A First Study of the Neural Network Approach in the Rsa Cryptosystem

نویسندگان

  • G. C. MELETIOU
  • D. K. TASOULIS
چکیده

The RSA cryptosystem is supposed to be the first realization of a public key cryptosystem in 1977. Its (computational) security is relied upon the difficulty of factorization. In order to break the RSA cryptosystem it is enough to factorize where is the product of two large prime numbers, . This is equivalent to calculate where is the Euler function. In this paper Neural Networks are trained in order the function to be computed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Approaches in RSA Cryptosystem using Artificial Neural Network

RSA cryptosystem, the first public key cryptography presented in 1977. Neural networks are often used as a powerful discriminating estimator for tasks in function approximation. This paper describes a neural-network-based method relies on Radial Basis Function and Levenberg-Marquardt Backpropagation for estimating the behavior of the function used in RSA cryptosystem to calculate the function. ...

متن کامل

Neural Network Sensitivity to Inputs and Weights and its Application to Functional Identification of Robotics Manipulators

Neural networks are applied to the system identification problems using adaptive algorithms for either parameter or functional estimation of dynamic systems. In this paper the neural networks' sensitivity to input values and connections' weights, is studied. The Reduction-Sigmoid-Amplification (RSA) neurons are introduced and four different models of neural network architecture are proposed and...

متن کامل

A Comparison of Regression and Neural Network Based for Multiple Response Optimization in a Real Case Study of Gasoline Production Process

Most of existing researches for multi response optimization are based on regression analysis. However, the artificial neural network can be applied for the problem. In this paper, two approaches are proposed by consideration of both methods. In the first approach, regression model of the controllable factors and S/N ratio of each response has been achieved, then a fuzzy programming has been app...

متن کامل

Cryptography through Interpolation, Approximation and Computational Intelligence Methods

Recently, numerous techniques and methods have been proposed to address hard and complex algebraic and number theoretical problems related to cryptography. We review several interpolation and approximation techniques. In particular, we discuss techniques related to polynomial interpolation, discrete Fourier transforms, as well as, polynomial approximation. Subsequently, we focus on a recently p...

متن کامل

Prediction of Energy Consumption in the First Line of Tehran Metro: GMDH Neural Network Approach

Today, energy and its consumption are the main strategic plan of organizations and also the development of urban transport systems by considering a variety of economic, scientific, industrial, climate and growing urbanization is essential. Analysis of past trends in energy is the key to predict future trends, with regard to the rate of development of metro, for planning and future-oriented macr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002