期刊文献+

RSA密码体制安全性分析 被引量:1

Analysis of security of RSA cryptosystem
下载PDF
导出
摘要 对RSA公钥密码体制进行了分析,在指出其安全漏洞的同时,对RSA实现的协议进行了分析,而且克服了它们潜在的破译问题,这对增强RSA密码体制安全性有着十分重要的意义. In this paper the author analyzes RSA pulblic-Key cryptosystem ana points out some limitations on its security. Then he not only analyzes cryptographic protocols of RSA practical security but also suggests methods to overcome their potential shortcomings such as decryption, which is helpful to improve the security of RSA public-key cryptosystem.
作者 李滨
出处 《西南民族大学学报(自然科学版)》 CAS 2005年第5期799-802,806,共5页 Journal of Southwest Minzu University(Natural Science Edition)
关键词 RSA 单向陷门函数 密码分析 密码体制 数字签名 RSA one-way trapdoor function cryptanalysis cryptosystem digital signature
  • 相关文献

参考文献8

  • 1Oded Goldreich. Foundations of Cryptography Basic Tools[J]. Cambridge University Press, 2001, 31-43.
  • 2Maurer U. Fast generation of prime numbers and secure public-key cryptographic parameters[J]. Journal of Cryptology, 1995, (8):123-155.
  • 3Pohlig S C, Hellman M E. An Improved Algorithm for Computing Logarithms in GF(p) and Its Cryptographic Signifieance[J].IEEE Transactions on Information Theory, 1978, 24(1): 106-111.
  • 4Wiener M J. Cryptanalysis of short RSA Secret Exponents[J]. IEEE Trans. On Information Theory, 1990, IT-36: 553-558.
  • 5Mitehell C. Comment on Blocking Method for RSA Cryptosystem Without Expanding cipher Length[J]. Electronics Letters, 1989,25(22): 1527-1528.
  • 6Delaurentis J M. A further weakness in the common modulus protocol for the RSA cryptoalgorithm[J]. Cryptologia, 1984, (8):253-259.
  • 7Paul Garrett. Making, Breaking Codes: An Introduction to Cryptology[M]. ISBN 7-111-12478-2. 2001:131-132.
  • 8Jonge De W, Chaum D. Attacks on Some RSA signatures[M]. Proc. Crypto'85, New York: Springer-Verlag, 1986.

同被引文献4

  • 1[1]EIGAMAL T.A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans.On Information Theory,1985,31(4):469-472
  • 2[2]PRENEEL B.The state of cryptographic hash functions[J].Lecture Notes in Computer Science,1999,1561:158-182.
  • 3[3]ODLYZKO A M.Discrete logarithms:the past and the future[J].Designs,codes,and cryptography,2000,19:129-145.
  • 4[4]BACH E,SHALLIT J.Algorithmic Number Theory[M].Volume 1:Efficient Algorithms.The MIT Press,1996.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部