2022
DOI: 10.3390/sym14091897
|View full text |Cite
|
Sign up to set email alerts
|

Small Private Exponent Attacks on RSA Using Continued Fractions and Multicore Systems

Abstract: The RSA (Rivest–Shamir–Adleman) asymmetric-key cryptosystem is widely used for encryptions and digital signatures. Let (n,e) be the RSA public key and d be the corresponding private key (or private exponent). One of the attacks on RSA is to find the private key d using continued fractions when d is small. In this paper, we present a new technique to improve a small private exponent attack on RSA using continued fractions and multicore systems. The idea of the proposed technique is to find an interval that cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…Public key encryption uses Euler's totient function [56,57], which provides the basis for factoring algorithms that have a major impact on cybersecurity. Hence, past works on number theory, primality testing, and the implementation of algorithms [58][59][60][61][62][63] have been the backbone of this research work to arrive at a new method. Further, the speeding up of existing methods using more efficient methods and the adoption of more computing power, including parallelism [64][65][66][67], have fueled this ongoing research.…”
Section: Improvements and Future Researchmentioning
confidence: 99%
“…Public key encryption uses Euler's totient function [56,57], which provides the basis for factoring algorithms that have a major impact on cybersecurity. Hence, past works on number theory, primality testing, and the implementation of algorithms [58][59][60][61][62][63] have been the backbone of this research work to arrive at a new method. Further, the speeding up of existing methods using more efficient methods and the adoption of more computing power, including parallelism [64][65][66][67], have fueled this ongoing research.…”
Section: Improvements and Future Researchmentioning
confidence: 99%
“…The complexity of the integer factorization issue affects the security of several public key cryptosystems such as [11,20,23,25,36], while the exponentiation problem determines the effectiveness of such cryptosystems [9,10,34].…”
Section: Introductionmentioning
confidence: 99%
“…Many problems in number theory and computer arithmetic play important roles in cryptography. Examples of such problems are the generation of prime numbers [1][2][3], primality testing [4,5], modular exponentiation [6], addition chains and sequences [7,8] and integer factorization [9][10][11][12]. Developing fast algorithms that address these problems is one of the main challenges of algorithm complexity and leads to significant improvements in various applications.…”
Section: Introductionmentioning
confidence: 99%