This paper explores vulnerabilities in RSA cryptosystems that arise from improper prime number selection during key generation. We examine two primary attack vectors: Fermat's factorization method, which exploits RSA keys generated with primes that are too close together, and the Greatest Common Divisor (GCD) attack, which exploits keys that share a common prime factor. Drawing from landmark research including Heninger et al.'s ``Mining Your Ps and Qs'' study, which discovered over 64,000 vulnerable TLS hosts, and B{ö}ck's 2023 analysis of Fermat factorization in deployed systems, we demonstrate that these vulnerabilities remain prevalent in real-world cryptographic implementations. Our analysis reveals that weak random number generation in embedded devices is the primary cause of these failures, and we discuss mitigation strategies including proper entropy collection and prime validation checks.
翻译:本文探讨了RSA密码系统在密钥生成阶段因不当素数选择而产生的安全漏洞。我们研究了两种主要攻击向量:费马分解法(利用由过于接近的素数生成的RSA密钥)和最大公约数(GCD)攻击(利用共享公因子的密钥)。借鉴包括Heninger等人发现超过64,000个易受攻击TLS主机的《挖掘你的P与Q》研究,以及Böck于2023年对已部署系统中费马分解的分析在内的里程碑式研究成果,我们证明这些漏洞在实际密码学实现中仍然普遍存在。我们的分析表明,嵌入式设备中薄弱的随机数生成是导致这些失效的主要原因,同时我们讨论了包括正确熵收集和素数验证检查在内的缓解策略。