Score: 0

When RSA Fails: Exploiting Prime Selection Vulnerabilities in Public Key Cryptography

Published: December 27, 2025 | arXiv ID: 2512.22720v1

By: Murtaza Nikzad, Kerem Atas

Potential Business Impact:

Cracks secret codes by finding weak math numbers.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

This paper explores vulnerabilities in RSA cryptosystems that arise from improper prime number selection during key generation. We examine two primary attack vectors: Fermat's factorization method, which exploits RSA keys generated with primes that are too close together, and the Greatest Common Divisor (GCD) attack, which exploits keys that share a common prime factor. Drawing from landmark research including Heninger et al.'s ``Mining Your Ps and Qs'' study, which discovered over 64,000 vulnerable TLS hosts, and B{ö}ck's 2023 analysis of Fermat factorization in deployed systems, we demonstrate that these vulnerabilities remain prevalent in real-world cryptographic implementations. Our analysis reveals that weak random number generation in embedded devices is the primary cause of these failures, and we discuss mitigation strategies including proper entropy collection and prime validation checks.

Country of Origin
🇺🇸 United States

Page Count
6 pages

Category
Computer Science:
Cryptography and Security