Analyzing key server data
Hanno Böck
hanno at hboeck.de
Sun Mar 22 12:58:48 CET 2015
Hi,
I think this could be interesting for a couple of people:
I had a project running in private for quite a while, I now published
the details: I wrote a script that analyzes the dumps from key servers
and puts the crypto values into a mysql database.
This can be used to search for vulnerable keys or signatures on large
scale. I did this for two potential threats: DSA signatures with
duplicate k values and RSA keys with shared factors.
The overall result is a good one: It seems OpenPGP implementations with
completely broken random number generators exist, but they are a rare
thing.
Code:
https://github.com/hannob/pgpecosystem
Background paper:
http://eprint.iacr.org/2015/262
cu,
--
Hanno Böck
http://hboeck.de/
mail/jabber: hanno at hboeck.de
GPG: BBB51E42
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: </pipermail/attachments/20150322/f589789f/attachment.sig>
More information about the Gnupg-devel
mailing list