Mathematical Attacks on RSA Cryptosystem. Mathematical Attacks on RSA Cryptosystem.

Mathematical Attacks on RSA Cryptosystem‪.‬

Journal of Computer Science 2006, August, 2, 8

    • 2,99 €
    • 2,99 €

Beschreibung des Verlags

Abstract: In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage. Key words: RSA, cryptography, cryptanalysis, attack, factorization, low-exponent, one-way function

GENRE
Computer und Internet
ERSCHIENEN
2006
1. August
SPRACHE
EN
Englisch
UMFANG
25
Seiten
VERLAG
Science Publications
ANBIETERINFO
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
GRÖSSE
175,7
 kB
Applied Cryptography and Network Security Applied Cryptography and Network Security
2007
Topics in Cryptology - CT-RSA 2009 Topics in Cryptology - CT-RSA 2009
2009
New Directions of Modern Cryptography New Directions of Modern Cryptography
2012
Homomorphic Encryption and Applications Homomorphic Encryption and Applications
2014
Information Security Information Security
2007
Modern Cryptography with Proof Techniques and Implementations Modern Cryptography with Proof Techniques and Implementations
2021
Data Mining: A Preprocessing Engine. Data Mining: A Preprocessing Engine.
2006
An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time. An Exact Algorithm for the Unbounded Knapsack Problem with Minimizing Maximum Processing Time.
2007
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005