Loading...
Please wait, while we are loading the content...
Similar Documents
Some Insightful Attacks on the Rsa Cryptosystem
| Content Provider | Semantic Scholar |
|---|---|
| Author | Bansal, Divya Goel, Ajay |
| Copyright Year | 2007 |
| Abstract | RSA has come to play a central role in electronic communications. As the first example of what is known as a public key cryptosystem, and the only one that has stood the test of nearly 30 years of attacks, RSA has become the algorithm of choice for encrypting Internet credit-card transactions, securing email, and authenticating phone calls. Like all practical cryptographic schemes, however, RSA stands on mathematically shaky ground. Because its security rests on unproven assumptions, RSA comes with no guarantee that the secrets it guards will remain safe. Still, for close to thirty years, although researchers have found weaknesses in implementations of the algorithm, its core has weathered every attack the best minds of cryptography have devised. The algorithm’s robustness, even in the absence of rigorous proof, provides a sense of security, researchers say. Not surprisingly, the security of RSA has remained a focus of cryptographic research, both theoretical and practical. Some researchers have emphasized the secure implementation of RSA, a fascinating topic in itself. Complexity theorists, on the other hand, have directed their efforts to the theoretical underpinnings of RSA, and the strength of the assumptions on which its security rests. |
| File Format | PDF HTM / HTML |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |