New Methods of Generating Primes Secure against Both P − 1 and P + 1 Methods ∗

نویسندگان

  • Yoshizo SATO
  • Yasuyuki MURAKAMI
  • Masao KASAHARA
چکیده

Since cryptosystem based on the problem of factoring the composite number N can be attacked with P − 1 and P +1 methods, it is required that P −1 and P +1 should be difficult to be factored into many small primes, where we assume that the P is a factor of N . In this paper, first, we consider the distribution of secure primes against both P −1 and P +1 methods. Second, we propose two efficient algorithms for generating secure primes against both P −1 and P +1 methods by extending the trial division method. key words: prime generation, P − 1 method, P + 1 method, trial division method

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lark Kim Implementing and Cracking the RSA Cryptosystem

The primary goal of our project is to implement the RSA cryptosystem in Maple 8. Our implementation includes finding primes suitable for RSA, translating text messages into blocks of large numbers and back, as well as encrypting and decrypting the numerical blocks. We found that our program could quickly encrypt long messages using primes with at least 512 bits and was capable of encrypting mes...

متن کامل

Generating Provable Primes Efficiently on Embedded Devices

This paper introduces new techniques to generate provable prime numbers efficiently on embedded devices such as smartcards, based on variants of Pocklington’s and the Brillhart-Lehmer-Selfridge-TuckermanWagstaff theorems. We introduce two new generators that, combined with cryptoprocessor-specific optimizations, open the way to efficient and tamper-resistant on-board generation of provable prim...

متن کامل

Safe Prime Generation with a Combined Sieve

A number p is a safe prime if both p and (p − 1)/2 are prime. This note describes a method of generating safe primes that is considerably faster than repeatedly generating random primes q until p = 2q + 1 is also prime.

متن کامل

Algorithm for Generating Primes for the Giuliani-Gong Public Key System

In this paper we propose an algorithm for computing large primes p and q such that q divides p4 + p3 + p2 + p+ 1 or p4 − p3 + p2 − p+ 1. Such primes are key parameters for the GiulianiGong Public Key System.

متن کامل

A Statistical Limited-knowledge Proof for Secure Rsa Keys

The underlying cryptographic security of a number of public key cryptographic protocols rests upon the diiculty of factoring large composite integers. The RSA system is one such example. Given current state of the art factoring algorithms, an integer which is the product of a limited number of primes is most diicult to factor when the primes are nearly equal. A zero knowledge proof that a numbe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999