BINUS @
  • Greater Jakarta
  • Bekasi
  • Bandung
  • Malang
  • Semarang
Computer Engineering
Computer Engineering
  • BINUS @Greater Jakarta
  • BINUS @Bekasi
  • BINUS @Bandung
  • BINUS @Malang
  • BINUS @Semarang
  • About Us
    • Introduction
      • Vision & Mission
      • Program Objective
      • Graduate Competency
      • Prospective Career of The Graduate
      • Curriculum
        • Course Structure
        • Prerequisites
        • Quality Controlled Examination (UPM)
    • Accreditation
      • BAN PT
      • ABET
    • Social Media
      • Facebook
      • Instagram
      • Youtube
      • Keluarga Besar Sistem Komputer Binus University
      • Contact Us
    • Partnership/Collaboration
      • Teaching
      • Research
      • Community Development
      • Self Development
  • Lecturer
    • Department
      • Daniel Patricko G. Hutabarat, S.T., M.T.
      • Rico Wijaya, S.Kom, M.T.I.
      • Dr. Lukas Tanutama
      • Wiedjaja, S.Kom., M.Kom.
      • Endra, S.Kom, M.T.
      • Jimmy Linggarjati, S.Kom., M.Sc.
      • Dr. Eng. Suryadi, S.Si., M.Eng.
      • Ivan Alexander, S.T., M.T.I.
    • Research Interest Group Leader
      • Dr. Rinda Hedwig
      • Dr. Suryadiputra Liawatimena
    • Student Affairs & Community Development
      • Robby Saleh, S.Kom., M.T.
    • Faculty Member
      • Iman Herwidiana Kartowisastro, Ph.D.
      • Dr.Eng. Zener Sukra Lie
      • Rudy Susanto, S.Kom., M.T.I.
      • Ir. Santoso Budijono, M.M.
      • Johannes, S.Kom., M.T.
  • Student Activities
    • Company Visit
    • Guest Lecturer
    • Senior Gathering
    • Student Achievement
    • Himpunan Mahasiswa Sistem Komputer (HIMTEK)
  • CE Online Course
  • CE Laboratory
  • Certification
    • Recommended Certification Course
    • BINUS – Huawei ICT Academy
      • MoA
      • Instructor
  • Home
  • Contact Us
  • Social Media
  • More
BINUS 41th
  • Home
  • Articles
  • Researchers Exploit Low Entropy of IoT Devices to Break RSA Certificates

Researchers Exploit Low Entropy of IoT Devices to Break RSA Certificates

03 Apr 2020
  • Articles

The hardware limitations of the Internet of Things means the digital certificates these devices rely on to encrypt data can be easily compromised

By Fahmida Y Rashid

Many Internet of Things (IoT) devices rely on RSA keys and certificates to encrypt data before sending it to other devices, but these security tools can be easily compromised, new research shows.

Researchers from digital identity management company Keyfactor were able to compromise 249,553 distinct keys corresponding to 435,694 RSA certificates using a single virtual machine from Microsoft Azure. They described their work in a paper presented at the IEEE Conference on Trust, Privacy, and Security in Intelligent Systems and Applications in December.

“With under $3,000 of compute time in Azure, we were able to break 435,000 certificates,” says JD Kilgallin, Keyfactor’s senior integration engineer and researcher. “We showed that this attack is very easy to execute now.”

The researchers didn’t break RSA encryption, but took advantage of how public and private keys are generated. The private key, which is kept secret by the owner, consists of two large, randomly chosen prime numbers, while the public key is the product of those two numbers.

The public key is associated with a certificate, which is a document signed with the trusted party’s private key. The certificate acts as proof that the given public key is associated with the private key and that the public key can be used to encrypt or validate data sent to or from the device. The security of the RSA certificate relies on the difficulty of factoring the prime factors that were randomly chosen to make the keys.

If the prime numbers used to generate a key are truly random, then it shouldn’t be computationally feasible to factor the resulting key, Kilgallin says. However, if the numbers aren’t sufficiently random, the keys can share the same factors, making it possible to calculate and derive the private keys.

The researchers scanned the entire Internet and found 75 million active RSA certificates. Of those certificates, more than 435,000 certificates shared “prime factors,” which translates to about one in every 172 RSA certificates in use on the Internet.

As a point of comparison, the team also pulled 100 million certificates from certificate transparency logs—generated by certificate authorities on powerful servers—and found just five certificates with shared factors.

While many of the certificates with shared factors detected in this research belonged to IoT and networking devices such as routers, it was sometimes difficult to tell how the device was being used and where it was located, Kilgallin says.

So why did some of these devices produce such similar keys?  [READ MORE]

Share to your friends
Cancel Reply

BINUS UNIVERSITY | Computer Engineering

Jl. K. H. Syahdan No. 9, Kemanggisan, Palmerah
Jakarta 11480, Indonesia
Phone +62 21 534 5830, +62 21 535 0660 ext. 2205
Fax +62 21 530 0244

Copyright © BINUS Higher Education. All rights reserved