A short discussion on my blog: <a href="https://www.dancvrcek.com/re-investigating-the-origins-of-rsa-public-keys/" rel="nofollow">https://www.dancvrcek.com/re-investigating-the-origins-of-rs...</a>
"Although RSA factorization is considered to be an NP- hard problem if keys that fulfil the above conditions are used..."<p>Isn't this incorrect? The implication would be that quantum computers could solve NP-Complete problems in polynomial time.
You may also try online tool that classifies keys based on the results from paper: <a href="http://crcs.cz/rsapp/" rel="nofollow">http://crcs.cz/rsapp/</a>
Just insert encoded certificate or URL to https server and let tool to tell you what library generated that key(s).<p>If you will provide 5 keys all generated by the same library, the correct library should be within top three most probable sources with high (>95%) probability.<p>(if not, please submit feedback :))
Oh, to be a fly on the wall at Fort Meade.<p>Given the thousands of employees the NSA has working on all aspects of cryptography, there must be countless examples of this type of investigation. It's integral to traffic analysis and to fingerprinting of cryptosystems.<p>At least I hope that the NSA does lots of stuff like this. Because if they don't, what does that leave them doing? If the NSA is simply <i>evil</i> and/or <i>incompetent</i>, that's not enough ROI for the US taxpayers.<p>Unfortunately, NSA work probably remains highly classified for so long that an ex employee would never be able to write about it in technical detail. But I could be wrong? Are there any Inside Baseball books out there revealing the inner workings of NSA spooks?