How to Use RSA; or How to Improve the Efficiency of RSA Without Loosing its Security
نویسندگان
چکیده
It is striking to observe the progressive explosion of RSA key lengths. Although this trend clearly corresponds to a (legitimate) ever-increasing need for a guaranteed security level, this paper considers alternative, more efficient, secure implementations of RSA with respect to industrial constraints.
منابع مشابه
RSA hybrid encryption schemes
This document compares the two published RSA-based hybrid encryption schemes having linear reduction in their security proof: RSA-KEM with DEM1 and RSA-REACT. While the performance of RSA-REACT is worse than the performance of RSA-KEM+DEM1, a complete proof of its security has already been published. This is indeed an advantage, because we show that the security result for RSAKEM+DEM1 has a sma...
متن کاملUnprovable Security of RSA-OAEP in the Standard Model
Consider the provable security of RSA-OAEP when not instantiated with random oracles. Suppose a security reduction exists to show that finding a plaintext from a RSA-OAEP ciphertext (breaking the basic OW-CPA security) is as hard as the RSA problem. • The reduction can be used in an adaptive chosen ciphertext text (IND-CCA2) attack against RSA-OAEP. • The reduction cannot succeed in the random ...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملCryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key
The efficiency of decryption process of Multi prime RSA, in which the modulus contains more than two primes, can be speeded up using Chinese remainder theorem (CRT). On the other hand, to achieve the same level of security in terms integer factorization problem the length of RSA modulus must be larger than the traditional RSA case. In [9], authors studied the RSA public key cryptosystem in a sp...
متن کاملP-157: TLR5 Gene Expression in Endometrium of Women with Unexplained Recurrent Spontaneous Abortion
Background: Recurrent spontaneous abortion (RSA) is usually defined as three or more consecutive pregnancy losses before 20th week of gestation. Although different factors are considered as etiology of RSA but in some cases, despite of extensive work up, the cause of RSA remains unknown which called unexplained RSA. Immunological factors are suggested as etiological factors of unexplained RSA. ...
متن کامل