2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI) 2017
DOI: 10.1109/icpcsi.2017.8392156
|View full text |Cite
|
Sign up to set email alerts
|

Fast cryptanalysis of RSA encrypted data using a combination of mathematical and brute force attack in distributed computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Brute force attack [16] is the simplest method to explore d. The main process is to find an integer which is equal to d. In general, the first initial value which is selected as the exponent of modular exponentiation is begun as 3 and it is increased by two whenever the result from decryption equation is not equal to m until the target is found. In fact, the reason that the exponent must be increased by two is to skip all even numbers out of the computation, because d is always an odd number.…”
Section: Brute Force Attackmentioning
confidence: 99%
“…Brute force attack [16] is the simplest method to explore d. The main process is to find an integer which is equal to d. In general, the first initial value which is selected as the exponent of modular exponentiation is begun as 3 and it is increased by two whenever the result from decryption equation is not equal to m until the target is found. In fact, the reason that the exponent must be increased by two is to skip all even numbers out of the computation, because d is always an odd number.…”
Section: Brute Force Attackmentioning
confidence: 99%