Mathematical Attacks on RSA Cryptosystem. Mathematical Attacks on RSA Cryptosystem.

Mathematical Attacks on RSA Cryptosystem‪.‬

Journal of Computer Science 2006, August, 2, 8

    • €2.99
    • €2.99

Publisher Description

Abstract: In this paper some of the most common attacks against Rivest, Shamir, and Adleman (RSA) cryptosystem are presented. We describe the integer factoring attacks, attacks on the underlying mathematical function, as well as attacks that exploit details in implementations of the algorithm. Algorithms for each type of attacks are developed and analyzed by their complexity, memory requirements and area of usage. Key words: RSA, cryptography, cryptanalysis, attack, factorization, low-exponent, one-way function

GENRE
Computing & Internet
RELEASED
2006
1 August
LANGUAGE
EN
English
LENGTH
25
Pages
PUBLISHER
Science Publications
PROVIDER INFO
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
SIZE
175.7
KB
Applied Cryptography and Network Security Applied Cryptography and Network Security
2007
Topics in Cryptology - CT-RSA 2009 Topics in Cryptology - CT-RSA 2009
2009
New Directions of Modern Cryptography New Directions of Modern Cryptography
2012
Homomorphic Encryption and Applications Homomorphic Encryption and Applications
2014
Information Security Information Security
2007
Modern Cryptography with Proof Techniques and Implementations Modern Cryptography with Proof Techniques and Implementations
2021
The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report) The Cyber Space and Information, Communication and Technology: A Tool for Westernization Or Orientalism Or both (Report)
2011
A New Model for Multi-Agent Case-Base Reasoning Systems. A New Model for Multi-Agent Case-Base Reasoning Systems.
2006
Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report) Effective Factors on Iranian Consumers Behavior in Internet Shopping: A Soft Computing Approach (Report)
2009
New Cryptosystem Using Multiple Cryptographic Assumptions (Report) New Cryptosystem Using Multiple Cryptographic Assumptions (Report)
2011
Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report) Childhood Cancer-a Hospital Based Study Using Decision Tree Techniques (Report)
2011
Exploring the Relationship Between Cohesion and Complexity. Exploring the Relationship Between Cohesion and Complexity.
2005