Lark Kim Implementing and Cracking the RSA Cryptosystem
نویسندگان
چکیده
The primary goal of our project is to implement the RSA cryptosystem in Maple 8. Our implementation includes finding primes suitable for RSA, translating text messages into blocks of large numbers and back, as well as encrypting and decrypting the numerical blocks. We found that our program could quickly encrypt long messages using primes with at least 512 bits and was capable of encrypting messages in a reasonable amount of time using 1024bit primes. According to the RSA website (www.rsasecurity.com) 1024-bit primes are still considered safe for everyday use. In fact, they offer a $200,000 reward for the factorization of a certain 2048-bit composite. The next section of this paper will serve as a quick review of RSA. In section 3, we discuss the various properties that prime numbers should have for secure encryption as described in [4], [2], and [3]. We follow the method of [2] for generating these so-called strong primes. The final section of the paper discusses some methods for factoring n when p and q are not strong primes. The factorization algorithms we programmed were Pollard’s p−1 method and William’s p+ 1 method, taken from [6] and [7] respectively.
منابع مشابه
Web Distributed Computing Systems Implementation and Modeling
This article proposes a new approach for distributed computing. The main novelty consists in the exploitation of Web browsers as clients, thanks to the availability of Javascript, AJAX and Flex. The described solution has two main advantages: it is client-free, so no additional programs have to be installed to perform the computation, and it requires low CPU usage, so client-side computation is...
متن کاملOn the Efficiency of Fast RSA Variants in Modern Mobile Phones
Modern mobile phones are increasingly being used for more services that require modern security mechanisms such as the public-key cryptosystem RSA. It is, however, well-known that public-key cryptography demands considerable computing resources and that RSA encryption is much faster than RSA decryption. It is consequently an interesting question if RSA as a whole can be executed efficiently on ...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملPrivacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
In this letter, we propose a privacy-preserving authentication protocol with RSA cryptosystem in an RFID environment. For both overcoming the resource restriction and strengthening security, our protocol uses only modular exponentiation with exponent three at RFID tag side, with the padded random message whose length is greater than one-sixth of the whole message length. key words: cryptography...
متن کاملPublic Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library
Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosystems implementing various algorithms. We are developing a cryptosystem based on Pell’s Equation. RSA algorithm is extensively used in the popular implementations of Public Key ...
متن کامل