第一范文网 - 专业文章范例文档资料分享平台

512比特的大整数的有效分解的利用Factoring as a Service

来源:用户分享 时间:2025/5/17 8:35:15 本文由loading 分享 下载这篇文档手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

FactoringasaService13

Table2:HTTPSRSAcommonkeylengthsandexportRSAsupport.

Length5127681024153620482432307240968192RSAExportTotal

AllCertificatesDistinctKeysTrustedCertificates303,199(0.9%)26,582(0.1%)12,541,661(36.8%)

2,537(0.0%)

20,782,686(60.9%)

2,685(0.0%)65,765(0.2%)391,123(1.1%)2,172(0.0%)2,630,789(7.7%)34,121,474(100.0%)

14,680,782(43.0%)14,678,739(43.0%)

TrustedandValid

32,8700(0.0%)0(0.0%)14,5810(0.0%)0(0.0%)3,196,1694,016(0.0%)4,012(0.0%)

2,1080(0.0%)0(0.0%)6,891,67814,413,589(42.2%)14,411,618(42.2%)

1,191128(0.0%)128(0.0%)58,4321,787(0.0%)1,787(0.0%)218,334259,898(0.8%)259,830(0.8%)

971481(0.0%)481(0.0%)

theseserversarealsovulnerabletoanactiveman-in-the-middleattackfromanadversarywhosimplyreplacesthecertificate.

IftheclientandservernegotiateaDiffie-HellmanorellipticcurveDiffie-Hellmanciphersuite,theserverusesthepublickeyinitscertificatetosignitskeyexchangeparameterstoprovideauthentication.Anadversarywhoknowstheprivatekeycouldcarryoutaman-in-the-middleattackbyforgingacorrectsignatureontheirdesiredparameters.Sinceagainno512-bitcertificatesarecurrentlysignedortrusted,suchanactiveadversarycouldalsomerelyreplacetheservercertificateintheexchangealongwiththechosenDiffie-Hellmanparameters.Finally,connectionstoserverssupportingRSA_EXPORTciphersuitesmaybevulnerabletoanactivedowngradeattackiftheclientshavenotbeenpatchedagainsttheFREAKattack.[6]Successfullycarryingoutthisattackrequirestheattackertofactortheserver’sephemeralRSAkey,whichistypicallygeneratedwhentheserverapplicationlaunchesandisreusedaslongastheserverisup.“Ephemeral”RSAkeyscanpersistforhours,days,orweeksandarealmostalways512bitsinlength.

WeexaminedIPv4scanresultsforHTTPSonport443performedusingZmap[16]bytheUniversityofMichiganwhichweaccessedviaScans.ioandtheCensysscandatasearchinterfacedevelopedbyDurumeric,Adrian,Mirian,Bailey,andHalderman[13].Table2summarizesscansfromAugust23andSeptember1,2015.

Durumeric,Kasten,Bailey,andHalderman[15]examinedtheHTTPScer-tificateinfrastructurein2013usingfullIPv4surveysandfound2,631browser-trustedcertificateswithkeylengthsof512bitsorsmaller,ofwhich16werevalid.Heninger,Durumeric,Wustrow,andHalderman[19]performedafullIPv4scanofHTTPSinOctober2011withresponsesfrom12.8millionhosts,andfound123,038certificates(trustedandnon-trusted)containing512-bitRSAkeys.Similarto[19],weobservemanyrepeatedpublickeys.

14Valenta,Cohney,Liao,Fried,Bodduluri,Heninger

Table3:Mailprotocolkeylengths.

PortHandshake

SMTPIMAPSPOP3S

25993995

RSA_EXPORT512-bitCertificateKey

64(0%)102(0%)115(0%)

4,821,6151,483,955(30.8%)4,468,577561,201(12.6%)4,281,494558,012(13.0%)

5.3Mail

Table3summarizesseveralInternet-widescanstargetingSMTP,IMAPS,andPOP3S.ThescanswereperformedbytheUniversityofMichiganusingZmapbetweenAugust23,2015,andSeptember3,2015.

WeusedtheCensysscandatabaseinterfaceprovidedby[13]toanalyzethedata.WhileonlyafewhundredfewmailserversservedTLScertificatescontaining512-bitRSApublickeys,13%ofIMAPSandPOP3Sserversand30%ofSMTPserverssupportedRSA_EXPORTciphersuiteswith512-bitephemeralRSA,meaningthatunpatchedclientsarevulnerabletotheFREAKdowngradeattackbyanadversarywiththeabilitytoquicklyfactora512-bitRSAkey.

WealsoexaminedDKIMpublickeys.DomainKeysIdentifiedMail[2]isapublickeyinfrastructureintendedtopreventemailspoofing.PublickeysarepublishedbydomainsinaDNStextrecord,andmailprovidersattachdigitalsignaturestooutgoingmail,allowingrecipientstoverifyincomingmessages.

WegatheredDKIMpublickeysfromtheRapid7DNSdataset.However,thepublisheddatasethadlowercasedthebase64-encodedkeyentries,soinTable4:

ordertoexaminepublickeysweperformedDNSDKIMkeysizes.lookupsonthe11,600domainscontainingDKIMrecordsourselvesonSeptember4,2015.WemadeaLengthKeysbest-effortattempttoparsetherecords,but5%of40965(0.0%)

theresponsescontainedakeythatwasmalformedor204864(0.5%)

truncatedandcouldnotbeparsed.Oftheremainder,10281(0.0%)

124domainsused512-bitkeysorsmaller,including102410,726(92.2%)

onethatuseda128-bitRSApublickey.Wewere768126(1.1%)

abletofactorthiskeyinlessthanasecondona512103(0.9%)

laptopandverifythatitis,infact,averyshortRSA38420(0.2%)

publickey.Table4summarizesthedistribution.

1281(0.0%)

Durumeric,Adrian,Mirian,Kasten,Bursztein,591(5.1%)Lidzborski,Thomas,Eranti,Bailey,andHalder-Parseerror

man[14]surveyedcryptographicfailuresinemailTotal11,637protocolsusingInternet-widescansanddatafromGoogle.TheyexamineDKIMusefromtheperspec-tiveofGmail’sserversinApril2015anddiscoveredthat83%ofmailreceivedbyGmailcontainedaDKIMsignature,butofthese,6úiledtovalidate.Ofthesefailures,15%wereduetoakeysizeoflessthan1024bits,and63%wereduetoothererrors.

FactoringasaService15

5.4IPsec

WeconductedtwoZmapscansofthefullIPv4spacetosurveykeysizesinusebyIPsecVPNimplementa-tionsthatuseRSAsignaturesforidentityvalidationTable5:IPsecVPNcer-duringserver-clienthandshakes.Anadversarywhotificatekeyscompromisedtheprivatekeysforoneofthesecer-tificatescouldmountanactiveman-in-the-middleLengthKeysattack.

409637(0.8%)

OurZmapscanstargetedIKEv1aggressive30721(0.0%)

mode[18],whichminimizesthenumberofmessages20482,257(51.3%)

sentbetweentheserverandclientandallowsthe10241,804(41.0%)

servertosendacertificateafteraonlyasinglemes-7681(0.0%)

sageisreceived.Themessageswesentcontained51269(1.6%)

proposalsforDES,3DES,AES-128,andAES-256eachwithbothSHA1andMD5.Ourfirstscanof-Parseerror234(5.3%)feredakeyexchangeusingOakleygroup2(a1024-Total4,403(100%)bitDiffie-Hellmangroup)andelicitedcertificatesfrom4%oftheserversthatacceptedourmessage.OursecondscanofferedOakleygroup1(a768-bitDiffie-Hellmangroup)andreceivedresponsesfrom0.2%ofhosts.Ofthenon-responsesfrombothscans,71%oftheserversrespondedindicatingthattheydidnotsupportourcombinationofaggressivemodewithourchosenparameters,16%rejectedourconnectionforbeingunauthorized(notonawhitelist),andtheremaining11%returnedothererrors.5.5

SSH

SSHhostsauthenticatethemselvestotheclientbysigningtheprotocolhandshakewiththeirpublichostkey.Clientsmatchthehostkeytoastoredtrustedfingerprint.AnadversarywhoisabletocompromisetheprivatekeyforanSSHhostkeycanperformanactiveman-in-the-middleattack.

Table6summarizeshostkeysizescollectedbyaZmapscanofSSHhostsonport22mimickingOpenSSH6.6.1p1.ThedatawascollectedinApril2015byAdrianetal.[1],whoprovidedittous.Averylargenum-berofhostsused1040-bitkeys;thesehostshadbannersidentifyingthemasusingDropbear,alightweightSSHimplementationaimedatembeddedTable6:SSHhostkeylengths.

RSASize5127687841020102410401536204820644096RSATotalDSAECDSA

Hosts

Distinct

508(0.0%)3162,972(0.0%)2,4193,119(0.0%)223774(0.0%)572296,229(4.4%)91,7882,786,574(41.3%)1,407,922

639(0.0%)536

3,632,865(53.9%)1,752,406

1,612(0.0%)95715,235(0.2%)1,269

6,741,3523,258,742692,0112,192

421,9442,192

16Valenta,Cohney,Liao,Fried,Bodduluri,Heninger

devices.Heninger,Durumeric,Wustrow,andHalderman[19]performedafullIPv4scanofSSHpublickeysinFebruary2012offeringonlyDiffie-HellmanGroup1keyexchange.Of10millionresponses,theyreportedthat8,459used512-bitRSAhostkeysandobservedmanyrepeatedhostkeys.

Clientscanalsousepublickeystoauthenticatethemselvestoaserver.AnadversarywhoisabletocompromisetheprivatekeyforaclientSSHauthentica-tionkeycanaccesstheserverbylogginginastheclient.BenCox[10]collected1,376,262SSHpublickeysthathadbeenuploadedtoGitHubbyuserstoau-thenticatethemselvestotheservicebetweenDecember2014andJanuary2015byusingGitHub’spublicAPI.Hecollected1,205,330RSApublickeys,27,683DSApublickeys,and1,060ECDSApublickeys.OftheRSApublickeys,2had256-bitlength,3had512-bitlength,and28had768-bitlength.

5.6PGP

1000001000010001001011199Keyscreated512768102420483072409651990200200520102015Figure5:PGPRSApublickeylengthsbyreportedcreationdate.

PGPimplementsencryptionanddigitalsignaturesonemailorfiles.RSApublickeyscanbeusedforbothencryptionandsignatures.PGPisdesignedtouseapublic“weboftrust”model:userscandistributetheirpublickeysalongwithsignaturesattestingtrustrelationshipsviaapublicnetworkofkeyservers.AnadversarywhocompromisesaPGPpublickeycoulduseittoimpersonateauserwithadigitalsignatureordecryptcontentencryptedtothatuser.WedownloadedaPGPkeyserverbootstrapdatasetfromkeyserver.borgnet.usonOctober4,2015.Itcontained4.9millionpublickeysfrom3millionusers.Ofthese,1.6millionwereRSA,1.7millionwereDSA,1.7millionwereElGamal,398wereECDH,158wereEdDSA,and513wereECDSA.Figure5showstheshifttolongerRSAkeylengthsovertime.

512比特的大整数的有效分解的利用Factoring as a Service.doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/c9z00p2atd07zlrk1b2ul_4.html(转载请注明文章来源)
热门推荐
Copyright © 2012-2023 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top