Testing RSA moduli for shared prime factors
The RSA algorithm for public-key cryptography is based on the presumed difficulty of factoring large bi-prime integers, the factoring problem. However, as pointed out in Lenstra et al  it is possible, given a set of moduli, to factor some of them by finding shared primes. This way the factoring problem is bypassed using a simple greatest common divisor (gcd) operation. A fast example implementation can be found below.
The above method is effective only against RSA keys for which the choices made during the generation procedure were not truly random. Taking into consideration the significance of strong cryptographic keys it is important to verify that all keys were generated following the principle of true randomness .
Below you can download an application in Python 3 which finds all shared factors that may exist, given a finite set of moduli. The purpose of this application is to enable system administrators and everyone who needs to test his own RSA keys, to do so. The application computes the gcd to determine which moduli pairs share primes and then, based on the known primes, factors these moduli completely. The application was improved in 2020 and has now the name 'sanitychecker_v2.py'.
The zipped source code together with some test cases can be downloaded here.
- The implementation is written in Python. As a result, the source code is in an easy to read and modify form and at the same time, the program performs well in terms of speed.
- Depending on the setup the Python script can check up to 1 million moduli in about 4 hours. For larger sets of moduli please see the note* below.
- The Python script needs as input only the list of moduli without any additional information. This input file must have one modulus (in HEX encoding) per line. You may find the auxiliary shell script
moduli_extract.shuseful, which is also in the zipped source code file. This shell script extracts the moduli from your certificates (in PEM format) using openssl and keeps track of their corresponding original files.
- The Python script can be used in all operating systems which support a Python interpreter and the computer-algebra system SageMath .
- Python version 3.6 or higher
- SageMath version 9.0 or higher (required by the Python script)
Installation and usage
- Download and install SageMath if it is not already installed on your system.
- (Optional step) Using the shell script given above, extract the moduli from your certificates and save them to a 'moduli' file.
To do so, run in a terminal:
./moduli_extract.sh <path to the directory with the pem files>
Make sure that you have set permission (via chmod) for executing the shell script. The shell script will create two files in the local directory:
- The 'moduli' file which contains one modulus per line in HEX encoding.
- The 'filenames' file which contains the filename of a PEM file on each line. It can be used to backtrack the PEM files whose moduli share primes.
- Run in a terminal:
sage -python3 sanitychecker_v2.py -i <moduli file>
The Python script loads all moduli from the file, performs computations and in the end it prints all moduli which were successfully factored. For testing you can use the sample set of 10000 moduli also contained in the zipped source code file.
Optionally, you can also save the results in a report file, just by giving the report file name as another argument:
sage -python3 sanitychecker_v2.py -i <moduli file> -r <report file>
Additionally, the Python script can be given the 'filenames' file generated by the shell script in step 2 and backtrack the PEM files corresponding to the moduli which share primes.
sage -python3 sanitychecker_v2.py -i <moduli file> -f <filenames file>
- Further hints using this Python script to find weak moduli with shared primes:
- The list of moduli is checked for duplicates.
- With the option
-dthe moduli can also be delivered as decimal values.
- Compared to version 1 a more efficient algorithm utilizes several cores in parallel.
- The shell and the Python script were developed under Linux, but they also run under Windows (in a bash shell and with SageMath for Windows).
Sources and References
 Arjen K. Lenstra et al., "Ron was wrong, Whit is right", Cryptology ePrint Archive Report 2012/064, February 2012, http://eprint.iacr.org/2012/064.
 Esslinger, Schneider, Simon: "RSA-Sicherheit in der Praxis", KES – Zeitschrift für Informationssicherheit, April 2012, pp. 18 ff. This article explains the attack on shared primes, how the sanity check above was developed, and what organizations can do against this risk. This article is in German.
 SageMath – free and open-source mathematics software system, v9.1 (2020-05-21), August 2020, http://www.sagemath.org
 Nadia Heninger et al., "Mining your P’s and Q’s: Detection of Widespread Weak Keys in Network Devices", in proceedings of the 21st USENIC Security Symposium, August 2012, https://factorable.net/weakkeys12.extended.pdf
 Christian Schlipp, Explanations to "Mining Your P’s and Q’s: Detection of Widespread Weak Keys in Network Devices", seminar thesis, February 2013
 Daniel J. Bernstein, Nadia Heninger, and Tanja Lange, "FactHacks: RSA factorization in the real world", slides to their talk at 29C3, December 2012, https://www.hyperelliptic.org/tanja/vortraege/facthacks-29C3.pdf. This explains attacks on RSA very well using SageMath in practice.
Categories: General News