Paper 2018/749
Prime and Prejudice: Primality Testing Under Adversarial Conditions
Martin R. Albrecht, Jake Massimo, Kenneth G. Paterson, and Juraj Somorovsky
Abstract
This work provides a systematic analysis of primality testing under adversarial conditions, where the numbers being tested for primality are not generated randomly, but instead provided by a possibly malicious party. Such a situation can arise in secure messaging protocols where a server supplies Diffie-Hellman parameters to the peers, or in a secure communications protocol like TLS where a developer can insert such a number to be able to later passively spy on client-server data. We study a broad range of cryptographic libraries and assess their performance in this adversarial setting. As examples of our findings, we are able to construct 2048-bit composites that are declared prime with probability
Note: Updated to include details on vulnerabilities in Apple crypto libraries.
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Published elsewhere. Major revision. CCS 2018
- DOI
- 10.1145/3243734.3243787
- Keywords
- Primality testingMiller-Rabin testLucas testBaillie-PSW testDiffie-HellmanTLS
- Contact author(s)
- kenny paterson @ rhul ac uk
- History
- 2018-10-30: last of 2 revisions
- 2018-08-17: received
- See all versions
- Short URL
- https://ia.cr/2018/749
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/749, author = {Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky}, title = {Prime and Prejudice: Primality Testing Under Adversarial Conditions}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/749}, year = {2018}, doi = {10.1145/3243734.3243787}, url = {https://eprint.iacr.org/2018/749} }