期刊文献+

New Weak Keys in RSA

New Weak Keys in RSA
下载PDF
导出
摘要 The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q). The security of the RSA system with the prime pairs of some special form is investigated. A new special-purpose algorithm for factoring RSA numbers is proposed. The basic idea of the method is to factor RSA numbers by factoring a well-chosen quadratic polynomial with integral coefficients. When viewed as a general-purpose algorithm, the new algorithm has a high computational complexity. It is shown thai the RSA number n = pq can be easily factored if p and q have the special form of p = as+b, q=cs+d, where a, b, c, d are relatively small numbers. Such prime pairs (p, q) are the weak keys of RSA, so when we generate RSA modulus, we should avoid using such prime pairs (p, q).
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1529-1532,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (60473029)
关键词 integer factorization RSA number public key cryptosystem special-purpose algorithm integer factorization RSA number public key cryptosystem special-purpose algorithm
  • 相关文献

参考文献11

  • 1H. C. Williams,B. Schmid.Some remarks concerning the M.I.T. public-key cryptosystem[J].BIT.1979(4)
  • 2Okamoto T,Uchiyama S.A New Public Key Cryptosystem as Secure as Factoring[].Procof Advances in Cryptology-EUROCRYPTO’.1998
  • 3Williams,H C.Ap+1 Method of Factoring[].Mathematics of Computation.1982
  • 4RIVEST R,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[].Communications of the ACM.1978
  • 5Boneh,D,Durfee,G,Howgrave-Graham,N. FactoringN=p′q for Larger [C]//Proceedings of CRYPTO 1999 . 1999
  • 6Pomerance,C.,Beth,T.,Cot,N.,Ingemarsson,I.The quadratic sieve factoring algorithm[].Advances in Cryptology—Eurocrypt’.1984
  • 7Williams,H C,Schmid,B.Some Remarks Concerning the MIT Public Key Cryptosystem[].Borsa Internazionale del Turismo.1979
  • 8Gordon J.Strong RSA Key[].Electronics Letters.1984
  • 9Lenstra H W.Factoring Integers with Elliptic Curves[].The Annal of Mathematics.1987
  • 10Pollard J M.Theorems on Factorization and Pri mality Tes- ting[].Proceedings of the Cambridge Philosophical So- ciety.1974

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部