RSA vulnerabilities with small prime difference

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security of the RSA cryptosystem is based on the assumption that recovering the private key from a public pair is a hard task. However, if the private key is smaller than some bound the system is considered to be insecure. An RSA modulus with a small difference of its prime factors also significantly reduces the overall security. We show that the bound on small private key with respect to small prime difference can be further improved. Therefore, we adapt the technique of unravelled linearization for constructing lattices and although the adapted unravelled linearization is only a method for generating lattices in more elegant way, we yield a benefit compared to known bounds. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Kühnel, M. (2012). RSA vulnerabilities with small prime difference. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7242 LNCS, pp. 122–136). https://doi.org/10.1007/978-3-642-34159-5_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free