



NOW
SPONSOR
Cryptographic design choices of OpenSSL library and their automated analysis
OpenSSL is the most popular cryptographic library, a cornerstone of secure communication, and its cryptographic internals continue to evolve and therefore deserve scrutiny. In this lightning talk, we present a concise technical overview of how OpenSSL compares to other major libraries in its implementation of elliptic curve cryptography (ECC), based on our analysis using the reverse-engineering tool called pyecsca. We comment on some design decisions, coordinate system choices, and optimizations selected by OpenSSL developers, and how it compares to the broader ecosystem of cryptographic libraries. We then turn to RSA, where our large-scale analysis reveals subtle, persistent fingerprints in OpenSSL-generated keys. Drawing from our studies published at USENIX and ESORICS, we demonstrate how these fingerprints can be used to attribute keys in the wild, exposing systemic patterns and even detecting unwantedly injected keys, as seen in Estonian electronic IDs in 2017. Moreover, we discuss how our open-source channel tooling can be used to analyze the side-channel security of OpenSSL. All of this is powered by tools and techniques developed at the Centre for Research on Cryptography and Security (CRoCS) at Masaryk University. We aim to show deep and practical security insights through rigorous tooling and transparency. Presented by: Łukasz Chmielewski, Centre for Research on Cryptography and Security (CRoCS), Masaryk University https://crocs.fi.muni.cz/