Book contents
- Frontmatter
- Contents
- List of Contributors
- Preface
- 1 Introduction
- Part I Cryptanalysis
- 2 Lattice Attacks on NTRU and LWE: A History of Refinements
- 3 History of Integer Factorisation
- 4 Lattice-Based Integer Factorisation: An Introduction to Coppersmith’s Method
- 5 Computing Discrete Logarithms
- 6 RSA, DH and DSA in the Wild
- 7 A Survey of Chosen-Prefix Collision Attacks
- Part II Implementations
- References
- Index
6 - RSA, DH and DSA in the Wild
from Part I - Cryptanalysis
Published online by Cambridge University Press: 11 November 2021
- Frontmatter
- Contents
- List of Contributors
- Preface
- 1 Introduction
- Part I Cryptanalysis
- 2 Lattice Attacks on NTRU and LWE: A History of Refinements
- 3 History of Integer Factorisation
- 4 Lattice-Based Integer Factorisation: An Introduction to Coppersmith’s Method
- 5 Computing Discrete Logarithms
- 6 RSA, DH and DSA in the Wild
- 7 A Survey of Chosen-Prefix Collision Attacks
- Part II Implementations
- References
- Index
Summary
In Chapter 6, RSA, DH and DSA in the Wild, Nadia Heninger outlines the various cryptographic pitfalls one can – but really should not – make in practice. Often it is possible to bypass the 'hard' mathematical problem a cryptosystem is based upon, and instead take advantage of implementation, deployment or protocol mistakes to extract the private key. Often, the techniques used are excellent examples of the interplay of mathematics and computer science, requiring a combination of ingenuity to find the core idea and perseverance to exploit the weakness in practice. Heninger gives a wide-ranging overview of the multitude of cryptographic implementation vulnerabilities that have been found in the past decades and their impact in practice, including a fair number where she was personally involved in identifying the vulnerability. In Chapter 6, she wonders whether, after several decades of implementation chaos and catastrophic vulnerabilities, we are doomed, but concludes that there is hope yet by bringing into practice the lessons learned.
Keywords
- Type
- Chapter
- Information
- Computational CryptographyAlgorithmic Aspects of Cryptology, pp. 140 - 181Publisher: Cambridge University PressPrint publication year: 2021
- 3
- Cited by