Mathematical Attacks on RSA Cryptosystem. Mathematical Attacks on RSA Cryptosystem.

Mathematical Attacks on RSA Cryptosystem‪.‬

Journal of Computer Science 2006, August, 2, 8

    • 2,99 €
    • 2,99 €

Description de l’éditeur

Abstract: In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage. Key words: RSA, cryptography, cryptanalysis, attack, factorization, low-exponent, one-way function

GENRE
Informatique et Internet
SORTIE
2006
1 août
LANGUE
EN
Anglais
LONGUEUR
25
Pages
ÉDITIONS
Science Publications
DÉTAILS DU FOURNISSEUR
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
TAILLE
175,7
Ko
Applied Cryptography and Network Security Applied Cryptography and Network Security
2007
Topics in Cryptology - CT-RSA 2009 Topics in Cryptology - CT-RSA 2009
2009
New Directions of Modern Cryptography New Directions of Modern Cryptography
2012
Homomorphic Encryption and Applications Homomorphic Encryption and Applications
2014
Information Security Information Security
2007
Modern Cryptography with Proof Techniques and Implementations Modern Cryptography with Proof Techniques and Implementations
2021
Wifi Technology: Future Market Challenges and Opportunities. Wifi Technology: Future Market Challenges and Opportunities.
2006
Management Information Systems Role in Decision-Making During Crises: Case Study (Report) Management Information Systems Role in Decision-Making During Crises: Case Study (Report)
2010
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005