New Methods of Generating Primes Secure against Both P − 1 and P + 1 Methods ∗
نویسندگان
چکیده
Since cryptosystem based on the problem of factoring the composite number N can be attacked with P − 1 and P +1 methods, it is required that P −1 and P +1 should be difficult to be factored into many small primes, where we assume that the P is a factor of N . In this paper, first, we consider the distribution of secure primes against both P −1 and P +1 methods. Second, we propose two efficient algorithms for generating secure primes against both P −1 and P +1 methods by extending the trial division method. key words: prime generation, P − 1 method, P + 1 method, trial division method
منابع مشابه
Lark Kim Implementing and Cracking the RSA Cryptosystem
The primary goal of our project is to implement the RSA cryptosystem in Maple 8. Our implementation includes finding primes suitable for RSA, translating text messages into blocks of large numbers and back, as well as encrypting and decrypting the numerical blocks. We found that our program could quickly encrypt long messages using primes with at least 512 bits and was capable of encrypting mes...
متن کاملGenerating Provable Primes Efficiently on Embedded Devices
This paper introduces new techniques to generate provable prime numbers efficiently on embedded devices such as smartcards, based on variants of Pocklington’s and the Brillhart-Lehmer-Selfridge-TuckermanWagstaff theorems. We introduce two new generators that, combined with cryptoprocessor-specific optimizations, open the way to efficient and tamper-resistant on-board generation of provable prim...
متن کاملSafe Prime Generation with a Combined Sieve
A number p is a safe prime if both p and (p − 1)/2 are prime. This note describes a method of generating safe primes that is considerably faster than repeatedly generating random primes q until p = 2q + 1 is also prime.
متن کاملAlgorithm for Generating Primes for the Giuliani-Gong Public Key System
In this paper we propose an algorithm for computing large primes p and q such that q divides p4 + p3 + p2 + p+ 1 or p4 − p3 + p2 − p+ 1. Such primes are key parameters for the GiulianiGong Public Key System.
متن کاملA Statistical Limited-knowledge Proof for Secure Rsa Keys
The underlying cryptographic security of a number of public key cryptographic protocols rests upon the diiculty of factoring large composite integers. The RSA system is one such example. Given current state of the art factoring algorithms, an integer which is the product of a limited number of primes is most diicult to factor when the primes are nearly equal. A zero knowledge proof that a numbe...
متن کامل