期刊文献+

RSA算法中的代数结构 被引量:11

Algebra Structure of RSA Arithmetic
下载PDF
导出
摘要 本文首次应用二次剩余理论对RSA中的代数结构进行了研究.计算出了Zn*中模n的二次剩余和二次非剩余的个数,对它们之间的关系进行了分析,并用所有二次剩余构成的群对Zn*进行了分割,证明了所有陪集构成的商群是一个Klein四元群.对强RSA的结构进行了研究,证明了强RSA中存在阶为φ(n)/2的元素,并且强RSA中Zn*可由三个二次非剩余的元素生成.确定了Zn*中任意元素的阶,证明了Zn*中所有元素阶的最大值是lcm(p-1,q-1),并且给出了如何寻找Zn*中最大阶元素方法.从而解决了RSA中的代数结构. Based on the theory of quadratic residues,the algebra structure of RSA arithmetic is researched in this paper.This work calculates numbers of quadratic residues and non-residues in the group Zn^* and investigates their relationship.Zn^* is divided up by the group made up with all quadratic residues in Zn^* and all cosets form a quotient group of order 4 which is a Klein group.Studyed the structure of strong RSA further,it shows that the element of order (n)/2 exists and the group Zn^* can be generated by three elements of quadratic non-residues.Let the facterization n=p·q,the order of each element can be calculated,and the biggest order of all element is lcm(p-1,q-1) in Zn^*.It also shows how to find the element of the biggest order.So the algebra structure of RSA arithmetic is solved.
出处 《电子学报》 EI CAS CSCD 北大核心 2011年第1期242-246,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60773003 No.60603010)
关键词 RSA算法 代数结构 二次剩余 欧拉函数 RSA arithmetic algebra structure quadratic residues euler's phi function
  • 相关文献

参考文献9

  • 1W Diffie, M E Hellman. New directions in cryptography[ J]. IEEE Transactions on Information Theory, 1976,22 (6) :644 - 654.
  • 2R L Rivest, A Shamir, L Adleman. A method for obtaining digital signatures and public key cryptosystems[ J]. Communications of the ACM, 1978,21 (2) : 120 - 126.
  • 3M Bellare, G Neven. Identity-Based Multi-signatures from RSA [A]//M. Abe(Ed.). c'r-RSA 2007: LNCS 4377 [C]. San Francisco, CA, USA, 2007. 145 - 162.
  • 4袁晓宇,张其善.基于智能卡的RSA数字签名实现关键问题解析[J].电子学报,2004,32(11):1897-1900. 被引量:11
  • 5D Boneh, G Durfee. Cryptanalysis of RSA with private key d less than NO. 292 [ A 1. Proceedings of the 17th International Couference on Theory and Application of Cryptographic Techniques[C]. 2000. 1339 - 1349.
  • 6D Boneh. Twenty years of attacks on the RSA cryptosystem [J]. Notices of the AMS, 1999,46(2) :203 - 213.
  • 7柯召,孙琦.数论讲义[M].第二版上.北京:高等教育出版社,1999.128.
  • 8V Shoup. A Computational Introduction to Number Theory and Algebra [ M ]. Version 1. Cambridge: Cambridge University Press, 2005.
  • 9G Ateniese, J Camenisch, M Joye, G Tsudik. A practical and provably secure coalition-resistant group signature scheme[ AI. Advances in Cryptology-Crypto 2000 [ C]. Santa Barbara, California, USA, 2000.255 - 270.

二级参考文献3

  • 1Preliminary Confidential Data Book 12.00,Security & Chip Card Ics SLE66CxxxP[Z].Infineon Technologies AG.
  • 2Confidential Application Note 03.01,Application Programming Interface for Cryptographic Functions on the SLE66CxxxP[Z].Infineon Technologies AG.
  • 3RSA Security Inc.PKCS #v2.1 RSA Cryptography Standard[S].June 14.2002.

共引文献10

同被引文献81

引证文献11

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部