Abstract :
The author shows an easy way to construct weak keys for RSA. Furthermore, it appears to be hard to tell that these keys are weak without knowledge of a secret. This emphasises the general proposition that key generation requires extremely careful attention when designing, certifying and purchasing cryptographic systems.