Journal ArticleDOI
Dual RSA and Its Security Analysis
Reads0
Chats0
TLDR
New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.Abstract:
We present new variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents. This family of variants, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys. Two applications for dual RSA, blind signatures and authentication/secrecy, are proposed. In addition, we also provide the security analysis of dual RSA. Compared to normal RSA, the security boundary should be raised when applying dual RSA to the types of small-d, small-e, and rebalanced-RSA.read more
Citations
More filters
Journal ArticleDOI
New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT
TL;DR: In this article, a modified binary greatest common divisor (GCD) was used to recover one of the factors of a semi-prime in the even sum of squares.
Book ChapterDOI
Recent Progress on Coppersmith’s Lattice-Based Method: A Survey
TL;DR: A survey of recent approaches for lattice constructions that can deeply exploit the algebraic relations of the target polynomials in cryptanalysis of RSA crypto algorithm and its variants.
Journal Article
Hybrid Encryption Algorithm
TL;DR: This paper introduces hybrid approaches by combining two most important algorithms RSA algorithm and Diffie Hellman algorithm, which provides more security as compare to RSA algorithm.
Proceedings ArticleDOI
Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA
TL;DR: This paper presents a methodology which is more secure than RSA algorithm by doing some modifications in it and it is constructed by Mersenne prime numbers to provide more efficiency and security.
Proceedings ArticleDOI
The Improved Public Key Encryption Algorithm of Kerberos Protocol Based on Braid Groups
Ke Jia,Xiaojun Chen,Guanghua Xu +2 more
TL;DR: The novel algorithm is used to improve Kerberos protocol, which can be very good resistance to various attacks, therefore, it has more security and practicality.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Journal ArticleDOI
Factoring Polynomials with Rational Coefficients
TL;DR: This paper presents a polynomial-time algorithm to solve the following problem: given a non-zeroPolynomial fe Q(X) in one variable with rational coefficients, find the decomposition of f into irreducible factors in Q (X).