2011
DOI: 10.1007/978-3-642-21969-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Standards for RSA Integers

Abstract: Abstract. The key-generation algorithm for the RSA cryptosystem is specified in several standards, such as PKCS#1, IEEE 1363-2000, FIPS 186-3, ANSI X9.44, or ISO/IEC 18033-2. All of them substantially differ in their requirements. This indicates that for computing a "secure" RSA modulus it does not matter how exactly one generates RSA integers. In this work we show that this is indeed the case to a large extend: First, we give a theoretical framework that will enable us to easily compute the entropy of the out… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…e generation of RSA keys is described in several standards (e.g., FIPS 186-4 [46], IEEE 1363-2000 [1] -see [53] for an overview), many having di erent requirements for the form of the primes. One feature is common to all these standards -the primes should be generated randomly using a large amount of entropy.…”
Section: Related Workmentioning
confidence: 99%
“…e generation of RSA keys is described in several standards (e.g., FIPS 186-4 [46], IEEE 1363-2000 [1] -see [53] for an overview), many having di erent requirements for the form of the primes. One feature is common to all these standards -the primes should be generated randomly using a large amount of entropy.…”
Section: Related Workmentioning
confidence: 99%
“…As for the entropy estimations, we do not know any related work on this. A conference version of this article, focusing on the analysis of standardized RSA key-generators only, was published in Loebenberger & Nüsken (2011).…”
Section: Introductionmentioning
confidence: 99%
“…Nevertheless, these 173 n-values do not comply with the standards for the generation of RSA moduli (cf. [19]) and they were discarded. Nine cases are probably due to copy-and-paste errors, as eight proper moduli were found that differed from the wrong ones in a few hexadecimal positions (two distinct wrong moduli match up with the same correct one).…”
Section: Rsamentioning
confidence: 99%
“…Key generation standards for RSA (cf. [23]) have been analysed and found to be satisfactory in [19]. In [11] and [26] (and the references therein) several problems have been identified that are mostly related to the way certificates are used.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation