The Analysis and Simulation of Crypto-Trojan Attacks on RSA Key Generating Algorithms

Document Type : -

Author

Researcher at the Center for Strategic and Future Science and Technology of ICT School and Research Institute of ICT at Imam Hossein University

Abstract

In the past, encryption and its applications were used defensively and provided users with privacy, authentication, and security, but now hackers use crypto-malwares offensively to infiltrate and alter victims' data. Cryptovirology or malicious encryption is a different way of stealing information using a combination of one or more encryption methods and malwares, which launches an attack to ruin user data with a predetermined plan. Some crypto-malware attacks known as kleptography attacks are done using public key encryption. The purpose of this research, in addition to identifying new angles of computed kleptography and examining the new concepts presented in recent years, is to focus closely on backdoor attacks on RSA encryption key generating algorithms, and to study, review and analyze several correct and incorrect key generating algorithms. After calculating the complexity of the key production algorithms in theory, these algorithms are implemented and simulated using MATLAB software and the results are presented in comparative tables and graphs.

Keywords


  1. Young and M. Yung, “Cryptovirology: Extortion-Based Security Threat and Countermeasures”, Proceedings of the IEEE Symposium on Security and Privacy, 1996.##
  2. Aleksandra V. Markelova, “Vulnerability of RSA Algorithm”, CEUR-WS.org/Vol-2081/paper16.pdf, 2017.##
  3. Young, M. Yung “Malicious Cryptography Exposing Cryptovirology”, Published by Wiley Publishing, Inc ISBN: 0-7645-4975-8, 2004.##
  4. Young and M. Yung, “Malicious Cryptography: Kleptographic Aspects CT-RSA”, LNCS 3376, pp. 7–18, 2005.##
  5. Cr´epeau and A. Slakmon. “Simple Backdoors for RSA Key Generation. In The Cryptographers”, Track at the RSA Conference – CT-RSA 2003, pp. 403–416, 2003.##
  6. Arora and B. Barak, “Computational Complexity: A Modern Approach August”, Published by Princeton University, 2006.##
  7. Klima, Richard E. “Applications of Abstract Algebra with MUPAD”, ISBN 0-8493-8170-3 Published by CRC Press, 1999.##
  8. Kiusalaas “Numerical Methods in Engineering with MATLAB”, ISBN: 978-0-521-85288-3 Published by Cambridge University Press , 2005.##