equivalent to Factoring , 2009, IEEE Transactions on Information Theory.

[7]  Song Y. Yan,et al.  Cryptanalytic attacks on RSA , 2007 .

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  John Kelsey,et al.  Recommendation for Random Number Generation Using Deterministic Random Bit Generators , 2014 .

[10]  Arjen K. Lenstra,et al.  Ron was wrong, Whit is right , 2012, IACR Cryptol. ePrint Arch..

[11]  Tanja Lange,et al.  Factoring RSA keys from certified smart cards: Coppersmith in the wild , 2013, IACR Cryptol. ePrint Arch..

[12]  D. Boneh Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .

[13]  Benne de Weger,et al.  Cryptanalysis of RSA with Small Prime Difference , 2002, Applicable Algebra in Engineering, Communication and Computing.

[14]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[15]  John Kelsey,et al.  Recommendation for Random Bit Generator (RBG) Constructions , 2016 .

[16]  Elaine B. Barker,et al.  Recommendation for Pair-Wise Key Establishment Schemes Using Integer Factorization Cryptography | NIST , 2009 .