Advances in Cryptology – CRYPTO 2012 pp 626-642
- Cite this paper as:
- Lenstra A.K., Hughes J.P., Augier M., Bos J.W., Kleinjung T., Wachter C. (2012) Public Keys. In: Safavi-Naini R., Canetti R. (eds) Advances in Cryptology – CRYPTO 2012. Lecture Notes in Computer Science, vol 7417. Springer, Berlin, Heidelberg
We performed a sanity check of public keys collected on the web and found that the vast majority works as intended. Our main goal was to test the validity of the assumption that different random choices are made each time keys are generated. We found that this is not always the case, resulting in public keys that offer no security. Our conclusion is that generating secure public keys in the real world is challenging. We did not study usage of public keys.