Loading...
Please wait, while we are loading the content...
Similar Documents
Security estimates updating of asymmetric cryptosystems for modern computing
| Content Provider | Scilit |
|---|---|
| Author | Zadiraka, V. K. Kudin, A. M. Shvidchenko, I. V. Seliukh, P. V. Komada, P. Kalizhanova, A. |
| Copyright Year | 2017 |
| Description | RSA is one of the most common and widespread asymmetric cryptosystems. A lot of cryptographic protocols that deal with encryption, digital signature, and distribution of key information are based on RSA scheme. A research by a group of scientists led by Arjen Lenstra confirms the problem of RSA implementation, namely generation of parameters that will ensure the system's security in practice. From among 11.5 million of RSA key certificates under research there has been found more than 26000 vulnerable keys with size of 1024 bits and 10 keys with size of 2048 bits. Factorization cost estimate is explained first of all, by the lack of flexibility of cloud computing services order, and, secondly, by the direct use of existing implementations of the algorithm general number field sieve for cloud technologies. The interest of assessing RSA security in practice is the highlighted issue of size or rather the nature of size growth of the set of secure crypto parameters. Book Name: Recent Advances in Information Technology |
| Related Links | https://api.taylorfrancis.com/content/chapters/edit/download?identifierName=doi&identifierValue=10.1201/9781351243179-1&type=chapterpdf |
| DOI | 10.1201/9781351243179-1 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2017-10-24 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Recent Advances in Information Technology Information Systems Rsa Keys Bits Cryptosystems Cloud Asymmetric Security Computing Implementation Size |
| Content Type | Text |
| Resource Type | Chapter |