dc.creatorCastro Lechtaler, Antonio
dc.creatorCipriano, Marcelo
dc.creatorMalvacio, Eduardo
dc.date2013-09
dc.date2013
dc.date2019-06-19T14:50:19Z
dc.identifierhttp://sedici.unlp.edu.ar/handle/10915/76729
dc.identifierhttp://42jaiio.sadio.org.ar/proceedings/simposios/Trabajos/AST/05.pdf
dc.identifierissn:1850-2806
dc.descriptionPublic key infrastructure is used in most networks requiring user authentication, digital signature, cryptographic confidentiality, and non repudiation of information. The main protocols and architectures used in a PKI are the public key cryptosystem and the RSA digital signature. Their robustness is based on the difficulty to obtain prime factors of a large composite number. Notwithstanding, if the primes generated by a PKI are predictable or represent a small set of possible primes, the security of the PKI certificate is compromised. This article is part of a line of research aiming to develop auditing tools of PKI performance and to detect anomalies in the generation and distribution of prime values delivered by OpenSSL, if such anomalies are present.
dc.descriptionSociedad Argentina de Informática e Investigación Operativa
dc.formatapplication/pdf
dc.format49-56
dc.languageen
dc.rightshttp://creativecommons.org/licenses/by-nc-sa/4.0/
dc.rightsCreative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.subjectCiencias Informáticas
dc.subjectasymmetric cryptography
dc.subjectPKI
dc.subjectOpenSSL
dc.subjectRSA
dc.subjectinteger primes
dc.subjectpredictable primes
dc.titleAnomaly Search in a Public Key Infrastructure OPENSSL v1.0 1e.
dc.typeObjeto de conferencia
dc.typeObjeto de conferencia


Este ítem pertenece a la siguiente institución