NeoChainDaily
NeoChainDaily
Uplink
Initialising Data Stream...
30.12.2025 • 05:09 Research & Innovation

Study Highlights Ongoing RSA Prime Selection Weaknesses in Deployed Systems

Global: Study Highlights Ongoing RSA Prime Selection Weaknesses in Deployed Systems

Researchers Murtaza Nikzad and Kerem Atas released a study on Dec. 27, 2025, that examines how improper prime selection compromises RSA encryption in real-world deployments. The paper documents two primary attack vectors—Fermat’s factorization and greatest‑common‑divisor (GCD) exploitation—and outlines mitigation measures.

Attack Vectors Identified

The authors describe how RSA keys generated with primes that are unusually close together become vulnerable to Fermat’s factorization, a method that can recover the private key with modest computational effort. They also detail GCD attacks, which succeed when two distinct keys share a single prime factor, allowing an adversary to compute the private keys of both parties.

Evidence From Prior Research

Building on the 2016 “Mining Your Ps and Qs” study by Heninger et al., which uncovered more than 64,000 TLS hosts with weak RSA keys, the new analysis confirms that similar weaknesses persist in contemporary systems. A 2023 investigation by Bök demonstrated that Fermat‑based attacks remain feasible against deployed hardware.

Root Causes in Embedded Devices

Both authors attribute the continued exposure primarily to insufficient entropy sources in embedded devices. Limited hardware random number generators often produce predictable or correlated prime candidates, increasing the likelihood of close‑prime or shared‑prime scenarios.

Proposed Mitigations

The study recommends several practical steps: integrating hardware‑based entropy collectors, performing post‑generation prime validation checks for proximity and uniqueness, and adopting standardized key‑generation libraries that enforce robust randomness requirements.

Implications for the Security Community

According to the authors, the findings underscore the need for ongoing audits of cryptographic implementations, especially in Internet‑of‑Things (IoT) ecosystems where resource constraints can compromise randomness. They suggest that regulators and standards bodies consider updating guidelines to reflect these persistent risks.

This report is based on information from arXiv, licensed under Academic Preprint / Open Access. Based on the abstract of the research paper. Full text available via ArXiv.

Ende der Übertragung

Originalquelle

Privacy Protocol

Wir verwenden CleanNet Technology für maximale Datensouveränität. Alle Ressourcen werden lokal von unseren gesicherten deutschen Servern geladen. Ihre IP-Adresse verlässt niemals unsere Infrastruktur. Wir verwenden ausschließlich technisch notwendige Cookies.

Core SystemsTechnisch notwendig
External Media (3.Cookies)Maps, Video Streams
Analytics (Lokal mit Matomo)Anonyme Metriken
Datenschutz lesen