Paper 2022/048

RSA, DH, and DSA in the Wild

Nadia Heninger

Abstract

This book chapter outlines techniques for breaking cryptography by taking advantage of implementation mistakes made in practice, with a focus on those that exploit the mathematical structure of the most widely used public-key primitives.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. Computational Cryptography, edited by Joppe W. Bos and Martijn Stam, Cambridge Press
DOI
10.1017/9781108854207
Keywords
RSADiffie-HellmanECDHDSAECDSAdigital signaturesimplementationpublic-key cryptography
Contact author(s)
nadiah @ cs ucsd edu
History
2022-01-14: received
Short URL
https://ia.cr/2022/048
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/048,
      author = {Nadia Heninger},
      title = {RSA, DH, and DSA in the Wild},
      howpublished = {Cryptology ePrint Archive, Paper 2022/048},
      year = {2022},
      doi = {10.1017/9781108854207},
      note = {\url{https://eprint.iacr.org/2022/048}},
      url = {https://eprint.iacr.org/2022/048}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.