Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Security analysis of RSA cryptosystem algorithm and it’s properties

Journal Article · · AIP Conference Proceedings
DOI:https://doi.org/10.1063/1.4897774· OSTI ID:22307938
 [1]; ;  [2]
  1. School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China)
  2. Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

OSTI ID:
22307938
Journal Information:
AIP Conference Proceedings, Journal Name: AIP Conference Proceedings Journal Issue: 1 Vol. 1618; ISSN APCPCS; ISSN 0094-243X
Country of Publication:
United States
Language:
English

Similar Records

Exploring Applied Cryptosystems to Formally Verify Security in Cyber-Physical Systems
Conference · Thu Aug 11 00:00:00 EDT 2022 · OSTI ID:1880065

New knapsack-based cryptosystem
Conference · Fri Dec 31 23:00:00 EST 1982 · OSTI ID:6078045

Effects of detector efficiency mismatch on security of quantum cryptosystems
Journal Article · Tue Aug 15 00:00:00 EDT 2006 · Physical Review. A · OSTI ID:20853030