Analyzing key server data

Hanno Böck hanno at
Sun Mar 22 12:58:48 CET 2015


I think this could be interesting for a couple of people:

I had a project running in private for quite a while, I now published
the details: I wrote a script that analyzes the dumps from key servers
and puts the crypto values into a mysql database.

This can be used to search for vulnerable keys or signatures on large
scale. I did this for two potential threats: DSA signatures with
duplicate k values and RSA keys with shared factors.

The overall result is a good one: It seems OpenPGP implementations with
completely broken random number generators exist, but they are a rare


Background paper:

Hanno Böck

mail/jabber: hanno at
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20150322/f589789f/attachment.sig>

More information about the Gnupg-devel mailing list