Cài đặt thuật toán sinh tham số RSA 2048 bit trên thiết bị PKI Token
DOI:
https://doi.org/10.54654/isj.v1i11.72Keywords:
PKI Token, RSA 2048, generating key pairTóm tắt
Tóm tắt—Trong hệ mật mã khóa công khai RSA, tính an toàn của hệ mật phụ thuộc chủ yếu vào việc đảm bảo tính an toàn của khóa bí mật, nên nó thường được lưu trong thiết bị lưu khóa bảo mật PKI Token. Bên cạnh đó, để tăng cường tính an toàn cho khóa bí mật, khóa sẽ được sinh ra ngay trong thiết bị và không thể sao chép ra ngoài, tránh tình trạng lộ lọt khóa. Trong bài báo này, nhóm tác giả giới thiệu giải pháp sinh tham số RSA 2048 bit trên thiết bị PKI Token.
Abstract—In the RSA public-key cryptography system, the security of the cryptosystem depends primarily on ensuring the security of the secret key. Therefore, the secret key is usually stored in security token. In addition, to enhance security of the secret key, the key pair are generated inside the device and cannot be copied out, avoiding the disclosure of the secret key. In this paper, we introduce the 2048-bit RSA parameter generation solution on the PKI Token device.
Downloads
References
[1] SafeNet eToken 5110. [02-04-2020]. url: https://www.digisign.ro/uploads/SafeNet-eToken-5110.pdf
[2] Cryptomate64. [02-04-2020]. url: http://www.cryptomate.com/.
[3] RuToken. [02-04-2020]. url: https://www.rutoken.ru/products/all/rutoken-ecp-pki/#spec
[4] National Institute of Standards and Technology. Digital Signature Standard (DSS). [02-04-2020]. url: https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.186-4.pdf.
[5] PolarSSL 1.2.10 released. [02-04-2020]. url: https://tls.mbed.org/tech-updates/releases/polarssl-1.2.10-released.
[6] Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, “Handbook of Applied Crytography”, CRC Press, 1996.
[7] Matúš Nemec, “The properties of RSA key generation process in software libraries”, Brno, 2016.
[8] Hoàng Văn Thức, Luận án Tiến sĩ “Hệ tiêu chuẩn tham số an toàn cho hệ mật RSA và ứng dụng”, 2011.
[9] Christophe Clavier, Benoit Feix, Loïc Thierry and Pascal Paillier, “Generating Provable Primes Efficiently on Embedded Devices”, PKC 2012, LNCS 7293, pp. 372-389, 2012.
[10] Trần Duy Lai, Hoàng Văn Thức, Trần Sỹ Nam, “Thuật toán sinh số nguyên tố tất định hiệu quả trên thiết bị nhúng”, Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin, ISSN 2615-9570, No 01. Vol 01. 2015.
[11] Jørgen Brandt, Ivan Damgård and Peter Landrock, “Speeding up Prime Number Generation”, Advances in Cryptology – ASIACRYPT '91, pp. 440-449.
[12] Jørgen Brandt, Ivan Damgärd, “On generation of Probable primes by incremental search”, Crypto’92, pp. 358-371.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).