Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms(samvartaka.github.io) |
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms(samvartaka.github.io) |
https://gist.github.com/aexaey/3646bb438f8712cbadf5/revision...
Scroll to the third change from the top - stupid github doesn't allow (an obvious) way to make a direct link to a particular gist's revision.
If the key-generator embeds a secret key (for seed exfiltration), the backdoor design will never be robust against reverse engineering. In fact, exposure of the embedded key gives to the attacker the ability to retroactively factor with ease the moduli of public-keys generated in the past, and recover the private-keys.
The designs of Curve25519 and illusoryTLS embed only an elliptic-curve public-key. Therefore, the exploitation requires access to the associated private-key /i.e., NOBUS property).
For the longer story about the sorrow state of the Web PKI and the nitty gritty details on this cryptographic backdoor, you may want to review the illusoryTLS whitepaper http://conference.hitb.org/hitbsecconf2015ams/wp-content/upl...
Mine is here: https://gist.github.com/ryancdotorg/18235723e926be0afbdd
Edit: Looks like you forked my code, replaced the curve25519 lib and broke the NOBUS and forward secrecy properties, then Nightling forked your fork (making no changes), and I accidentally hit fork on his fork.