@inproceedings{a205374888014b6fb10175c52c205319,
title = "Factoring RSA keys from certified smart cards: Coppersmith in the wild",
abstract = "This paper explains how an attacker can efficiently factor 184 distinct RSA keys out of more than two million 1024-bit RSA keys downloaded from Taiwan's national {"}Citizen Digital Certificate{"} database. These keys were generated by government-issued smart cards that have built-in hardware random-number generators and that are advertised as having passed FIPS 140-2 Level 2 certification. These 184 keys include 103 keys that share primes and that are efficiently factored by a batch-GCD computation. This is the same type of computation that was used last year by two independent teams (USENIX Security 2012: Heninger, Durumeric, Wustrow, Halderman; Crypto 2012: Lenstra, Hughes, Augier, Bos, Kleinjung, Wachter) to factor tens of thousands of cryptographic keys on the Internet. The remaining 81 keys do not share primes. Factoring these 81 keys requires taking deeper advantage of randomness-generation failures: first using the shared primes as a springboard to characterize the failures, and then using Coppersmith-type partial-key-recovery attacks. This is the first successful public application of Coppersmith-type attacks to keys found in the wild.",
keywords = "Coppersmith, RSA, factorization, lattices, smart cards",
author = "Bernstein, \{Daniel J.\} and Chang, \{Yun An\} and Cheng, \{Chen Mou\} and Chou, \{Li Ping\} and Nadia Heninger and Tanja Lange and \{Van Someren\}, Nicko",
year = "2013",
doi = "10.1007/978-3-642-42045-0\_18",
language = "英语",
isbn = "9783642420443",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 2",
pages = "341--360",
booktitle = "Advances in Cryptology, ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
edition = "PART 2",
note = "19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013 ; Conference date: 01-12-2013 Through 05-12-2013",
}