Number Theoretic SETUPs for RSA Like Factoring Based Algorithms
نویسنده
چکیده
For many years there was a very common misbelief that having embedded mechanisms in hardware, constitute the optimal solution not only in the usage and the performance for the encryption algorithms, but for their security as well. The idea that lead to this common belief was that by this way an attacker could not tamper the encryption algorithms, specially regarding the asymmetric ones. M. Young and Yung introduced kleptography, showing that there are more risks than the ones that are expected to be faced, when using cryptographic systems. This work summarizes the scope of kleptography and analyzes two new number theoretic SETUPs for factoring encryption algorithms, one based on Lagrange’s four square theorem and one based on Coppersmith’s theorem. Both SETUPs target public key encryption algorithms, whose key generation depends on the product of two primes, providing a robust and secure solution.
منابع مشابه
Are 'Strong' Primes Needed for RSA
We review the arguments in favor of using so called strong primes in the RSA public key cryptosystem There are two types of such arguments those that say that strong primes are needed to protect against factoring attacks and those that say that strong primes are needed to protect against cycling attacks based on repeated encryption We argue that contrary to common belief it is unnecessary to us...
متن کاملOn the Factorization of RSA-120
We present data concerning the factorization of the 12O-digit number RSA-120, which we factored on July 9,1993, using the quadratic sieve method. The factorization took approximately 825 MIPS years and was completed within three months real time. At the time of writing RSA-120 is the largest integer ever factored by a general purpose factoring algorithm. We also present some conservative extrap...
متن کاملImproved Factoring of RSA Modulus
In 1999, the 512-bit number of 155 digits taken from the RSA Challenge list was first factored by the General Number Field Sieve. This work was done on a supercomputer and about 300 PCs or workstations by 17 experts all over the world. The calendar time for the factorization was over 6 months. Based on the open source GGNFS, we improved its algorithms and implementations. Now the 512-bit RSA mo...
متن کاملThe technical newsletter of RSA Laboratories , a division of RSA Data Security
All the known factoring algorithms can be divided into two broad types: algorithms whose running time depends on the size of the factors, and algorithms whose running time depends only on the size of the factored number n. The oldest factoring algorithms typically searched for the smallest factor p of n, and were thus of the first type. However, modern algorithms tend to use indirect approaches...
متن کاملA Tale of Two Sieves
I t is the best of times for the game of factoring large numbers into their prime factors. In 1970 it was barely possible to factor “hard” 20-digit numbers. In 1980, in the heyday of the Brillhart-Morrison continued fraction factoring algorithm, factoring of 50-digit numbers was becoming commonplace. In 1990 my own quadratic sieve factoring algorithm had doubled the length of the numbers that c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012