scispace - formally typeset
Journal ArticleDOI

Dual RSA and Its Security Analysis

Reads0
Chats0
TLDR
New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Abstract
We present new variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents. This family of variants, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys. Two applications for dual RSA, blind signatures and authentication/secrecy, are proposed. In addition, we also provide the security analysis of dual RSA. Compared to normal RSA, the security boundary should be raised when applying dual RSA to the types of small-d, small-e, and rebalanced-RSA.

read more

Citations
More filters
Journal ArticleDOI

New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT

TL;DR: In this article, a modified binary greatest common divisor (GCD) was used to recover one of the factors of a semi-prime in the even sum of squares.
Book ChapterDOI

Recent Progress on Coppersmith’s Lattice-Based Method: A Survey

TL;DR: A survey of recent approaches for lattice constructions that can deeply exploit the algebraic relations of the target polynomials in cryptanalysis of RSA crypto algorithm and its variants.
Journal Article

Hybrid Encryption Algorithm

TL;DR: This paper introduces hybrid approaches by combining two most important algorithms RSA algorithm and Diffie Hellman algorithm, which provides more security as compare to RSA algorithm.
Proceedings ArticleDOI

Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA

TL;DR: This paper presents a methodology which is more secure than RSA algorithm by doing some modifications in it and it is constructed by Mersenne prime numbers to provide more efficiency and security.
Proceedings ArticleDOI

The Improved Public Key Encryption Algorithm of Kerberos Protocol Based on Braid Groups

TL;DR: The novel algorithm is used to improve Kerberos protocol, which can be very good resistance to various attacks, therefore, it has more security and practicality.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Journal ArticleDOI

Factoring Polynomials with Rational Coefficients

TL;DR: This paper presents a polynomial-time algorithm to solve the following problem: given a non-zeroPolynomial fe Q(X) in one variable with rational coefficients, find the decomposition of f into irreducible factors in Q (X).