Upload resources

Upload your works to SEDICI to increase its visibility and improve its impact

 

Show simple item record

dc.date.accessioned 2019-06-19T14:50:19Z
dc.date.available 2019-06-19T14:50:19Z
dc.date.issued 2013
dc.identifier.uri http://sedici.unlp.edu.ar/handle/10915/76729
dc.description.abstract Public key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present. en
dc.format.extent 49-56 es
dc.language en es
dc.subject asymmetric cryptography en
dc.subject PKI en
dc.subject OpenSSL en
dc.subject RSA en
dc.subject integer primes en
dc.subject predictable primes en
dc.title Anomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e. en
dc.type Objeto de conferencia es
sedici.identifier.uri http://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf es
sedici.identifier.issn 1850-2806 es
sedici.creator.person Castro Lechtaler, Antonio es
sedici.creator.person Cipriano, Marcelo es
sedici.creator.person Malvacio, Eduardo es
sedici.subject.materias Ciencias Informáticas es
sedici.description.fulltext true es
mods.originInfo.place Sociedad Argentina de Informática e Investigación Operativa es
sedici.subtype Objeto de conferencia es
sedici.rights.license Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
sedici.rights.uri http://creativecommons.org/licenses/by-nc-sa/4.0/
sedici.date.exposure 2013-09
sedici.relation.event XIV Argentine Symposium on Technology (AST) - JAIIO 42 (2013) es
sedici.description.peerReview peer-review es


Download Files

This item appears in the following Collection(s)

Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) Except where otherwise noted, this item's license is described as Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)