Crypto 6: RSA Attacks
by Gary Song
Over the many years since RSA was presented to the world, an enormous amount of research has been put into find different vulnerabilities. While nothing has been found for standard padded RSA, there are several cases of misuse that lead to vulnerabilties being present. These can range from poor parameter generation causing easy factoring to information leakage through auxillary means.
Slides
Challenges
The following challenges in increasing difficulty are deployed to platform.acmcyber.com to practice the concepts covered in the slides.
- Challenge 1 -
crypto/rsa-practice
- Challenge 2 -
crypto/rubiks-cube
- Challenge 3 -
crypto/prime-factory
- Challenge 4 -
crypto/rubiks-cube-2
- Challenge 4 -
crypto/mitm
Resources
The following resources are great to practice/learn about the ciphers covered in the slides.
- pycryptodome: A library that implements many modern-day cryptographic algorithms.
- cryptohack: A website with many challenges related to cryptography
- Alpertron: A fast online integer factorization calculator for large numbers
- FactorDB: A large online database of integers and their factors
- DanBoneh: A paper by a Stanford professor on RSA attacks