Exploiting Prime Selection Vulnerabilities in Public Key Cryptography (RSA)

2 pointsposted 13 hours ago
by bikenaga

1 Comments

bikenaga

13 hours ago

Abstract: "This paper explores vulnerabilities in RSA cryptosystems that arise from improper prime number selection during key generation. We examine two primary attack vectors: Fermat's factorization method, which exploits RSA keys generated with primes that are too close together, and the Greatest Common Divisor (GCD) attack, which exploits keys that share a common prime factor. Drawing from landmark research including Heninger et al.'s 'Mining Your Ps and Qs' study, which discovered over 64,000 vulnerable TLS hosts, and Böck's 2023 analysis of Fermat factorization in deployed systems, we demonstrate that these vulnerabilities remain prevalent in real-world cryptographic implementations. Our analysis reveals that weak random number generation in embedded devices is the primary cause of these failures, and we discuss mitigation strategies including proper entropy collection and prime validation checks."