Cryptanalytic Attacks on Rivest, Shamir, and Adleman (RSA) Cryptosystem: Issues and Challenges

作者: Shehu Jabaka , Akram Zeki , Haruna Chiroma , Murni Mahmud , Mohammed Joda Usman

DOI:

关键词: LoginWeb trafficCryptosystemInformation securityWeb serverComputer sciencePKCS #1EncryptionComputer securityKey (cryptography)

摘要: RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content ensure its privacy. Prior research studies have shown that very successful protecting enterprises commercial services systems as well web servers browsers secure traffic. In email application, it's utilized privacy authenticity message. Some also efficiency securing remote login sessions, electronic credit-card payment systems. Generally gain a support because it’s frequently use most applications where mostly concern. Its strength lies with ability withstanding many forms attacks. While focus on proving breakable under certain cryptanalytic attacks, yet there are some confrontations circumstances applying those This paper presents issues challenges key aspects attacks algorithm. The explores perceived vulnerabilities implementing which can render cryptanalyst easier means attack.

参考文章(18)
Carl Pomerance, A Tale of Two Sieves Biscuits of Number Theory. pp. 85- 104 ,(2009) , 10.1090/DOL/034/15
Steven D. Galbraith, Mathematics of Public Key Cryptography ,(2012)
Song Y. Yan, Cryptanalytic Attacks on RSA ,(2007)
D. Boneh, TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM Notices of the American Mathematical Society. ,vol. 46, pp. 203- 212 ,(1999)
Paul C. Kocher, Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems international cryptology conference. ,vol. 1109, pp. 104- 113 ,(1996) , 10.1007/3-540-68697-5_9
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 26, pp. 96- 99 ,(1983) , 10.1145/357980.358017
Don Coppersmith, Modifications to the Number Field Sieve Journal of Cryptology. ,vol. 6, pp. 169- 180 ,(1993) , 10.1007/BF00198464
Ryan West, The psychology of security Communications of The ACM. ,vol. 51, pp. 34- 40 ,(2008) , 10.1145/1330311.1330320