Differences
This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
public:papers:usenix2016 [2016-08-12 16:50] – petrs | public:papers:usenix2016 [2023-06-02 09:20] (current) – xsvenda | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== The Million-Key Question – Investigating the Origins of RSA Public Keys [Usenix Sec 2016] ====== | + | ====== The Million-Key Question – Investigating the Origins of RSA Public Keys [Usenix Sec 2016, Best Paper Award] ====== |
~~NOTOC~~ | ~~NOTOC~~ | ||
**Authors: Petr Svenda, Matus Nemec, Peter Sekan, Rudolf Kvasnovsky, David Formanek, David Komarek and Vashek Matyas** | **Authors: Petr Svenda, Matus Nemec, Peter Sekan, Rudolf Kvasnovsky, David Formanek, David Komarek and Vashek Matyas** | ||
+ | |||
+ | **[[https:// | ||
+ | |||
**Primary contact:** Petr Svenda < | **Primary contact:** Petr Svenda < | ||
Line 10: | Line 13: | ||
* Conference page: [[https:// | * Conference page: [[https:// | ||
+ | * Download conference version of the paper: [[https:// | ||
* Download author pre-print of the paper: {{: | * Download author pre-print of the paper: {{: | ||
* Download extended version of paper: {{: | * Download extended version of paper: {{: | ||
* Download presentation: | * Download presentation: | ||
+ | * See 1 minute [[https:// | ||
+ | * See [[https:// | ||
+ | * {{fa> | ||
* Download [[: | * Download [[: | ||
* Try online key classification tool: http:// | * Try online key classification tool: http:// | ||
- | **Bibtex (regular paper):** | + | |
+ | **Bibtex (regular paper)** | ||
| | ||
| | ||
Line 27: | Line 35: | ||
} | } | ||
| | ||
- | **Bibtex (technical report):** | + | **Bibtex (technical report)** |
| | ||
| | ||
Line 67: | Line 75: | ||
==Q: Are the data you gathered and used publicly available? | ==Q: Are the data you gathered and used publicly available? | ||
- | A: Definitely! Download everything in the datasets section and try your own analysis. Please don't forget to cite us. | + | A: Definitely! Download everything in the datasets section and try your own analysis. Please don't forget to cite our Usenix paper if you will use it. |
==Q: I want to know more details!== | ==Q: I want to know more details!== | ||
Line 88: | Line 96: | ||
* //Mask value// (first column) is computed as: 2nd-7th most significant bit of modulus | 2nd least significant bit of modulus | modulus mod 3 | modulus_length_in_bits mod 2 | * //Mask value// (first column) is computed as: 2nd-7th most significant bit of modulus | 2nd least significant bit of modulus | modulus mod 3 | modulus_length_in_bits mod 2 | ||
* Probability for given group is given in percentage. If a group never produces modulus with particular mask value, sign ' | * Probability for given group is given in percentage. If a group never produces modulus with particular mask value, sign ' | ||
- | * Dataset: [[https://drive.google.com/folderview? | + | * {{fa> |
- | * Separate zip files for every library and length of RSA keys. Naming format: | + | |
- | * Dataset: | + | |
- | * Separate zip files for every library and length | + | |
- | * Dataset: [[https:// | + | |
- | * Separate binary files for every smartcard obtained using RandomData.generate() on-card method. If more files for the same card were generated, appendix _0/1/2 is used. Format: // | + | |
- | * Dataset: [[https:// | + | |
- | * Separate binary files for every smartcard obtained using RandomData.generate() on-card method. If more files for the same card were generated, appendix _0/1/2 is used. Format: // | + | |
- | * Coming soon: Filtered TLS dataset, filtered PGP dataset, filtered Certificate Transparency set (for your convenience, | + | |
- | * Coming soon: Processing scripts (for filtering datasets) | + | |