An Efficient Method for Attack RSA Scheme

被引:9
作者
Aboud, Sattar J. [1 ]
机构
[1] Iraqi Council Representat, Baghdad, Iraq
来源
2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009) | 2009年
关键词
public key cryptography; RSA scheme; factoring problem; RSA attack scheme; SECRET KEY;
D O I
10.1109/ICADIWT.2009.5273976
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
the security on many public key encryption schemes relied on the intractability of finding the integer factoring problem such as RSA scheme. However, there are great deals of researches concerning the RSA factoring modulus compared with the other type of attack the RSA scheme. So the need for more methods of attacks other than RSA factoring modulus to obtain an efficient and faster algorithm to solve this problem is still essential. This paper introduces a new algorithm which attacks the RSA scheme. The suggested algorithm aims to obtain the private key of the RSA scheme and then factoring the modulus based on the public key of the RSA scheme. The new idea claimed to be more efficient than the already existed algorithms especially when the public key is small, since most of public key encryption schemes select a small public encryption key e in order to improve the efficiency of encryption. Also, the suggested algorithm is more efficient since it is faster and takes less running time.
引用
收藏
页码:587 / 591
页数:5
相关论文
共 22 条
[1]   Baghdad method for calculating multiplicative inverse [J].
Aboud, SJ .
ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, :816-819
[2]  
BAHR F, 2000, SUCCESSFUL FACTORIZA
[3]  
Bonte S, 1999, NOT AM MATH SOC, V46, P203
[4]  
CAVALLAR S, 1999, FACTORING RSA 140 US
[5]   Deterministic polynomial-time equivalence of computing the RSA secret key and factoring [J].
Coron, Jean-Sebastien ;
May, Alexander .
JOURNAL OF CRYPTOLOGY, 2007, 20 (01) :39-50
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
ERIC W, PRIME FACTORIZATION
[8]  
HASTAD J, 1986, LECT NOTES COMPUT SC, V218, P403
[9]   On the security of multi-prime RSA [J].
Hinek, M. Jason .
JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2008, 2 (02) :117-147
[10]  
Hinek MJ, 2003, LECT NOTES COMPUT SC, V2595, P385