Loading...
Please wait, while we are loading the content...
Similar Documents
Attacks on the RSA Cryptosystem and Some of Its InstancesCosi
| Content Provider | Semantic Scholar |
|---|---|
| Author | Phan, Vinhthuy |
| Copyright Year | 2007 |
| Abstract | Two types of attacking the RSA cryptosystem are discussed. The rst aims at a careless choice of the primes p and q, which are the basis of RSA security. Choosing these primes carefully can prevent the cryptosystem from this type of attack. The second aims at special instances of RSA-based cryptographical protocols. Speciic properties of these protocols enable users of the system or even outsiders gain knowledge of information that they are not intended to know. If neccesary preventions are taken into account, these attacks pose no threat to the system at all, or more precisely to the algebraic structure of the RSA algorithm. However, in studying these attacks, we learn how to construct a stronger RSA cryptosystem, as well as gain some insights on what to avoid in designing a RSA-based cryptographical protocol. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.cs.sunysb.edu/~phan/papers/rsa.ps |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |