US 11,870,900 B2
Detecting vulnerable encryption keys in network communication systems
Samuel S. Gross, Manassas, VA (US)
Assigned to NOBLIS, INC., Reston, VA (US)
Filed by NOBLIS, INC., Reston, VA (US)
Filed on Nov. 21, 2022, as Appl. No. 17/991,318.
Application 17/991,318 is a continuation of application No. 17/104,678, filed on Nov. 25, 2020, granted, now 11,509,471.
Application 17/104,678 is a continuation of application No. 15/980,965, filed on May 16, 2018, granted, now 10,855,467, issued on Dec. 1, 2020.
Claims priority of provisional application 62/507,630, filed on May 17, 2017.
Prior Publication US 2023/0086951 A1, Mar. 23, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/30 (2006.01); H04L 9/08 (2006.01); H04L 9/00 (2022.01)
CPC H04L 9/302 (2013.01) [H04L 9/002 (2013.01); H04L 9/0869 (2013.01); H04L 9/0894 (2013.01); H04L 2209/26 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for determining whether a private signing key is vulnerable to being compromised, the system comprising one or more microprocessors configured to cause the system to:
receive cryptographic data comprising a plurality of digital signatures from one or more parties, wherein each of the plurality of digital signatures are based on a respective random number and respective private signing key;
determine that the same random number is used by the same party for more than one digital signature;
in accordance with a determination that the same random number is used by the same party for more than one digital signature, determine that the private signing key of that party is vulnerable to being compromised; and
generate an alert indicating that the private signing key of the respective party is vulnerable to being compromised.