Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The special method with the fake key to attack RSA

View through CrossRef
Because RSA is the cryptographic algorithm that is still extensively employed today, several attack techniques against RSA are continually being developed. These algorithms are divided into two distinct groups. The first group is a general group unaffected by RSA parameters. The other group is unique due to at least one characteristic that represents a vulnerability. The aim of this research is to reveal the new vulnerabilities in RSA and to provide ways for recovering the original plaintext. The first vulnerability occurs when the sum of the private key and Euler totient function is near to the modulus but lower than the modulus. If this result is found, it can be selected as the exponent which is called the fake key. The second situation occurs whenever the key is larger than the modulus. The experimental results indicate that if a new weak point is found, the fake key may be disclosed quickly despite the modulus’s size. In addition, when the sum of the public key and the Euler totient function is relatively near to the modulus, the proposed method can be also used to break the modulus. Additionally, the other vulnerability is demonstrated. It occurs when the product of the unknown integer j and the modulus is near to the addition of the key and the product of the other unknown integer and the Euler totient function. However, the issue with the second weak point is the mechanism for finding j.
Title: The special method with the fake key to attack RSA
Description:
Because RSA is the cryptographic algorithm that is still extensively employed today, several attack techniques against RSA are continually being developed.
These algorithms are divided into two distinct groups.
The first group is a general group unaffected by RSA parameters.
The other group is unique due to at least one characteristic that represents a vulnerability.
The aim of this research is to reveal the new vulnerabilities in RSA and to provide ways for recovering the original plaintext.
The first vulnerability occurs when the sum of the private key and Euler totient function is near to the modulus but lower than the modulus.
If this result is found, it can be selected as the exponent which is called the fake key.
The second situation occurs whenever the key is larger than the modulus.
The experimental results indicate that if a new weak point is found, the fake key may be disclosed quickly despite the modulus’s size.
In addition, when the sum of the public key and the Euler totient function is relatively near to the modulus, the proposed method can be also used to break the modulus.
Additionally, the other vulnerability is demonstrated.
It occurs when the product of the unknown integer j and the modulus is near to the addition of the key and the product of the other unknown integer and the Euler totient function.
However, the issue with the second weak point is the mechanism for finding j.

Related Results

Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Analisis Saddu Dzari’ah terhadap Penggunaan Aplikasi Fake Global Positioning System (GPS) pada Shopeefood Driver
Abstract. Shopee is a company engaged in online-based buying and selling services. One of the latest features of Shopee is the ShopeeFood service and has standard rules that must b...
Hidden Real Modulus RSA Cryptosystem
Hidden Real Modulus RSA Cryptosystem
Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and consid...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Enhancing analog circuit security through obfuscation
Enhancing analog circuit security through obfuscation
The focus of this dissertation is the safeguarding of analog circuits against IP piracy attacks, which includes the development of a novel method to secure analog IP, the assessmen...
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
DISCOURSE: KNOWLEDGE, NEWS, AND FAKE INTERTWINED
Discourse has been a focal point for linguists over an extended period. The multidisciplinary character of the term ‘discourse’ has resulted in diverse approaches aiming to define ...
An Empirical Study on Fake News Menace and Misinformation with Special Reference to India
An Empirical Study on Fake News Menace and Misinformation with Special Reference to India
Fake news are the news, cooked up stories or hoaxes that are created to deliberately misinform or deceive the consumers/readers. Usually, these stories are created to either influe...

Back to Top