Multi-Prime RSA Over Galois Approach
نویسنده
چکیده
Then choose an integer e with 1 < e < φ(n) and gcd (e, φ(n)) = 1. Then compute the integer d with 1 < d < φ(n) and de = 1modφ(n). Since gcd (e, φ(n)) = 1, such a number d exists. It can be computed by Extended Euclidean Algorithm. Public key is pair (n, e) and Private key is (d, p, q). n is called the RSA modulus ,e is encryption exponent and d is decryption exponent. Encryption: Let x ∈ Zn be the plaintext then x can be encrypted as ek(x) = x modn ek(x) = y is the ciphertext. Decryption: If y ∈ Zn is the ciphertext, then x can be computed as x = dk(y) = y modn.
منابع مشابه
Enhancement over the Variant of Public Key Cryptography (PKC) Algorithm
In this paper, we have shown the development of a new public key cryptosystem which is the extension of the work of “Improvement over three prime RSA with two private keys and one public key”. In many cases, the decryption generation speed is required to be enhanced,e.g; in banking sector, signature generation in one day can be in a large volume as compared to only single signature verification...
متن کاملAn efficient implementation of multi-prime RSA on DSP processor
RSA is a popular cryptography algorithm widely used in signing and encrypting operations for security systems. Generally, the software implementations of RSA algorithm are based on 2-prime RSA. Recently multi-prime RSA has been proposed to speed up RSA implementations. Both 2-prime and multi-prime implementations require squaring reduction and multiplication reduction of multi-precision integer...
متن کاملOn the security of multi-prime RSA
In this work we collect the strongest known algebraic attacks on multi-prime RSA. These include factoring, small private exponent, small CRT exponent and partial key exposure attacks. Five of the attacks are new. A new variant of partial key exposure attacks is also introduced which applies only to multi-prime RSA with more than two primes.
متن کاملCryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
The efficiency of decryption process of Multi prime RSA, in which the modulus contains more than two primes, can be speeded up using Chinese remainder theorem (CRT). On the other hand, to achieve the same level of security in terms integer factorization problem the length of RSA modulus must be larger than the traditional RSA case. In [9], authors studied the RSA public key cryptosystem in a sp...
متن کاملOn the Efficiency of Fast RSA Variants in Modern Mobile Phones
Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1605.05024 شماره
صفحات -
تاریخ انتشار 2016