A Formal Analysis for RSA Attacks by Term Rewriting Systems

被引:0
作者
Kadkhoda, Mohammad [1 ]
Vosoogh, Anis [2 ]
Nourmandi-Pour, Reza [3 ]
机构
[1] Tarbiat Modares Univ, ACECR, Tehran, Iran
[2] Islamic Azad Univ, Sci & Res Branch, Sirjan, Iran
[3] Islamic Azad Univ, Sirjan Branch, Dept Comp Engn, Sirjan, Iran
来源
SOFT COMPUTING APPLICATIONS, (SOFA 2014), VOL 1 | 2016年 / 356卷
关键词
RSA cryptosystem; Attack analysis; Formal verification; Term rewriting system; Termination proving; KEY; CRYPTANALYSIS;
D O I
10.1007/978-3-319-18296-4_50
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The high security for RSA cryptosystem depends on the less power of attacks broken it. This subject can be reduced to find the prim numbers and integer factors. Any attack besides the brute force attack, may succeed and obtain plaintext or private key. So, it is necessary to keep the RSA cryptosystem security against attacks. In this paper, we proposed a formal cryptanalysis for RSA cryptosystem, by term rewriting systems (TRS) and termination proving. We have embedded one RSA attack in a TRS model, such that attack has been successes on the RSA cryptosystem if and only if its TRS model has been terminated. Since the automated termination proving of TRSs has been grown in the last years, our work will promise.
引用
收藏
页码:651 / 660
页数:10
相关论文
共 15 条
[1]   An Efficient Method for Attack RSA Scheme [J].
Aboud, Sattar J. .
2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, :587-591
[2]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], 1998, Term Rewriting and All That
[4]  
Bellare M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P92, DOI 10.1007/BFb0053428
[5]  
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[6]   Cryptanalysis of RSA with private key d less than N0.292 [J].
Boneh, D ;
Durfee, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) :1339-1349
[7]  
Bonte S, 1999, NOT AM MATH SOC, V46, P203
[8]  
Itoh K, 2008, LECT NOTES COMPUT SC, V4964, P387, DOI 10.1007/978-3-540-79263-5_25
[9]  
Mousa A., 2005, Pakistan Journal of Applied Sciences, V5, P60
[10]  
Pomerance C., 1996, NOT AM MATH SOC, V43, P1473