On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms
نویسندگان
چکیده
To prove or disprove the computational equivalence of solving the RSA problem and factoring integers is a longstanding open problem in cryptography. This paper provides some evidence towards the validity of this equivalence. We show that any e cient generic ring algorithm which solves the ( exible) low-exponent RSA problem can be converted into an e cient factoring algorithm. Thus, the low-exponent RSA problem is intractable w.r.t. generic ring algorithms provided that factoring is hard.
منابع مشابه
The Equivalence of Strong RSA and Factoring in the Generic Ring Model of Computation
Let N be the result of an RSA modulus generation, i.e., a random variable distributed according to some appropriate distribution over the set of products of two primes, such that factoring N is believed to be hard. The Strong RSA assumption states that, given an x chosen uniformly at random from ZN , it is computationally infeasible to compute a y ∈ ZN and an e ∈ N \ {1} such that y ≡ x (mod N)...
متن کاملLower Bounds for Factoring Integral-Generically
An integral-generic factoring algorithm is, loosely speaking, a constant sequence of ring operations that computes an integer whose greatest common divisor with a given integral random variable n, such as an RSA public key, is non-trivial. Formal definitions for generic factoring will be stated. Integral-generic factoring algorithms seem to include versions of trial division and Lenstra’s ellip...
متن کاملEquivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n
1 I n t r o d u c t i o n Elliptic curves can be applied to public-key cryptosystems, and as such several schemes have been proposed [3, 4, 5, 6, 9, 11]. There are two typical elliptic curve cryptosystems: E1Gamal-type scheme [4, 11] and RSA-type schemes [3, 5, 6]. The security of the EIGamal-type elliptic curve cryptosystem is based on the difficulty of solving a discrete logarithm over ellipt...
متن کاملDeterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decryption algorithm is faster than the standard RSA, where N = pq while ed = 1 mod (p−1)(q−1). In this paper, we show that a deterministic polynomial time equivalence also holds in this variant. The coefficient matrix T to which LL...
متن کاملC OMPUTATIONAL A SPECTS OF C RYPTOGRAPHY AND C RYPTANALYSIS Dissertation
This thesis contains contributions to various fields of cryptology. On the one hand, it contributes to the theory of cryptography by considering the hardness and the relations of cryptographic problems in black-box models of computation. On the other hand, it presents novel results belonging to the area of applied cryptology, namely efficient hardand software architectures dedicated for cryptan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006