Assorted Attacks on the RSA Cryptographic Algorithm

نویسنده

  • Edmond J. Murphy
چکیده

This thesis concentrates on the vulnerabilities of the RSA Cryptographic Algorithm when it is not securely implemented. While it has been proven that a brute force attack on the algorithm is not practical there remain aspects of the algorithm that require proper use to prevent back-door attacks. The attacks performed in this thesis attempt to exploit both mathematical and inherent timing vulnerabilities of the algorithm. Furthermore, simple practices which prevent theses attacks are discussed. RSA Cryptographic Algorithm Developed by Ron Rivest, Adi Shamir, and Len Adleman in 1977 the RSA public-key cryptographic algorithm has since been widely used in a variety of computer security applications. The first step of the algorithm is to select two different prime numbers, p and q. Next we calculate the modulus (n = p x q) and secondary modulus (ф(n) = (p-1) x (q-1)). We then select an integer e, our public key, such that e is a positive number less than and relatively prime to ф(n). Finally, we take the inverse of e mod ф(n) to produce d, our private key.[1] All of the aforementioned steps are used in practice with very large numbers to ensure added security. The size of these numbers has increased over time in order to account for faster computer processor speeds. The current standard depends on the importance of the information being encrypted, but selection of the primes generally ranges from a 128-bit to 512-bit numbers. However, all of the RSA key generation steps have the potential to be performed on extremely large numbers as mathematical algorithms that run at speeds linear to the number of digits. Now that we have our public and private keys we are ready to encrypt our private data using the equation:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optical and EM Fault-Attacks on CRT-based RSA: Concrete Results

RSA is a well-known algorithm that is used in various cryptographic systems like smart cards and e-commerce applications. This article presents practical attacks on implementations of RSA that use the Chinese Remainder Theorem (CRT). The attacks have been performed by inducing faults into a cryptographic device through optical and electromagnetic injections. We show optical attacks using fibre-...

متن کامل

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Some Insightful Attacks on the RSA Cryptosystem

RSA has come to play a central role in electronic communications. As the first example of what is known as a public key cryptosystem, and the only one that has stood the test of nearly 30 years of attacks, RSA has become the algorithm of choice for encrypting Internet credit-card transactions, securing email, and authenticating phone calls. Like all practical cryptographic schemes, however, RSA...

متن کامل

Architecture and Fpga Implementation of a Digit-serial Rsa Processor

Introduction In the recent years, we have witnessed an increasing deployment of hardware devices for providing security functions via cryptographic algorithms. In fact, hardware devices provide both high performance and considerable resistance to tampering attacks, and are thus ideally suited for implementing computationally intensive cryptographic routines which operates on sensitive data. Amo...

متن کامل

Priority Based Rsa Cryptographic Technique

The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014