1. Security analysis of RSA cryptosystem algorithm and it’s properties
- Author
-
Chenglian Liu, Juan Lin, and Yongning Guo
- Subjects
Security analysis ,Computer science ,business.industry ,Internet privacy ,PKCS ,Information technology ,Cryptography ,Information security ,Computer security ,computer.software_genre ,Exchange of information ,Cryptosystem ,business ,Algorithm ,computer ,PKCS #1 - Abstract
The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.
- Published
- 2014
- Full Text
- View/download PDF