On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms

نویسندگان

  • Gregor Leander
  • Andy Rupp
چکیده

To prove or disprove the computational equivalence of solving the RSA problem and factoring integers is a longstanding open problem in cryptography. This paper provides some evidence towards the validity of this equivalence. We show that any e cient generic ring algorithm which solves the ( exible) low-exponent RSA problem can be converted into an e cient factoring algorithm. Thus, the low-exponent RSA problem is intractable w.r.t. generic ring algorithms provided that factoring is hard.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Equivalence of Strong RSA and Factoring in the Generic Ring Model of Computation

Let N be the result of an RSA modulus generation, i.e., a random variable distributed according to some appropriate distribution over the set of products of two primes, such that factoring N is believed to be hard. The Strong RSA assumption states that, given an x chosen uniformly at random from ZN , it is computationally infeasible to compute a y ∈ ZN and an e ∈ N \ {1} such that y ≡ x (mod N)...

متن کامل

Lower Bounds for Factoring Integral-Generically

An integral-generic factoring algorithm is, loosely speaking, a constant sequence of ring operations that computes an integer whose greatest common divisor with a given integral random variable n, such as an RSA public key, is non-trivial. Formal definitions for generic factoring will be stated. Integral-generic factoring algorithms seem to include versions of trial division and Lenstra’s ellip...

متن کامل

Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n

1 I n t r o d u c t i o n Elliptic curves can be applied to public-key cryptosystems, and as such several schemes have been proposed [3, 4, 5, 6, 9, 11]. There are two typical elliptic curve cryptosystems: E1Gamal-type scheme [4, 11] and RSA-type schemes [3, 5, 6]. The security of the EIGamal-type elliptic curve cryptosystem is based on the difficulty of solving a discrete logarithm over ellipt...

متن کامل

Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA

For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decryption algorithm is faster than the standard RSA, where N = pq while ed = 1 mod (p−1)(q−1). In this paper, we show that a deterministic polynomial time equivalence also holds in this variant. The coefficient matrix T to which LL...

متن کامل

C OMPUTATIONAL A SPECTS OF C RYPTOGRAPHY AND C RYPTANALYSIS Dissertation

This thesis contains contributions to various fields of cryptology. On the one hand, it contributes to the theory of cryptography by considering the hardness and the relations of cryptographic problems in black-box models of computation. On the other hand, it presents novel results belonging to the area of applied cryptology, namely efficient hardand software architectures dedicated for cryptan...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006