A RSA key security gradating algorithm based on threshold attack time

被引:0
作者
Tan W. [1 ]
Xi J. [2 ]
Wang X. [3 ]
机构
[1] Institute of Network Technology, Hunan University of Arts and Science, Changde
[2] College of Computer Science and Technology, Hunan University of Arts and Science, Changde
[3] College of Economy and Management, Hunan University of Arts and Science, Changde
关键词
Attack time cost; Iterative encrypting attack; RSA; Security grade; Threshold time;
D O I
10.4304/jsw.6.9.1873-1880
中图分类号
学科分类号
摘要
In this paper, we pioneer a key security level gradation scheme which is proved to efficient to counteract Iterative-Encrypting-Attack against RSA. And we make it clear that the bug which hides after the traditional key generation algorithm is exploited by Iterative-Encrypting-Attack and weakens RSA security, and that the case can be improved if the traditional key generation algorithm is modified delicately. After analyzing the preliminaries and practical steps of Iterative-Encrypting-Attack in detail, we propose the concept of security grade of key-pair and depict the hierarchy of grades systematically, and bring forward an algorithm that grades security grade of key pairs. Furthermore, we introduce the concept of attack cost into the gradation prototype, then program for grading algorithm and set in motion a series of experiments for surveying the relationship between attack-cost and key-security-grade. At last, by the attained result from experimental statistics, we point it out that if key-pair is properly chosen RSA system can acquire a satisfying immunity from Iterative-Encrypting-Attack. © 2011 ACADEMY PUBLISHER.
引用
收藏
页码:1873 / 1880
页数:7
相关论文
共 15 条
  • [1] Kai-Cheng L., Computer Cryptograph:Data Secutity and Privacy of Computer Network, Ser. Combinatorics in Computer Science, (2003)
  • [2] Yevgeniy Dodis A.S., Sahai A., On perfect and adaptive security in exposure resilient cryptography, Proceedings of Eurocrypt, (2001)
  • [3] Algesheimer V.S.J., Camenisch J., Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, Proceedings of Crypto'2002, (2002)
  • [4] Nguyen J.S.P., Lattice reduction in cryptology: An update. In Algorithmic Number Theory, Proceedings of the 4th Algorithmic Number Theory Symposium, (2000)
  • [5] Stallings W., Cryptography and Network Security: Principles and Practices, (2006)
  • [6] Yan S.Y., Number Theory for Computing (2nd Version, English), Ser. Combinatorics in Computer Science, (2002)
  • [7] Boneh G.D., Cryptanalysis of RSA with private key d less than N 0.292, IEEE Transactions on Information Theory, 4, (2000)
  • [8] Steinfeld Y.Z.R., An advantage of low-exponent RSA with modulus primes sharing least significant bits, Proceedings of RSA Conference 2001, (2001)
  • [9] Manuel K., Joachim L., Hardware Software Co-design of Elliptic curve Cryptography on an 8051 Mierocontroller, Proceedings of Cryptographic Hardware and Embedded Systems, (2006)
  • [10] Boneh D., Smooth integers using CRT decoding, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, (2000)