Cryptology ePrint Archive: Report 2022/048

RSA, DH, and DSA in the Wild

Nadia Heninger

Abstract: This book chapter outlines techniques for breaking cryptography by taking advantage of implementation mistakes made in practice, with a focus on those that exploit the mathematical structure of the most widely used public-key primitives.

Category / Keywords: public-key cryptography / RSA, Diffie-Hellman, ECDH, DSA, ECDSA, digital signatures, implementation, public-key cryptography

Original Publication (with minor differences): Computational Cryptography, edited by Joppe W. Bos and Martijn Stam, Cambridge Press
DOI:
10.1017/9781108854207

Date: received 14 Jan 2022

Contact author: nadiah at cs ucsd edu

Available format(s): PDF | BibTeX Citation

Version: 20220114:073557 (All versions of this report)

Short URL: ia.cr/2022/048


[ Cryptology ePrint archive ]