01571nas a2200193 4500000000100000000000100001008004100002653002900043653001800072653001600090653000800106653001800114100002000132700002200152245009500174300001000269490000700279520109100286 2017 d10aasymmetric cryptosystems10acryptanalysis10apublic keys10aRSA10asoftware tool1 aTsonka Baicheva1 aMiroslav Dimitrov00aA Software Tool ASR for a posteriori Cryptanalysis on Public Keys Generated with ‘RSA’ a29-340 v373 a

The asymmetric cryptosystem RSA is one of the first practical public-key cryptosystems, widely used for secure data transmission. The key generation of the RSA algorithm relies on specifically chosen numbers. Through the years, as the variety of attacks on RSA increased, plenty of recommendations and strategies for keys generation were published (ex. NIST.FIPS.186-4 [1]). Following the good practices, the regular users, companies or governments, can bootstrap their implementation of key generation software (a priori analysis). From the perspective of the other side of the communication channel, the key generation process and the keys themselves are a form of a "black box". Furthermore, most of the recommendations and good practices published online don’t reference the reasons/attacks, which can exploit the specific wrongly chosen parameter. An automatic a posteriori cryptanalysis tool will link each recommendation with an existing attack, giving the other side of the communication channel a tool to detect unsafely (including weakened by purpose) generated keys.