期刊文献+

RSA算法的内在特性、破解与防范措施 被引量:4

Internal Peculiarity and Cryptanalysis of the RSA Algorithm and Precautionary Measures
下载PDF
导出
摘要 为了给RSA(Rivet、Shamir和Adelman提出的)算法的使用者提供参考,从不动点、周期性、对明文的要求、保密性和加密速度等方面分析了这种加密算法的内在特性,从理论和实际两方面对该算法的脆弱性以及针对该算法的攻击方法进行了分析。归纳出如何防范针对该算法攻击的结论,得出了RSA使用者使用的密钥匙位数必须大于2048位才能保证算法安全性这一结果.通过给黑客的攻击方法进行分类,从算法维护和安全策略定制的角度,总结了网络安全人员提升加密算法安全性的办法. To provide a reference to RSA ( proposed by Rivet, Shamir and Adelman) users, the internal peculiarities of the algorithm such as unmovable point, periodicity, demand for plain text, security, and cryptography speed are analyzed. By stating the drawbacks of RSA and the usual attacking in theoretical and practical aspects, the paper presents the precautionary measures that the key number of RSA must be greater than 2 048 bits for users to ensure the safely of RSA algorithm. With the attacking ways sorted, the measures to approve the security of RSA are put forward for network workers.
出处 《天津大学学报》 EI CAS CSCD 北大核心 2006年第B06期379-382,共4页 Journal of Tianjin University(Science and Technology)
关键词 加密算法 解密 破解 cryptography algorithm decipher cipher analysis
  • 相关文献

参考文献5

  • 1黄红梅,生加明,徐结绿,汪成策.关于RSA公钥体制应用中几个问题的探讨[J].通信技术,2003,36(2):84-86. 被引量:2
  • 2William S.Cryptography and Network Security:Principles and Practice[M].2nd ed.Beijing:Tsinghua University Press (Gravure),2002:19-30.
  • 3Bruce S.应用密码学-协议算法与C源程序[M].吴世忠译.北京:机械工业出版社,2000:41-45.
  • 4Goodrich O.Foundations of Cryptography:Basic Tools[M].England:Cambridge University Press,2001:18-25.
  • 5Carlisle A,Steve L.Understanding Public Key Infrastructure:Concepts,Standards and Deployment Considerations[M].USA:Macmillan Technical Publishing,1999:25-30.

二级参考文献5

  • 1[1]Schneier B.应用密码学.北京:机械工业出版社,2000
  • 2[2]Salomaa A.公钥密码学.北京:国防工业出版社,1998
  • 3[3]Hastad J. On Using RSA With Low Exponent in a Public Key Network.Proc. Crypto' 85, New York: Springer - Verlag, 1986
  • 4[4]Delaurentis J M. A Further Weakness in the Common Modulus Protocol for the RSA Cryptosystem. Cryptologia, 1984; 8 (3): 253 ~ 259
  • 5[5]Wiener M J. Cryptanalysis of Short RSA Secret Exponents. IEEE Trans.on Information Theory, 1990; IT - 36:553 ~ 558

共引文献1

同被引文献46

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部