Subir material

Suba sus trabajos a SEDICI, para mejorar notoriamente su visibilidad e impacto

 

Mostrar el registro sencillo del ítem

dc.date.accessioned 2012-11-08T11:42:39Z
dc.date.available 2012-11-08T11:42:39Z
dc.date.issued 2012-10
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/23843
dc.description.abstract Cryptographic techniques authenticate users and protect information confidentiality. These tasks are performed by subsystems called Oracles. The most popular Oracle is the RSA system based on two large primes granting secure services. In 2008, a programming error in Open-SSL of the Debian system was detected. Its biased number generator created system vulnerabilities by turning certificates predictable. This paper analyses the generic performance of a RSA cryptographic Oracle and develops a methodology to detect irregularities and anomalies in the quality of the certificates. Ten million certificates delivered by a private PKI were analyzed and found significant differences between theoretical predictions and experimental results. en
dc.language en es
dc.subject informática es
dc.subject asymmetric cryptography en
dc.subject SSL en
dc.subject RSA en
dc.subject prime integers en
dc.subject predictable primes en
dc.title Experimental detection of anomalies in public key infrastructure en
dc.type Objeto de conferencia es
sedici.creator.person Castro Lechtaler, Antonio es
sedici.creator.person Cipriano, Marcelo es
sedici.creator.person Malvacio, Eduardo es
sedici.description.note Eje: Workshop de seguridad informática (WSI) es
sedici.subject.materias Ciencias Informáticas es
sedici.description.fulltext true es
mods.originInfo.place Red de Universidades con Carreras en Informática (RedUNCI) es
sedici.subtype Objeto de conferencia es
sedici.rights.license Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)
sedici.rights.uri http://creativecommons.org/licenses/by-nc-sa/2.5/ar/
sedici.date.exposure 2012-10
sedici.relation.event XVIII Congreso Argentino de Ciencias de la Computación es
sedici.description.peerReview peer-review es


Descargar archivos

Este ítem aparece en la(s) siguiente(s) colección(ones)

Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5) Excepto donde se diga explícitamente, este item se publica bajo la siguiente licencia Creative Commons Attribution-NonCommercial-ShareAlike 2.5 Argentina (CC BY-NC-SA 2.5)