A RSA Key Security Gradating Algorithm Based on Threshold Attack Time
نویسندگان
چکیده
In this paper, we pioneer a key security level gradation scheme which is proved to efficient to counteract Iterative-Encrypting-Attack against RSA. And we make it clear that the bug which hides after the traditional key generation algorithm is exploited by Iterative-EncryptingAttack and weakens RSA security, and that the case can be improved if the traditional key generation algorithm is modified delicately. After analyzing the preliminaries and practical steps of Iterative-Encrypting-Attack in detail, we propose the concept of security grade of key-pair and depict the hierarchy of grades systematically, and bring forward an algorithm that grades security grade of key pairs. Furthermore, we introduce the concept of attack cost into the gradation prototype, then program for grading algorithm and set in motion a series of experiments for surveying the relationship between attack-cost and key-security-grade. At last, by the attained result from experimental statistics, we point it out that if key-pair is properly chosen RSA system can acquire a satisfying immunity from IterativeEncrypting-Attack.
منابع مشابه
Time and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملPerformance Analysis of Countermeasures against Timing Attack in RSA Algorithm
Public key cryptography is based on two keys, in which decryption key is private key. Among the different cryptanalytic attacks, timing attack is one of the possible attacks on RSA that determines bits of private key. This is done by determining time for each iteration in computing modular exponentiation. There are different mechanisms to counter such attack. Among them, blinding method and ran...
متن کاملSecurity Analysis of Elliptic Curve Cryptography and RSA
Internet has revolutionized the data communication systems. It provides platform to get the information exchanged quickly amongst the communicating parties at the same time it also provides opportunity to adversary to attack on unsecured information. In order to provide confidentiality, integrity and authentication services to unsecured information while transit or static, cryptographic techniq...
متن کاملSecuring RSA algorithm against timing attack
Security plays an important role in many embedded systems. All security based algorithms are implemented in hardware or software, and on physical devices which interact with the systems and influenced by their environments. The attacker extracts, investigate and monitor these physical interactions and extracts side channel information which is used in cryptanalysis. This type of cryptanalysis i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JSW
دوره 6 شماره
صفحات -
تاریخ انتشار 2011