Large decryption exponents in RSA

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generating RSA Encryption and Decryption Exponents

that is, d is e−1 (the inverse of e) in Zφ(n). We now turn to the question of how Alice chooses e and d to satisfy (1). One way she can do this is to choose a random integer e ∈ Zφ(n) and then solve (1) for d. We will show how to solve for d in Sections 46 and 47 below. However, there is another issue, namely, how does Alice find random e ∈ Zφ(n)? If Z ∗ φ(n) is large enough, then she can just ...

متن کامل

More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents

Several schemes have been proposed towards the fast encryption and decryption in RSA and its variants. One popular idea is to use integers having low Hamming weight in the preparation of the decryption exponents. This is to reduce the multiplication effort in the square and multiply method in the exponentiation routine, both in encryption and decryption. In this paper we show that such schemes ...

متن کامل

Side Channel Attack to Actual Cryptanalysis: Breaking CRT-RSA with Low Weight Decryption Exponents

Towards the cold boot attack (a kind of side channel attack), the problems of reconstructing RSA parameters when (i) certain bits are unknown (Heninger and Shacham, Crypto 2009) and (ii) the bits are available but with some error probability (Henecka, May and Meurer, Crypto 2010) have been considered very recently. In this paper we exploit the error correction heuristic proposed by Henecka et a...

متن کامل

A New Attack on RSA with Two or Three Decryption Exponents

Let N = pq be an RSA modulus, i.e. the product of two large unknown primes of equal bit-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N and satisfying equations eixi − φ(N)yi = zi, where φ(N) = (p− 1)(q − 1) and xi, yi, zi are unknown parameters. The new attack is an extension of Guo’s continued fraction attack as well as th...

متن کامل

Trading decryption for speeding encryption in Rebalanced-RSA

In 1982, Quisquater and Couvreur proposed an RSA variant, called RSA-CRT, based on the Chinese Remainder Theorem to speed up RSA decryption. In 1990, Wiener suggested another RSA variant, called Rebalanced-RSA, which further speeds up RSA decryption by shifting decryption costs to encryption costs. However, this approach essentially maximizes the encryption time since the public exponent e is g...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied Mathematics Letters

سال: 2003

ISSN: 0893-9659

DOI: 10.1016/s0893-9659(03)80046-0