Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?

Henry Hosseini, Julian Rengstorf, Thomas Hupperich

2022

Abstract

Public key authentication is widely used alternatively to password-based credentials, enabling remote login with a generated key pair consisting of a private key and a public key. Like passwords, private keys are required to remain confidential to prevent unauthorized access to resources. These secrets might become subject to theft or publicly exposed unintentionally by the key’s owner. In such cases, the keys are deemed compromised and need to be revoked and abandoned instantaneously. Unfortunately, it is rarely possible for users to know whether their secret keys have been publicly exposed. Closing this gap, we introduce a private key leakage checker titled KeyPwned crawling the Internet for exposed authentication keys. We present a continuously updated database of leaked keys’ fingerprints discovered on websites or in source code repositories. For community-driven enhancement, we allow suggestions of URLs to scan for additional leaked keys, following our standardized process. We furthermore offer users a registration with their public keys to be notified if we detect leakage of their corresponding private key. KeyPwned is designed to run as a service following common software design standards, empowering users to verify their keys’ confidentiality and take action if a private key has been exposed.

Download


Paper Citation


in Harvard Style

Hosseini H., Rengstorf J. and Hupperich T. (2022). Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?. In Proceedings of the 17th International Conference on Software Technologies - Volume 1: ICSOFT, ISBN 978-989-758-588-3, pages 649-656. DOI: 10.5220/0011308000003266


in Bibtex Style

@conference{icsoft22,
author={Henry Hosseini and Julian Rengstorf and Thomas Hupperich},
title={Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?},
booktitle={Proceedings of the 17th International Conference on Software Technologies - Volume 1: ICSOFT,},
year={2022},
pages={649-656},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0011308000003266},
isbn={978-989-758-588-3},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 17th International Conference on Software Technologies - Volume 1: ICSOFT,
TI - Automated Search for Leaked Private Keys on the Internet: Has Your Private Key Been Pwned?
SN - 978-989-758-588-3
AU - Hosseini H.
AU - Rengstorf J.
AU - Hupperich T.
PY - 2022
SP - 649
EP - 656
DO - 10.5220/0011308000003266