Measuring Cross Contamination of RSA Keys across PKI Ecosystem

In this study, we conducted the most comprehensive Internet-wide scan and analysis of TLS/SSL certificates and RSA keys to date. Our study focused on the less explored phenomenon of RSA public key reuse on the Internet. Our findings emphasize the need for robust mechanisms for the detection and analysis of duplicate and weak certificates and keys. To facilitate this analysis, the current platform is publicly available to determine duplicate keys and detect TLS certificates and RSA keys weaknesses.

You can check the following items, if you provide the PEM encoded format or an SSH key, our platform will parse it and search for it within our collected set. Regarding fingerprints, we can only deliver results if the provided fingerprint matches any entry in our collected set.

There is an example for each of the formats in corresponding sections.