Notes in Computer Science 2729
نویسندگان
چکیده
The security of the RSA cryptosystem depends on the difficulty of factoring large integers. The best current factoring algorithm is the Number Field Sieve (NFS), and its most difficult part is the sieving step. In 1999 a large distributed computation involving hundreds of workstations working for many months managed to factor a 512-bit RSA key, but 1024-bit keys were believed to be safe for the next 15-20 years. In this paper we describe a new hardware implementation of the NFS sieving step (based on standard 0.13μm, 1GHz silicon VLSI technology) which is 3-4 orders of magnitude more cost effective than the best previously published designs (such as the optoelectronic TWINKLE and the mesh-based sieving). Based on a detailed analysis of all the critical components (but without an actual implementation), we believe that the NFS sieving step for 512-bit RSA keys can be completed in less than ten minutes by a $10K device. For 1024-bit RSA keys, analysis of the NFS parameters (backed by experimental data where possible) suggests that sieving step can be completed in less than a year by a $10M device. Coupled with recent results about the cost of the NFS matrix step, this raises some concerns about the security of this key size.
منابع مشابه
Tv and or Fm Transmitting Antennas Desien Using Computer Graphic System (RESEARCH NOTES)
The purpose of this paper is three fold. First, the major theoretical pattern relationships of TV and/or FM transmitting antennas are dealt with. Secend, the computer calculation method and designing of such patterns using the given relationships. And third, a method in which a computer graphic system can be used to design such antennas for a specific pattern is introduced and its results are p...
متن کاملSome notes concerning the convergence control parameter in homotopy analysis method
omotopy analysis method (HAM) is a promising method for handling func-tional equations. Recent publications proved the eectiveness of HAM in solvingwide variety of problems in dierent elds. HAM has a unique property whichmakes it superior to other analytic methods, this property is its ability to con-trol the convergence region of the solution series. In this work, we claried theadvantages and ...
متن کاملThe prevalence of computer game addiction and related factors in adolescent boys of Gonabad in 2018
Background and Aim: Computer games are a kind of growing and attractive new communication technology. This has prompted researchers to study the effects of these games on users. This study aims to determine was performed the prevalence of computer game addiction and related factors in adolescent boys of Gonabad in 2018. Materials and Methods: In this cross-sectional descriptive-analytical stud...
متن کاملEvidence of the Potential Shift Mechanism in Crevice Corrosion (RESEARCH NOTES)
Previous research has indicated a qualitative resemblance between the current distribution along actively corroding crevice walls and currents measured in corresponding anodic polarization plots. Using detailed measurements of the potential gradient along the crevice, a semi-quantitative current distribution was calculated for the crevice wall using a double numerical differentiation method. Th...
متن کامل